How to Stop Bots from Exploiting Social Media Sites

As I read the daily news about how “bad actors” have abused and exploited social media sites, flooding them with fake posts, I think back to a line from the classic movie Rudy. Leading up to the last game of the season, Coach Dan Devine (Chelcie Ross) famously says to his team, “Remember, no one, and I mean no one, comes into our house and pushes us around.”

Not Vulnerable – Intel Itanium/Secure64 SourceT

Intel Itanium and Secure64 Source T are NOT vulnerable to either Spectre or Meltdown and below are explanations of how both vulnerabilities work, and why Itanium and SourceT are immune.

Internet of Things – just because we can, doesn’t mean we should

At the dentist office today was the most ridiculous thing to join the Internet of Things – a Bluetooth-enabled POWER TOOTHBRUSH. What on earth is the value of connecting your toothbrush to the internet? For that matter, why enable your TOASTER to be online? Your washer, your dryer? Do you really need your fridge to tell you when you need eggs, milk or beer?

Avoid the DNS outage that could cost you the C-suite

A DNS outage will take your business offline – and potentially your job with it. It is time to make DNS security a critical focus point for companies.

Please build securely – before robots kill us

Over the past couple of weeks, the world has been given WannaCry, which moved like wildfire through the globe and has given rise to multiple theories of origination from North Korea and not North Korea, and was dubbed “a pretty shoddy piece of work”. As of this writing no one is certain of the origin.

The Front Door is well protected against DNS DDoS attacks, but what about the back?

The DNS is the phone book of the internet, and most IP services are entirely dependent on its stability and performance. With the recent rash of DNS DDoS attacks, it has become clear that the DNS needs a special security status.