Security Awareness

16443e0c6f6e4a400fd0164b3c406170

Kids, Social Media, Device Security, and Malware

September 22, 2010 Added by:Christopher Burgess

In 2010, back-to-school preparations no doubt will include a technology component, often times more than one technology. So here are a few safety tips to help your student stay safe as they prepare and use their electronic media devices back at school...

Comments  (0)

37d5f81e2277051bc17116221040d51c

More ATM Skimmers Being Used By Gangs

September 20, 2010 Added by:Robert Siciliano

A report issued by the FTC finds that customers in the process of withdrawing cash from ATMs are more likely to be victims of ATM fraud than a direct, physical crime, and skimmer devices have recently been found on gas pumps and ATMs throughout Northern California...

Comments  (1)

7af56c65866a442699d6dd1dfb02b528

Cybercrime Victims Feel Ripped Off

September 20, 2010 Added by:Eli Talmor

Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Where's Your Data and Can You Get To It?

September 16, 2010 Added by:Christopher Burgess

My inspection to revealed that the motherboard was toast. My initial reaction was one relief it wasn't the hard drive, and I glowed knowing that I had a multi-drive data backup regime. Then I realized that while I had thought through the protection of data, I couldn't get to it. I was offline...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance News and Upcoming Events

September 15, 2010 Added by:Marjorie Morgan

The Internet Security Alliance (ISA) is a unique multi-sector trade association which provides thought leadership and strong public policy advocacy as well as business and technical services to its membership. The ISA represents enterprises from the aviation, banking, communications, defense, education, financial services, insurance, manufacturing, security, and technology industries. ISA’s mi...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Got Go Bag? Musings on Physical Security

September 10, 2010 Added by:shawn merdinger

While we most often think about security issues from the information protection viewpoint on Infosec Island, it's useful to review physical security scenarios. If you had to get up now and leave because of an emergency, what would you bring with you to survive for 72 hours with no support?

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

Monthly Security Blog Round-Up for August 2010

September 08, 2010 Added by:Anton Chuvakin

Blogs are stateless and people often pay attention only to what they see today. Thus a lot of useful security reading material gets lost. These monthly round-ups is my way of reminding people about interesting blog content. If you are too busy to read the blogs, at least read these...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Is Your Kid Ready for Email?

September 02, 2010 Added by:Theresa Payton

Eight hours a day! And we’re not talking about your work day. We’re talking about the time your kids spend surfing the net, on a smartphone, TV or electronic devices. Your kid also wants their own email account but is this smart or even safe?

Comments  (4)

37d5f81e2277051bc17116221040d51c

Top Seven Social Media Landmines

August 31, 2010 Added by:Robert Siciliano

The basis for much of social media identity theft revolves around social engineering. When a profile claims to represent a certain person or brand, it is generally taken at face value. Lies propagated from such a credible source are likely to be taken as fact for quite a long time, if not indefinitely...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What is Social Registration?

August 29, 2010 Added by:Robert Siciliano

Social registration is how each user has an established online identity. Over time, the user’s various identities begin to merge for purposes of shopping, communicating, and connecting. If one account is compromised, then the hacker accesses multiple accounts with a single hack...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cyberwarfare - Fact or Fiction?

August 27, 2010 Added by:Theresa Payton

The conflict is not in disputing the vulnerability of network infrastructure or cyber attacks on numerous corporations and nations, but rather the definition of cyberwar. Both camps will need to come to a consensus in order for the U.S. to work towards a more secure future...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Banks Need You to Partner in Security

August 27, 2010 Added by:Robert Siciliano

In the past decade, as much as 80% of all banking has taken place online, compared to the hundreds of years of traditional banking. Clearly, this is all about convenience. And it has become apparent that these conveniences of technology have outpaced consumers’ security intelligence...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

E-Discovery: Other Shoe Drops in Adams v. Dell

August 25, 2010 Added by:David Navetta

In one of the most watched and controversial electronic discovery cases from 2009, the federal court in Utah held that the defendant Asus Computer International had violated their duty to keep certain electronic and paper documents relevant to a federal action for alleged patent infringement...

Comments  (0)

4e714dc795dc50b932e2a837e3efc472

Security Patents Invite Hacker Exploitations

August 24, 2010 Added by:Joe Morrissey

If you had devised a new, novel, non-obvious lock for protecting your house – would you give thieves a drawing of the lock so they could fabricate a key? No, bloody right you wouldn’t – nor would I. But in filing a patent, that is exactly what we would be required to do...

Comments  (17)

37d5f81e2277051bc17116221040d51c

Ten Most Dangerous Celebrities in Cyberspace

August 23, 2010 Added by:Robert Siciliano

For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Data Security Breaches Wreak Havoc

August 23, 2010 Added by:Danny Lieberman

I am at a loss to understand why the US needs another data security bill. Looking at data security as an exercise in providing cost effect security countermeasures, it appears to me that the bill is most likely either a public relations play or congressional logrolling...

Comments  (1)

Page « < 49 - 50 - 51 - 52 - 53 > »