Blog Posts Tagged with "Security"

37d5f81e2277051bc17116221040d51c

Leaked Social Security Numbers Put Personal Security at Risk

November 30, 2010 Added by:Robert Siciliano

Every city, state, and town has its own set of regulations determining the collection and management of public records, including birth, death, marriage, court, property, and business filings. Many of these documents include Social Security numbers. And many are posted on the Internet...

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

WikiLeaks is Doing the Security Profession a Favor

November 29, 2010 Added by:Mark Gardner

What it does highlight though, is the need for pragmatic, effective security controls to be in place, allegedly, these releases were only possibly because the Siprnet database security controls were relaxed to make the system as easy to use as possible...

Comments  (5)

7e6249b5c7f6b63c28587c820b16edcb

Searching for Airline Security Part Deux

November 29, 2010 Added by:Robert Gezelter

TSA has a mission to create a safe environment in the air; at the same time, passengers, flight crew, and airport personnel have a reasonable expectation that their short-term and long-term well-being, physical and psychological, will not be sacrificed in the process...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US and EU Partner on Cyber Wargames and Security Plans

November 24, 2010 Added by:Headlines

The US and EU recently conducted cyber wargames, and have announced plans to cooperate on addressing a range of cyber security issues. The security exercises included participants from the private sector, and were focused on coordinated responses to cyber-related threat scenarios...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Seven Tips for Better Credit Card Security

November 24, 2010 Added by:Robert Siciliano

Every time you use a credit or debit card you increase the chances of that card number being used fraudulently. Cards can be skimmed and hacked in a number of different ways. Whenever you hand your card to a salesperson or waiter, watch where your card is taken and what is done with it...

Comments  (7)

7e6249b5c7f6b63c28587c820b16edcb

Searching for Airline Security

November 22, 2010 Added by:Robert Gezelter

Bruce Schneier has often observed that security theatre can be counterproductive; resources are expended without truly increasing security. Costly scanners that invade privacy while not accomplishing the purpose intended take this discussion to a whole new level...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Are Security Efforts Decreasing Successful DoD Hacks?

November 22, 2010 Added by:Headlines

Other reports indicate that the frequency of attacks as a whole are on the uptick. Given the weight of the evidence concerning current trends, the most likely explanation is that the decrease is due to a semantic change in the reporting standards used at the DoD as opposed to a decrease in the attacks...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Laptop and Cell Phone Data Searched at Airport

November 22, 2010 Added by:Anthony M. Freed

Your computer and cellphone data can be searched by customs officials. If it is really the case that authorities can act as if our Constitutional rights end at the airport terminal, we have much bigger problems than naked body scans and groping screeners touching our junk...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

People Remain the Number One Threat to Security

November 21, 2010 Added by:Headlines

All the security, training, planning and education in the world can not seem to defend against the human element, and this fact presents the single largest obstacle to security for individuals, enterprise, and government. Here are just a few examples from this week alone...

Comments  (0)

Page « < 14 - 15 - 16 - 17 - 18 > »