Items Tagged with "Security Awareness"


16443e0c6f6e4a400fd0164b3c406170

Kids, Social Media, Device Security, and Malware

September 22, 2010 Added by:Christopher Burgess

In 2010, back-to-school preparations no doubt will include a technology component, often times more than one technology. So here are a few safety tips to help your student stay safe as they prepare and use their electronic media devices back at school...

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

Cybercrime Victims Feel Ripped Off

September 20, 2010 Added by:Eli Talmor

Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Killer Computer Viruses

September 15, 2010 Added by:Robert Siciliano

Technology plays a role in many aspects of our lives, and when that technology is corrupted, the results can be disastrous. Consider the extent to which hospitals, banks, water treatment facilities, electrical grids, airports, gas stations, and even roads rely on technology...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Got Go Bag? Musings on Physical Security

September 10, 2010 Added by:shawn merdinger

While we most often think about security issues from the information protection viewpoint on Infosec Island, it's useful to review physical security scenarios. If you had to get up now and leave because of an emergency, what would you bring with you to survive for 72 hours with no support?

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

Monthly Security Blog Round-Up for August 2010

September 08, 2010 Added by:Anton Chuvakin

Blogs are stateless and people often pay attention only to what they see today. Thus a lot of useful security reading material gets lost. These monthly round-ups is my way of reminding people about interesting blog content. If you are too busy to read the blogs, at least read these...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (009)

September 06, 2010 Added by:Christophe Veltsos

Who said, "In the cyber world, if someone launches an attack, you might not be sure who is behind it and you don’t know what the intent is. In the military world, they make a distinction between information gathering and an actual attack..."?

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

Is Your Kid Ready for Email?

September 02, 2010 Added by:Theresa Payton

Eight hours a day! And we’re not talking about your work day. We’re talking about the time your kids spend surfing the net, on a smartphone, TV or electronic devices. Your kid also wants their own email account but is this smart or even safe?

Comments  (4)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: USDAs $10m Cybersecurity Contract

August 31, 2010 Added by:Cyber Defense Weekly

Agriculture has been defined as part of the US' critical infrastructure. A $10 million award to ManTech for security monitoring, alerting, and response is small, but then USDA is one of the smaller Federal Agencies. Look for more such contracts here...

Comments  (0)

E973b16363b3de77b360563237df7e32

Secure Information Disposal Procedures

August 30, 2010 Added by:Bozidar Spirovski

Your organization bought computers, used them and now it's time to discard them. Most old hardware is donated to schools or is simply auctioned off. All that data contains a lot of confidential information, and it is essential that such data is properly erased so it cannot be recovered...

Comments  (0)

C7159a557369b66632c4b54bf746b69e

Security Awareness: Social Engineering Part One

August 30, 2010 Added by:Sean Inman

Like fraudsters generally, social engineers take advantage of human gullibility. In a corporate context, social engineering is a factor in many information security incidents, including those perpetrated by insiders...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What is Social Registration?

August 29, 2010 Added by:Robert Siciliano

Social registration is how each user has an established online identity. Over time, the user’s various identities begin to merge for purposes of shopping, communicating, and connecting. If one account is compromised, then the hacker accesses multiple accounts with a single hack...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (008)

August 27, 2010 Added by:Christophe Veltsos

Who said, with unintended irony, "I don't believe society understands what happens when everything is available, knowable and recorded by everyone all the time... I mean we really have to think about these things as a society...."?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Banks Need You to Partner in Security

August 27, 2010 Added by:Robert Siciliano

In the past decade, as much as 80% of all banking has taken place online, compared to the hundreds of years of traditional banking. Clearly, this is all about convenience. And it has become apparent that these conveniences of technology have outpaced consumers’ security intelligence...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Ten Most Dangerous Celebrities in Cyberspace

August 23, 2010 Added by:Robert Siciliano

For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (007)

August 20, 2010 Added by:Christophe Veltsos

Who said: "If I look at enough of your messaging and your location, and use Artificial Intelligence, we can predict where you are going to go. Show us 14 photos of yourself and we can identify who you are. You think you don't have 14 photos of yourself on the Internet? You've got Facebook photos..."?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Summertime Scams and Identity Theft

August 14, 2010 Added by:Robert Siciliano

For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. this summer's hottest scams include:

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »