Blog Posts Tagged with "Security Awareness"


Security Awareness: Social Engineering Part One

August 30, 2010 Added by:Sean Inman

Like fraudsters generally, social engineers take advantage of human gullibility. In a corporate context, social engineering is a factor in many information security incidents, including those perpetrated by insiders...

Comments  (0)


What is Social Registration?

August 29, 2010 Added by:Robert Siciliano

Social registration is how each user has an established online identity. Over time, the user’s various identities begin to merge for purposes of shopping, communicating, and connecting. If one account is compromised, then the hacker accesses multiple accounts with a single hack...

Comments  (0)


Dr. InfoSec's Quotes of the Week (008)

August 27, 2010 Added by:Christophe Veltsos

Who said, with unintended irony, "I don't believe society understands what happens when everything is available, knowable and recorded by everyone all the time... I mean we really have to think about these things as a society...."?

Comments  (0)


Banks Need You to Partner in Security

August 27, 2010 Added by:Robert Siciliano

In the past decade, as much as 80% of all banking has taken place online, compared to the hundreds of years of traditional banking. Clearly, this is all about convenience. And it has become apparent that these conveniences of technology have outpaced consumers’ security intelligence...

Comments  (0)


Ten Most Dangerous Celebrities in Cyberspace

August 23, 2010 Added by:Robert Siciliano

For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web...

Comments  (0)


Dr. InfoSec's Quotes of the Week (007)

August 20, 2010 Added by:Christophe Veltsos

Who said: "If I look at enough of your messaging and your location, and use Artificial Intelligence, we can predict where you are going to go. Show us 14 photos of yourself and we can identify who you are. You think you don't have 14 photos of yourself on the Internet? You've got Facebook photos..."?

Comments  (0)


Summertime Scams and Identity Theft

August 14, 2010 Added by:Robert Siciliano

For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. this summer's hottest scams include:

Comments  (0)


Cyber Defense Weekly: Israel Pursues E-Warfare

August 12, 2010 Added by:Cyber Defense Weekly

The cyber attack capability was supposedly demonstrated by the US Suter Program, described as firing "data beams packed with exploitative algorithms into antennae arrays" that would grant the attacker administrator access...

Comments  (0)


How Much Private Information Do you Reveal?

August 11, 2010 Added by:Guy Pace

Friends are a good thing. But when it comes to social networking, adding friends to your account just increases the channels through which your private or embarrassing information is leaked to a wider audience or the general public...

Comments  (0)


Virtual doors Keep Out the Uninvited

August 11, 2010 Added by:Christopher Burgess

Your connected devices allow you the opportunity to literally bring the world to your doorstep. There exists unfortunately, a malicious minority of individuals, as well as, organized criminal entities which prey on those of us whose online virtual doors are invitingly open...

Comments  (0)


Dr. InfoSec's Quotes of the Week (006)

August 09, 2010 Added by:Christophe Veltsos

Who said: "The cybercrime ecosystem continues to thrive without the need for zero day flaws, and it will continue to as long as millions of end users continue getting exploited with 6+ months old flaws..."?

Comments  (0)


School Directors Face Background Checks

August 07, 2010 Added by:Robert Siciliano

A new bill in New Jersey would disqualify school board members from serving if they’ve been convicted of serious crimes. Further, it would require them to pay for the cost to get background checks themselves or with campaign money...

Comments  (0)


Incident Response Plans and Catching Kittens

August 06, 2010 Added by:Bill Wildprett, CISSP, CISA

Reflecting on this episode, I thought about how I’d been taught about incident response by SANS Institute instructors. The acronym I learned is PICERL; Preparation, Identification, Containment, Eradication, Recovery, Lessons-learned...

Comments  (3)


Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)


Dr. InfoSec's Quotes of the Week (005)

August 04, 2010 Added by:Christophe Veltsos

Who said: "Eventually, virus writers will realize it is easier to make money by infecting phones than it is by infecting computers... And, of course, there are more phones on this planet than there are computers..."?

Comments  (0)


The Naked Truth About Body Scanners

August 04, 2010 Added by:Ron Baklarz

Contrary to the Transportation Security Administration's insistence that scanned body images cannot be recorded, it seems they are being retained by the machines. The U.S. Marshals Service said it has saved somewhere tens of thousands of images at a single courthouse...

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »