Items Tagged with "Security Awareness"


94ae16c30d35ee7345f3235dfb11113c

Social Media vs. Old School

April 11, 2012 Added by:Joel Harding

As I’ve stumbled through the discovery process of social media I have also uncovered a myriad of problems. I got a phone call from a great friend in the Pentagon warning me that someone was posing as a PSYOP senior and trying to make contacts through LinkedIn...

Comments  (0)

37d5f81e2277051bc17116221040d51c

On Location-Based Services Security

April 09, 2012 Added by:Robert Siciliano

Social networking sites are incorporating location-based services that allow users to broadcast their locations. Carnegie Mellon University has identified more than 80 services that either lack privacy policies or collect and save user data for an indefinite period...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Barbara Tuchman and Compliance Programs

April 04, 2012 Added by:Thomas Fox

Compliance professionals are continually try to get the message out at corporations. Here is some wisdom that Tuchman advocated and how it might help the compliance professional convey the essence of doing business in compliance across a corporation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: Don’t be Fooled by Too Good to be True Websites

April 03, 2012 Added by:Headlines

According to a recent report, the fan craze created by the film The Hunger Games has created the perfect opportunity for devious cybercriminals to take advantage of Internet users. While clicking on a link may seem innocent enough, it can actually infect your device...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Mind Control Security Awareness

April 03, 2012 Added by:Pete Herzog

ISECOM's SmarterSaferBetter seminar teaches you to actively keep on re-filtering. Doing it right by being alerted to prompts is the best way to keep your guard up, because actively filtering your world is truly exhausting. And being tired is when we make security mistakes...

Comments  (4)

296634767383f056e82787fcb3b94864

Cyber Self Defense For Non-Geeks

March 28, 2012 Added by:Jeffrey Carr

These principles won’t be sufficient when you’re in high-risk locales and they won’t stop a targeted attack, but they will make it less likely that you’ll suffer a serious breach because of poor security habits or over-reliance on antivirus or firewall applications...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Security's Achilles Heel

March 16, 2012 Added by:Rafal Los

Have you ever wondered why enterprise security people are so downtrodden? Baffled by the impossible arrogance of penetration testers when they laugh at corporate security postures? The bottom line: people have always been and will always be the Achilles heel...

Comments  (0)

37d5f81e2277051bc17116221040d51c

I Found Your Data on that Used Device You Sold...

March 14, 2012 Added by:Robert Siciliano

What did you do with all of your old devices? Some were probably given away, or you might have hocked a few on eBay or Craigslist. Did you know it is very likely that you inadvertently put all of your digital data in someone else’s hands?

Comments  (0)

F29746c6cb299c1755e4087e6126a816

FTC Says Tax Fraud is On the Rise and Here's Why

March 11, 2012 Added by:Kelly Colgan

Used to be crooks snagged a Social Security number to open a credit card and run up charges. Now they've found an easier way to make money, according to the FTC: Identity thieves prefer to commit tax and wage-related fraud...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

It's not Illegal if You Consent: Malware's Dirty Little Tricks

March 08, 2012 Added by:Rafal Los

Bad guys often rely on the end-user's lack of awareness, employing some dirty tricks like creating a convincing web page that looks just like your antivirus software, or something equally dastardly. But there's another trick that makes me crazy: End User License Agreements...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

A Quick Look at Spear Phishing via SurveyMonkey

March 05, 2012

Many people who respond to these surveys are oblivious to what is going on and think that their answers are confidential. That may be the case with a legitimate survey, except when a phisher is using the system. Here is a quick example of how this attack is conducted...

Comments  (0)

82ac4cd789b46af43c0cde730625317e

How to Protect Yourself from Skimmers

February 28, 2012 Added by:Christopher Rodgers

When you swipe your credit or debit card, are you handing over your personal information to criminals? Skimming is a process scammers use to steal credit or debit card information. Scammers use devices called skimmers to accomplish skimming in everyday transactions...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Will Tarkington on Human Hacking Techniques

February 28, 2012

Will Tarkington presented an overview of the common techniques used by con men, psychics, spiritualists, and salesmen. The talk covered a wide range of cold, warm, subtle expressions, Barnum statements, selective memory, and body language...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Hosts Federal Infosec Educators Conference

February 13, 2012 Added by:Headlines

FISSEA is responsible for promoting cybersecurity awareness, training and education. The annual meeting is geared toward both new and seasoned security officers, IT managers, information security educators and researchers, cybersecurity trainers and teachers...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Security Weekly News Roundup: Tunnel Vision

February 11, 2012 Added by:Fergal Glynn

As security professionals do we all just suffer from “security tunnel vision” or is something major shifting in our industry? Is it all just related to the significant rise in hacktivism or the 24-hour news cycle requiring that every little thing become a news story?

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Insecure At Any Speed

February 09, 2012 Added by:Wendy Nather

Security is an afterthought, and a bad one at that. As long as it remains separate from the systems it's supposed to protect, instead of an attribute, and requires users to maintain an abnormal level of awareness, security is going to continue to be as bad as it is today...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »