Items Tagged with "Security Awareness"


Kids, Social Media, Device Security, and Malware

September 22, 2010 Added by:Christopher Burgess

In 2010, back-to-school preparations no doubt will include a technology component, often times more than one technology. So here are a few safety tips to help your student stay safe as they prepare and use their electronic media devices back at school...

Comments  (0)


Cybercrime Victims Feel Ripped Off

September 20, 2010 Added by:Eli Talmor

Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...

Comments  (0)


Killer Computer Viruses

September 15, 2010 Added by:Robert Siciliano

Technology plays a role in many aspects of our lives, and when that technology is corrupted, the results can be disastrous. Consider the extent to which hospitals, banks, water treatment facilities, electrical grids, airports, gas stations, and even roads rely on technology...

Comments  (0)


Got Go Bag? Musings on Physical Security

September 10, 2010 Added by:shawn merdinger

While we most often think about security issues from the information protection viewpoint on Infosec Island, it's useful to review physical security scenarios. If you had to get up now and leave because of an emergency, what would you bring with you to survive for 72 hours with no support?

Comments  (2)


Monthly Security Blog Round-Up for August 2010

September 08, 2010 Added by:Anton Chuvakin

Blogs are stateless and people often pay attention only to what they see today. Thus a lot of useful security reading material gets lost. These monthly round-ups is my way of reminding people about interesting blog content. If you are too busy to read the blogs, at least read these...

Comments  (0)


Dr. InfoSec's Quotes of the Week (009)

September 06, 2010 Added by:Christophe Veltsos

Who said, "In the cyber world, if someone launches an attack, you might not be sure who is behind it and you don’t know what the intent is. In the military world, they make a distinction between information gathering and an actual attack..."?

Comments  (1)


Is Your Kid Ready for Email?

September 02, 2010 Added by:Theresa Payton

Eight hours a day! And we’re not talking about your work day. We’re talking about the time your kids spend surfing the net, on a smartphone, TV or electronic devices. Your kid also wants their own email account but is this smart or even safe?

Comments  (4)


Cyber Defense Weekly: USDAs $10m Cybersecurity Contract

August 31, 2010 Added by:Cyber Defense Weekly

Agriculture has been defined as part of the US' critical infrastructure. A $10 million award to ManTech for security monitoring, alerting, and response is small, but then USDA is one of the smaller Federal Agencies. Look for more such contracts here...

Comments  (0)


Secure Information Disposal Procedures

August 30, 2010 Added by:Bozidar Spirovski

Your organization bought computers, used them and now it's time to discard them. Most old hardware is donated to schools or is simply auctioned off. All that data contains a lot of confidential information, and it is essential that such data is properly erased so it cannot be recovered...

Comments  (0)


Security Awareness: Social Engineering Part One

August 30, 2010 Added by:Sean Inman

Like fraudsters generally, social engineers take advantage of human gullibility. In a corporate context, social engineering is a factor in many information security incidents, including those perpetrated by insiders...

Comments  (0)


What is Social Registration?

August 29, 2010 Added by:Robert Siciliano

Social registration is how each user has an established online identity. Over time, the user’s various identities begin to merge for purposes of shopping, communicating, and connecting. If one account is compromised, then the hacker accesses multiple accounts with a single hack...

Comments  (0)


Dr. InfoSec's Quotes of the Week (008)

August 27, 2010 Added by:Christophe Veltsos

Who said, with unintended irony, "I don't believe society understands what happens when everything is available, knowable and recorded by everyone all the time... I mean we really have to think about these things as a society...."?

Comments  (0)


Banks Need You to Partner in Security

August 27, 2010 Added by:Robert Siciliano

In the past decade, as much as 80% of all banking has taken place online, compared to the hundreds of years of traditional banking. Clearly, this is all about convenience. And it has become apparent that these conveniences of technology have outpaced consumers’ security intelligence...

Comments  (0)


Ten Most Dangerous Celebrities in Cyberspace

August 23, 2010 Added by:Robert Siciliano

For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web...

Comments  (0)


Dr. InfoSec's Quotes of the Week (007)

August 20, 2010 Added by:Christophe Veltsos

Who said: "If I look at enough of your messaging and your location, and use Artificial Intelligence, we can predict where you are going to go. Show us 14 photos of yourself and we can identify who you are. You think you don't have 14 photos of yourself on the Internet? You've got Facebook photos..."?

Comments  (0)


Summertime Scams and Identity Theft

August 14, 2010 Added by:Robert Siciliano

For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. this summer's hottest scams include:

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »