Who’s On My Wifi notifies you about freeloaders

If your router supports wireless Internet and if WiFi is enabled, then it is theoretically possible that others connect to your network to use your Internet connection. While you can make sure that it is harder for them, for instance by enabling the highest security mode or selecting a secure passphrase that needs to be entered to establish the connection, it can still happen that someone else may find a way to connect to your wireless network.

Read more.

Firm Bankrupted by Cyberheist Sues Bank

A California escrow firm that was forced out of business last year after a $1.5 million cyberheist is now suing its former bank to recoup the lost funds.

A state-appointed receiver for the now defunct Huntington Beach, Calif. based Efficient Services Escrow has filed suit against First Foundation Bank, alleging that the bank’s security procedures were not up to snuff, and that it failed to act in good faith when it processed three fraudulent international wire transfers totaling $1,558,439 between December 2012 and February 2013.

Read more.

AccessScanner displays all special permissions of a Windows directory tree

Each user account of a Windows operating system has specific permissions assigned to it. This determines which files can be accessed or modified among other things. Administrators can modify those permissions, to give additional rights to a user or remove rights instead. A simple example is a configuration file that you do not want users to modify in any way or form. You could remove the write permission so that users cannot modify it anymore.

Read more.