Blog Posts Tagged with "Security Awareness"


Lack of Security in Android Apps? That Could Be

December 02, 2012 Added by:Keith Mendoza

Have you ever installed an app in your Android phone and when you got to the permission screen you just couldn't justify to yourself why an app would require the permissions it's asking for?

Comments  (0)


Convenience vs. Security - Why convenience keeps winning

November 26, 2012 Added by:Rafal Los

Convenience wins in the consumer mind, easily. Even in the mind of someone who's security-minded convenience may win out over a little added risk. This is especially true if the card issuers are willing to take on the risk at the anticipation of higher revenue or profit...

Comments  (0)


What Makes My Passwords Vulnerable?

November 25, 2012 Added by:Robert Siciliano

Simple passwords: When 32 million passwords were exposed in a breach last year, almost 1% of victims were using 123456. The next most popular password was 12345. Other common choices are 111111, princess, qwerty, and abc123. Avoid these types of passwords, which are easily guessed...

Comments  (0)


You Believe It Because "I" Wrote It

November 14, 2012 Added by:Jim Palazzolo

Besides sheer entertainment, my objective is to practice my ability to create deception. It has been my observation that security personnel must be able to spot deception. Whether it’s covert channels or fake ID’s, deception is a very powerful tool that can be used both offensively and defensive...

Comments  (0)


Privacy in Ubuntu 12.10: Full Disk Encryption

November 12, 2012 Added by:Electronic Frontier Foundation

Full Disk Encryption (FDE) is one of the best ways you can ensure all of the private information on your laptop stays private in case it's lost, seized, stolen, or if you choose to sell or give away your computer in the future. This feature has been built-in to many GNU/Linux distributions, including Ubuntu...

Comments  (1)


Ubuntu Snafu: Privacy Is Hard, Let’s Go Shopping

November 10, 2012 Added by:Fergal Glynn

Amusingly, the plugin’s flood of attention means it is already racking up quite the bug count. For example, it does not currently do any NSFW prevention, and the results are returned in plaintext also. Have fun explaining that one to the ol’ boss-a-roni...

Comments  (0)


Joining hands against cybercrime in Africa

November 08, 2012 Added by:Plagiarist Paganini

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Comments  (0)


Cybersecurity Matters in The Election

November 05, 2012 Added by:Robert Siciliano

Whomever is elected president will face an unknown unseen digital enemy unlike any other president has seen in history. Think before you click. Know who’s on the other side of that instant message. What you say or do in cyberspace stays in cyberspace — for many to see, steal and use against you or your government...

Comments  (0)


Windows 8 Security in Action: Part 1

November 04, 2012 Added by:Dan Dieterle

Is Windows 8 the next operating system for your enterprise? In this article, we will take a quick look at Microsoft’s new OS – Windows 8. We will see some of the new security features that make it more secure than its predecessor Windows 7...

Comments  (0)


Does it Make Sense to Keep Changing Your Passwords?

October 31, 2012 Added by:Rafal Los

I'm running a small experiment on myself in which I've set up an account on a public, high-traffic web-based system out there that has a ton of my personal information. I've not changed my password in almost 6 months, but I still feel relatively good and certain that I am the only one who has access to my stuff...

Comments  (0)


Ask The Experts: Online Banking

October 24, 2012 Added by:Brent Huston

Instead of using your actual name as your login, why not use something different that is hard to guess and doesn’t reveal anything about your identity? It always pays to make it as tough on the cyber-criminals as possible..

Comments  (0)


Paying Lip Service (Mostly) to User Education

October 24, 2012 Added by:Fergal Glynn

The connection between improved security and user education is so well-established as to be almost axiomatic. Better technology, coding practices and testing can only accomplish so much. So what’s being done about the dearth of solid user education?

Comments  (13)


Hacktivists Using Shortened Links to Hide Malware Servers

October 15, 2012 Added by:Dan Dieterle

“Most did not recognise that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behaviour can be identified over time..."

Comments  (0)


It’s National Cyber Security Awareness Month

October 11, 2012 Added by:Robert Siciliano

There are few pseudo holiday celebration days or months that truly get my attention. But National Cyber Security Awareness Month is the one month a year that consumers are reminded by news reporters, government agencies, non-profits and companies that security is everyone’s responsibility...

Comments  (0)


Six Questions to Ask Before Posting to Social Networks

October 10, 2012 Added by:Rebecca Herold

Every day I see yet another situation where employees misused, abused or otherwise accused social media sites to the chagrin of their employers. Businesses need to make a coordinated effort, using a combination of policies, training and technology to mitigate the risks of workers using social media sites...

Comments  (0)


October Is National Cyber Security Month

October 01, 2012 Added by:Allan Pratt, MBA

No information is guaranteed to be 100% breach-free. You must be vigilant when it comes to knowing what information about you is online. No business entity is solely responsible for securing the Internet. You play the most important role in protecting your own digital life...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »