On Oct 16 2017 US-CERT released Vulnerability Note VU#228519 after researchers disclosed “serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks.” They have named the proof-of-concept exploits, KRACK (key reinstallation attacks)…
The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. […] To prevent the attack, users must update affected products as soon as security updates become available.
On, October 2, 2017, vulnerabilities (US-CERT VU#973527) were made public, by Google’s security team, in Dnsmasq, a widely used software package included in many Internet-connected devices, such as routers, IoT devices, and Android devices. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
According to US-CERT (part of the Department of Homeland Security), Netgear R6200, R6250, R6400, R6700, R6900, R7000, R7100LG, R7300, R7900, R8000, D6220, and D6400 routers, and possibly other models, are vulnerable to arbitrary command injection. If you use one of the vulnerable Netgear routers, we recommend that you apply an update provided by Netgear, or discontinue use and replace the vulnerable device.
Picking good passwords, and not reusing them, is one of the most important steps to stay secure, online…
[Update 4/7/2016] On April 5 2016, the Federal Trade Commission (FTC) released an alert on tech-support themed telephone scams.
This is a reminder to avoid falling for Tech Support Scams.
Tech Support Scams, typically, involve someone cold calling a potential victim, saying they are with a trusted organization or company, such as Microsoft or Windows, and warning that their computer is malfunctioning or infected with a dangerous virus. Then the caller (scammer) offers to help by having the victim download software, or remotely connecting to the victim’s computer, to fix the problem.
Reminder… Widomaker will never ask for your password, credit card, or other personal information via email!
Visit the below links for more information…
Vulnerabilities have recently been discovered that affect certain models of D-Link broadband routers. If you are using one of the affected models you should take steps to update the firmware of your router with the security patch provided by D-Link, or replace the device.
The list of affected D-Link router models can be found in CERT Vulnerability Note VU#248083 or in D-Link’s page on the issue. D-Link’s page says that firmware updates should be available by the 31st of October, 2013.
An example photo of a D-Link DI-524 wireless router (one of the affected models) can be found here.
If your D-Link model IS NOT listed as affected then you DO NOT need to take any action.
You should not continue to operate a vulnerable D-Link router because it will put your computers and personal information at risk.
If you would like to replace an affected D-Link device, and you would like to purchase a replacement router from Widomaker, please call, or e-mail, our office to discuss the available options.
There is a zero-day vulnerability that has been discovered and in the wild exploiting Microsoft’s Internet Explorer (7, 8, and 9). Due to this, it would be a good idea to switch web browsers for a few weeks until security updates can be released for Internet Explorer. Also, make sure your anti-virus software is up-to-date.
The following are several other web broswers you can install and use: