I don’t always agree with Steve Gibson. On this particular attack the one thing that makes this a non-issue is that you have to have active malicious code running in the browser. Once your machine is compromised in any way you aren’t secure, it is really that simple. You can listen to Steve talk about this and get a text transcription on the Security Now episode page.
Categories
- 3.x
- Amazon
- AMD
- Android
- Annoucements
- Apple
- Apple
- AT&T
- AVG
- Belkin(Linksys)
- Blackberry
- Blacklist
- Browsers
- CDC Cellular Repair
- Chrome
- Church
- Cisco
- Cisco
- Cloud Computing
- Comcast
- Cyberpower
- DDOS
- Dell
- Dell
- Domains
- DOS
- Edge
- Fiber
- Firefox
- Firewalls
- Free/TrueNAS
- FreeBSD
- General
- Google Apps
- Government Regulations
- Hardware
- HIPAA
- Hosting
- hyper-v
- Input Devices
- Intel
- Internet
- Internet Explorer
- IOT
- Linux
- Meraki
- Microsoft
- Net Neutrality
- NPO's
- Nvidia
- Office
- Office 15
- Office 365
- Open Source
- Oracle
- PFSense
- Podcast
- Power
- Printers
- Radio
- Ransomware
- Research Projects
- SBS 2008
- SBS2011
- Security
- Security Alerts
- Server 2008
- Server 8
- Service Status
- Services
- Smartphone
- Sonicwall
- Sophos
- Storage
- Swift Systems
- Synology
- Tablets
- Tripp-Lite
- Ubiquiti
- Uncategorized
- UTM
- Vendors
- Vista
- WIFI
- Windows
- Windows 10
- Windows 7
- Windows 8
- Windows365