Latest Blog Posts

7ac151cecb6d5053d7cf4c7fa1ac596e

Data Security - It's a responsibility, not an option...

April 07, 2010 Added by:Ian Barrs

"We need to talk about security, it's becoming an issue." This is a line that would draw a blank on many a CEOs face, even today. "We've got strong password policies, and no-one's allowed to use USBs", the CEO may burble. If that's your last line of defence, and you merely trust people to follow the rules, you're heading for trouble.

Comments  (0)

65be44ae7088566069cc3bef454174a7

How to Protect Your Privacy After You Die

April 06, 2010 Added by:Rebecca Herold

Some time ago, I read a news report about a family who wanted to obtain the email messages of their son who had been killed in Iraq. Wow.  I hadn’t thought about all my electronic virtual possessions, such as emails and files.

Comments  (2)

37d5f81e2277051bc17116221040d51c

Be careful Your PC Isn’t Held for Ransom

April 06, 2010 Added by:Robert Siciliano

Computerworld reported that a hacker threatened to expose health data and demanded $10 million from a government agency. The alleged ransom note posted on the Virginia DHP Prescription Monitoring Program site claimed that the hacker had backed up and encrypted more than 8 million patient records and 35 million prescriptions and then deleted the original data. “Unfortunately for Virginia, the...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Passwords…Are they needed?

April 06, 2010 Added by:Katie Weaver-Johnson

This week I received an e-mail from a friend of mine saying he was in the UK to visit his ill sister and needed to borrow money…perhaps many of you have received an e-mail like this too?  In reality, my friend’s e-mail account had been hacked and the e-mail was a hoax.

Comments  (5)

F230c4cd39d680d4cde59248861bdf9d

Convenience Encourages Big Brother Style Security

April 06, 2010 Added by:Michael O'Connor

How many people remember the Big Brother scare surrounding the Processor Serial Number (PSN) embedded in Pentium 3’s (and some Pentium 2’s) back in 1999-2000? Despite some of the technical community stating that the PSN was not a solid identifier, as it could be easily masked (or, conversely, “forced” to reveal itself), Intel created quite the scare among large groups of pe...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Is That Portable Device a Data Hazard?

April 06, 2010 Added by:Robert Siciliano

According to a survey  of London and New York City taxi companies last year revealed that more than 12,500 devices, such as laptops, iPods and memory sticks, are forgotten in taxis every six months. Portable devices that may have troves of sensitive data.

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

Gangs Are Targeting Your Kids Via the Internet

April 05, 2010 Added by:Theresa Payton

Word for the Week: Cyber Banging. Also called Net Banging - This refers to the internet recruiting process that gangs use to target kids. Gangs typically target high school and middle school kids but there are cases where kids as young as 8 have been recruited.

Comments  (2)

49afa3a1bba5280af6c4bf2fb5ea7669

Quandary of Social Media Security

April 05, 2010 Added by:Mike Meikle

I was recently asked a question regarding the top IT concerns for social media (Web 2.0) implementation plan. Well, in my view information security is at the top.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Federal Guidelines for Social Media Review

April 05, 2010 Added by:Mike Meikle

In my last post, I referenced the relatively new (Sept 09) federal guidelines for Social Media security by the federal government. I went ahead and put the guidelines in the  online storage widget for anyone to access.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Dumb Criminals – The Best Way to Get Caught? Call 911!

April 05, 2010 Added by:Robert Siciliano

In Daytona Beach, Florida, the dumb criminal capital of America, two Florida teenagers are facing charges after breaking into cars. Apparently one teen’s phone was programmed to call 911 and the phone was smarter than the teens and called (maybe accidentally) 911 to inform law enforcement of the crimes taking place.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Beware of Door to Door Conmen

April 05, 2010 Added by:Robert Siciliano

There are bazillion scammers using a bazillion ruses to get your money. The lowest of the low are the ones who scam the elderly. These same conmen often do it door to door and can be very dangerous. Con men posing as city employees seem to be the most effective scam. In one incident 2 men posed as city workers who were trimming trees in a neighborhood. One man would knock on the door and schmoo...

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Why bother with PGP ...???

April 04, 2010 Added by:K S Abhiraj

The very nature of email communication makes it perfect for spying and tapping. Imagine all the emails that fly across the Atlantic Ocean. Every single one of them could be tapped without you even noticing it. Of course, thinking that someone will sit and read every single one of them is preposterous - but the "problem" is that nobody has to.

Comments  (12)

924ce315203c17e05d9e04b59648a942

2010: A Year of Change for the Security Industry

April 04, 2010 Added by:Richard Stiennon

2010 is going to be a dramatic year for the security industry.  Vendors and security professionals should prepare for a sea change.   Here are my predictions for the year. 

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

The Biggest Risk to Security Might Be You...

April 04, 2010 Added by:Theresa Payton

Everyone asks me what the greatest theat to security is. They are visibly disappointed when I give them my answer...I believe it is you or maybe your co-worker.

Comments  (7)

49afa3a1bba5280af6c4bf2fb5ea7669

RSA March 2010 Intelligence Report

April 02, 2010 Added by:Mike Meikle

I’ve been ramping up with client projects over the last month so I haven’t been schedule some serious writing time. Excuses aside, I’m being lame it seems.  However, the latest RSA Intelligence Report has crossed my virtual desk, and I’m posting it for good measure

Comments  (0)

09e5dbdf8a3bd6dccce5621459b11e26

Vector 2 Security show - Windows Forensic Toolkit

April 01, 2010 Added by:Mark Bennett

Well everyone the Vector 2 Security Show here in Novi Michigan was a huge success! We had a large group that packed them out to standing room only in the back.

Comments  (0)


« First < Previous | 474 - 475 - 476 - 477 - 478 | Next > Last »