Items Tagged with "Security Awareness"


Summertime Scams and Identity Theft

August 14, 2010 Added by:Robert Siciliano

For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. this summer's hottest scams include:

Comments  (0)


Cyber Defense Weekly: Israel Pursues E-Warfare

August 12, 2010 Added by:Cyber Defense Weekly

The cyber attack capability was supposedly demonstrated by the US Suter Program, described as firing "data beams packed with exploitative algorithms into antennae arrays" that would grant the attacker administrator access...

Comments  (0)


How Much Private Information Do you Reveal?

August 11, 2010 Added by:Guy Pace

Friends are a good thing. But when it comes to social networking, adding friends to your account just increases the channels through which your private or embarrassing information is leaked to a wider audience or the general public...

Comments  (0)


Virtual doors Keep Out the Uninvited

August 11, 2010 Added by:Christopher Burgess

Your connected devices allow you the opportunity to literally bring the world to your doorstep. There exists unfortunately, a malicious minority of individuals, as well as, organized criminal entities which prey on those of us whose online virtual doors are invitingly open...

Comments  (0)


Dr. InfoSec's Quotes of the Week (006)

August 09, 2010 Added by:Christophe Veltsos

Who said: "The cybercrime ecosystem continues to thrive without the need for zero day flaws, and it will continue to as long as millions of end users continue getting exploited with 6+ months old flaws..."?

Comments  (0)


School Directors Face Background Checks

August 07, 2010 Added by:Robert Siciliano

A new bill in New Jersey would disqualify school board members from serving if they’ve been convicted of serious crimes. Further, it would require them to pay for the cost to get background checks themselves or with campaign money...

Comments  (0)


Incident Response Plans and Catching Kittens

August 06, 2010 Added by:Bill Wildprett, CISSP, CISA

Reflecting on this episode, I thought about how I’d been taught about incident response by SANS Institute instructors. The acronym I learned is PICERL; Preparation, Identification, Containment, Eradication, Recovery, Lessons-learned...

Comments  (3)


Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)


Dr. InfoSec's Quotes of the Week (005)

August 04, 2010 Added by:Christophe Veltsos

Who said: "Eventually, virus writers will realize it is easier to make money by infecting phones than it is by infecting computers... And, of course, there are more phones on this planet than there are computers..."?

Comments  (0)


The Naked Truth About Body Scanners

August 04, 2010 Added by:Ron Baklarz

Contrary to the Transportation Security Administration's insistence that scanned body images cannot be recorded, it seems they are being retained by the machines. The U.S. Marshals Service said it has saved somewhere tens of thousands of images at a single courthouse...

Comments  (0)


Congress Proposes Sales Tax For Internet Sales

August 04, 2010 Added by:Michael Volkov

So far, 23 states have adopted streamlined tax systems to collect taxes and generate revenues, RILA said. Critics of the change argue closing the loophole on purchases made over the Internet would mean a tax increase for Americans...

Comments  (1)


Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)


The Windows Support Scam

July 30, 2010 Added by:Simon Heron

Recent articles published in the Guardian have revealed that fraudsters are continuing to cold call people, claiming to be a Windows support tech and getting the users to give them remote access to their PCs...

Comments  (3)


US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)


Effective WiFi Neighborhood Watch Programs

July 26, 2010 Added by:Christopher Burgess

Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...

Comments  (0)


What To Do With Old Hard Disks

July 26, 2010 Added by:Rod MacPherson

If you keep your old hard disk you will always have access to it as a point in time backup of what your old system had installed and what files you had at the time of your upgrade...

Comments  (3)

Page « < 13 - 14 - 15 - 16 - 17 > »