Security Awareness


Google Ordered to Produce Name of Cyberstalker

November 15, 2010 Added by:Robert Siciliano

Information Week reports that a New York judge has ordered Google to reveal the identity of a cyberstalker who has anonymously posted video and messages on the Internet. The videos included sexual slurs and damaging information that could affect the woman’s reputation and career...

Comments  (0)


5 Ways to Prevent Check Fraud Scams

November 02, 2010 Added by:Robert Siciliano

When checks or tax-related documents are stolen, either from the mail or by other means, the ink can be erased using common household chemicals such as nail polish remover. This allows the thieves to endorse checks to themselves...

Comments  (2)


Mom and Dad, It's Time To Get Secure

October 27, 2010 Added by:Niko DePofi

I know your computer is almost a foreign language, so I put together a decent, basic primer of how to keep your information safe when using a PC. This isn't all that can be done. There may never be a truly comprehensive list of what to do to stay safe, but this is a decent primer...

Comments  (0)


Essential Trust Analysis

October 26, 2010 Added by:Pete Herzog

In operational trust analysis, you learn to use logic and reason to make a trust decision. It is a new practice developed by ISECOM to explore operational trust in Trusted Computing as part of the EU's Open Trusted Computing (OpenTC) project...

Comments  (8)


Security Awareness Training - At Age 5?

October 23, 2010 Added by:Katie Weaver-Johnson

Before you hand over that phone to provide some extra entertainment when you get stuck in line at a restaurant, you may want to make sure all other applications are locked down, you have signed out of your email and other social networking sites...

Comments  (1)


Three Steps to Improve Your Data Security

October 21, 2010 Added by:Danny Lieberman

Maybe the time has come for people to think about their PCs like people think about cash. If you carry it around you have to protect it. If you lose cash – you can only blame yourself. If you got your pocket picked in the big city – you can only blame yourself...

Comments  (3)


Why Cyber Civil Defense Will Never Work

October 17, 2010 Added by:J. Oquendo

There seems to be some form of confusion. While the approach to defending the homeland may sound like a great idea, the actuality of it coming to light presents many issues and challenges that too many advocates are overlooking and do not fully understand...

Comments  (4)


Seminar to Feature ISECOM's OSSTMM v3

October 13, 2010 Added by:Anthony M. Freed

The OSSTMM is a peer-reviewed methodology for performing security tests and metrics divided into five channels: information and data controls, fraud and social engineering, computer and telecommunications networks, wireless devices, physical security access controls, and security processes...

Comments  (1)


Log Out, Log Out - I repeat, LOG OUT!

October 08, 2010 Added by:Robert Siciliano

One of the most common causes of data breaches is failure to properly log out of public PCs. Some PC admins install password managers that prompt the user to save login credentials. If you are on someone else’s PC and get this kind of pop-up, read it carefully before just clicking buttons...

Comments  (7)


Has The Threat of Cyberwar Been Grossly Exaggerated?

October 08, 2010 Added by:Danny Lieberman

While the DHS, NSA, FBI, CIA would have difficulty producing a single example of a real person being murdered by a piece of targeted malware – any Israeli you meet – including yours truly, has close friends or family who were killed by real wars and real terrorist...

Comments  (3)


Criminals Exploit Social Networks Like Facebook

October 06, 2010 Added by:Robert Siciliano

For a few years now I’ve been warning people about how vulnerable they are when they post their whereabouts in social media. And it looks like the bad-guy figured it out and is taking advantage of peoples naiveté...

Comments  (8)


Consumerization of IT and Enterprise Evolution

October 05, 2010 Added by:Phil Agcaoili

We have a problem with new disruptive technology and we need to treat all endpoint systems as hostile. New consumer technology that's brought into the workplace (a trend known as consumerization of IT), the consumer use of free or low-cost cloud services for the connected online life, and the enterprise shift towards the cloud for vertical business applications are rapidly affecting the way worker...

Comments  (0)


Do We Need Twelve Character Long Passwords?

October 02, 2010 Added by:PCI Guru

Are the days of eight character long passwords over? I have seen examples where current threats plus older threats could be used to compromise security. It was just all in how they were put together. It is very important that security professionals need to understand their opponent...

Comments  (5)


Debit Cards Fraud Means Difficult Recovery

September 28, 2010 Added by:Robert Siciliano

Debit card fraud can happen a number of ways. ATM skimming, gas pump skimming, or point of sale skimming are a few. The key, of course, is the bad guy gets your PIN. In the end, the bank doesn’t want to believe that you were defrauded. It’s cheaper for them to conclude that you are lying...

Comments  (2)


Tales From a Non-Security Professional End User

September 28, 2010 Added by:Brent Huston

I remember when I thought: Information security? Sure. A bunch of geeks patrolling their networks. I had seen the movie Hackers, after all. I had no idea of the breadth and depth of information security. Any piece of technology that you use that has sensitive data stored can be stolen...

Comments  (0)


Are You Your Own Chief Security Officer?

September 25, 2010 Added by:Robert Siciliano

In my home environment, I’m the CSO. My belief is everyone has a job to do in personal safety. No matter what, you must protect yourself and family from the bad-guy. The hard part about this part time job is it requires a bit of thought...

Comments  (2)

Page « < 48 - 49 - 50 - 51 - 52 > »