What is wardriving?
Wardriving is a technique by hackers and security experts to conduct large-scale surveillance of networks by simply driving by their signals and recording the information. It is also a game played among many of them to see who can collect the most network-data. It starts with downloading an app such as G-MoN or Wigle. Once the app is installed and an account is setup, the individual only needs to drive around and it will automatically capture the information being broadcasted by wireless devices. These devices can be wireless access points, wireless printers, Bluetooth devices, and home automation systems.
Why ...
Read More
Category: security
What is Wardriving?
May 8th, 2018 by cfwiemployeeNew Malware Detected
April 17th, 2018 by cfwiemployee
Beware of running executable (.exe) files. We found this sticky virus on a machine and decided to get a copy of it to upload for analysis. WARNING, this malicious trojan cannot be removed via most anti-virus applications (we have tested about 10 different applications) as it replicates and creates a non-intrusive RAT via Supremo Remote Software in order to restore itself. It also escalates privileges and implements a rootkit allowing for complete access while blocking yours. This process was found in a hidden directory C:/ProgramData/WeatherBug/ creating 119 registry records.
Sophos responded to the uploaded detection with:
"1. SetupNow.exe is a New detection: ...
Read More
Read More
Network Security Solutions – Are Your Documents Secure?
January 31st, 2018 by cfwiemployee
January 29th, 2018
Network Security Solution
Why Choose Sophos?
Sophos makes enterprise-grade security that is feasible for small and mid-sized companies. It provides sophisticated protection with simple management that our competitors are unable to match. Created by SophosLabs and DARPA, Sophos has a unique edge in the field of security using theory, synchronized protection, and heuristic learning algorithms to prevent attacks before they happen. This is unlike our competitors who react to attacks rather than prevent them.
Endpoint Protection for Businesses
Cape Fear Networks is proud to announce our partnership with Sophos, an international network security solutions provider. This is a next-generation level of protection ...
Read More
Read More
Password Security Tips
October 19th, 2017 by cfwiemployee
Bes
Best Practices for Password Security: Length, Complexity and Use a Password Keeper
The most used mechanism for authentication is the password. Access is gained with passwords for mobile devices, computers, operating systems, and networks. Essentially, passwords are part our daily lives. Password security requirements have changed, and numerous passwords must contain a lengthy amount of characters that oftentimes include a combination of both lower and upper-case letters, numbers, and special characters. The password strength is seen as how long and/or how complex it is. Although passwords are unable to stop attacks, by using strong passwords cyber attacks are discouraged and slowed ...
Read More
Read More