Items Tagged with "Security Awareness"


6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Israel Pursues E-Warfare

August 12, 2010 Added by:Cyber Defense Weekly

The cyber attack capability was supposedly demonstrated by the US Suter Program, described as firing "data beams packed with exploitative algorithms into antennae arrays" that would grant the attacker administrator access...

Comments  (0)

9fd81843ad7f202f26c1a174c7357585

How Much Private Information Do you Reveal?

August 11, 2010 Added by:Guy Pace

Friends are a good thing. But when it comes to social networking, adding friends to your account just increases the channels through which your private or embarrassing information is leaked to a wider audience or the general public...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Virtual doors Keep Out the Uninvited

August 11, 2010 Added by:Christopher Burgess

Your connected devices allow you the opportunity to literally bring the world to your doorstep. There exists unfortunately, a malicious minority of individuals, as well as, organized criminal entities which prey on those of us whose online virtual doors are invitingly open...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (006)

August 09, 2010 Added by:Christophe Veltsos

Who said: "The cybercrime ecosystem continues to thrive without the need for zero day flaws, and it will continue to as long as millions of end users continue getting exploited with 6+ months old flaws..."?

Comments  (0)

37d5f81e2277051bc17116221040d51c

School Directors Face Background Checks

August 07, 2010 Added by:Robert Siciliano

A new bill in New Jersey would disqualify school board members from serving if they’ve been convicted of serious crimes. Further, it would require them to pay for the cost to get background checks themselves or with campaign money...

Comments  (0)

0f48ebb4a6ca02dbf5141affdbfa6898

Incident Response Plans and Catching Kittens

August 06, 2010 Added by:Bill Wildprett, CISSP, CISA

Reflecting on this episode, I thought about how I’d been taught about incident response by SANS Institute instructors. The acronym I learned is PICERL; Preparation, Identification, Containment, Eradication, Recovery, Lessons-learned...

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (005)

August 04, 2010 Added by:Christophe Veltsos

Who said: "Eventually, virus writers will realize it is easier to make money by infecting phones than it is by infecting computers... And, of course, there are more phones on this planet than there are computers..."?

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

The Naked Truth About Body Scanners

August 04, 2010 Added by:Ron Baklarz

Contrary to the Transportation Security Administration's insistence that scanned body images cannot be recorded, it seems they are being retained by the machines. The U.S. Marshals Service said it has saved somewhere tens of thousands of images at a single courthouse...

Comments  (0)

D53ddb574ebf68fcd3a4fcc6d5fb257a

Congress Proposes Sales Tax For Internet Sales

August 04, 2010 Added by:Michael Volkov

So far, 23 states have adopted streamlined tax systems to collect taxes and generate revenues, RILA said. Critics of the change argue closing the loophole on purchases made over the Internet would mean a tax increase for Americans...

Comments  (1)

63b96d79afc327c98a13c614670feca0

Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

The Windows Support Scam

July 30, 2010 Added by:Simon Heron

Recent articles published in the Guardian have revealed that fraudsters are continuing to cold call people, claiming to be a Windows support tech and getting the users to give them remote access to their PCs...

Comments  (3)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)

16443e0c6f6e4a400fd0164b3c406170

Effective WiFi Neighborhood Watch Programs

July 26, 2010 Added by:Christopher Burgess

Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...

Comments  (0)

314f19f082e69886c20e31c70fe6dceb

What To Do With Old Hard Disks

July 26, 2010 Added by:Rod MacPherson

If you keep your old hard disk you will always have access to it as a point in time backup of what your old system had installed and what files you had at the time of your upgrade...

Comments  (3)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (004)

July 25, 2010 Added by:Christophe Veltsos

Who said: "Anyone who visits a social networking site should know that it's a business model. The service is not free. We users pay for it with our private data..."?

Comments  (1)

Page « < 13 - 14 - 15 - 16 - 17 > »