Security Awareness


Debit Cards Fraud Means Difficult Recovery

September 28, 2010 Added by:Robert Siciliano

Debit card fraud can happen a number of ways. ATM skimming, gas pump skimming, or point of sale skimming are a few. The key, of course, is the bad guy gets your PIN. In the end, the bank doesn’t want to believe that you were defrauded. It’s cheaper for them to conclude that you are lying...

Comments  (2)


Tales From a Non-Security Professional End User

September 28, 2010 Added by:Brent Huston

I remember when I thought: Information security? Sure. A bunch of geeks patrolling their networks. I had seen the movie Hackers, after all. I had no idea of the breadth and depth of information security. Any piece of technology that you use that has sensitive data stored can be stolen...

Comments  (0)


Are You Your Own Chief Security Officer?

September 25, 2010 Added by:Robert Siciliano

In my home environment, I’m the CSO. My belief is everyone has a job to do in personal safety. No matter what, you must protect yourself and family from the bad-guy. The hard part about this part time job is it requires a bit of thought...

Comments  (2)


Kids, Social Media, Device Security, and Malware

September 22, 2010 Added by:Christopher Burgess

In 2010, back-to-school preparations no doubt will include a technology component, often times more than one technology. So here are a few safety tips to help your student stay safe as they prepare and use their electronic media devices back at school...

Comments  (0)


More ATM Skimmers Being Used By Gangs

September 20, 2010 Added by:Robert Siciliano

A report issued by the FTC finds that customers in the process of withdrawing cash from ATMs are more likely to be victims of ATM fraud than a direct, physical crime, and skimmer devices have recently been found on gas pumps and ATMs throughout Northern California...

Comments  (1)


Cybercrime Victims Feel Ripped Off

September 20, 2010 Added by:Eli Talmor

Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...

Comments  (0)


Where's Your Data and Can You Get To It?

September 16, 2010 Added by:Christopher Burgess

My inspection to revealed that the motherboard was toast. My initial reaction was one relief it wasn't the hard drive, and I glowed knowing that I had a multi-drive data backup regime. Then I realized that while I had thought through the protection of data, I couldn't get to it. I was offline...

Comments  (0)


Internet Security Alliance News and Upcoming Events

September 15, 2010 Added by:Marjorie Morgan

The Internet Security Alliance (ISA) is a unique multi-sector trade association which provides thought leadership and strong public policy advocacy as well as business and technical services to its membership. The ISA represents enterprises from the aviation, banking, communications, defense, education, financial services, insurance, manufacturing, security, and technology industries. ISA’s mi...

Comments  (0)


Got Go Bag? Musings on Physical Security

September 10, 2010 Added by:shawn merdinger

While we most often think about security issues from the information protection viewpoint on Infosec Island, it's useful to review physical security scenarios. If you had to get up now and leave because of an emergency, what would you bring with you to survive for 72 hours with no support?

Comments  (2)


Monthly Security Blog Round-Up for August 2010

September 08, 2010 Added by:Anton Chuvakin

Blogs are stateless and people often pay attention only to what they see today. Thus a lot of useful security reading material gets lost. These monthly round-ups is my way of reminding people about interesting blog content. If you are too busy to read the blogs, at least read these...

Comments  (0)


Is Your Kid Ready for Email?

September 02, 2010 Added by:Theresa Payton

Eight hours a day! And we’re not talking about your work day. We’re talking about the time your kids spend surfing the net, on a smartphone, TV or electronic devices. Your kid also wants their own email account but is this smart or even safe?

Comments  (4)


Top Seven Social Media Landmines

August 31, 2010 Added by:Robert Siciliano

The basis for much of social media identity theft revolves around social engineering. When a profile claims to represent a certain person or brand, it is generally taken at face value. Lies propagated from such a credible source are likely to be taken as fact for quite a long time, if not indefinitely...

Comments  (0)


What is Social Registration?

August 29, 2010 Added by:Robert Siciliano

Social registration is how each user has an established online identity. Over time, the user’s various identities begin to merge for purposes of shopping, communicating, and connecting. If one account is compromised, then the hacker accesses multiple accounts with a single hack...

Comments  (0)


Cyberwarfare - Fact or Fiction?

August 27, 2010 Added by:Theresa Payton

The conflict is not in disputing the vulnerability of network infrastructure or cyber attacks on numerous corporations and nations, but rather the definition of cyberwar. Both camps will need to come to a consensus in order for the U.S. to work towards a more secure future...

Comments  (0)


Banks Need You to Partner in Security

August 27, 2010 Added by:Robert Siciliano

In the past decade, as much as 80% of all banking has taken place online, compared to the hundreds of years of traditional banking. Clearly, this is all about convenience. And it has become apparent that these conveniences of technology have outpaced consumers’ security intelligence...

Comments  (0)


E-Discovery: Other Shoe Drops in Adams v. Dell

August 25, 2010 Added by:David Navetta

In one of the most watched and controversial electronic discovery cases from 2009, the federal court in Utah held that the defendant Asus Computer International had violated their duty to keep certain electronic and paper documents relevant to a federal action for alleged patent infringement...

Comments  (0)

Page « < 48 - 49 - 50 - 51 - 52 > »