Security Awareness

7ac151cecb6d5053d7cf4c7fa1ac596e

Data Security - It's a responsibility, not an option...

April 07, 2010 Added by:Ian Barrs

"We need to talk about security, it's becoming an issue." This is a line that would draw a blank on many a CEOs face, even today. "We've got strong password policies, and no-one's allowed to use USBs", the CEO may burble. If that's your last line of defence, and you merely trust people to follow the rules, you're heading for trouble.

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Passwords…Are they needed?

April 06, 2010 Added by:Katie Weaver-Johnson

This week I received an e-mail from a friend of mine saying he was in the UK to visit his ill sister and needed to borrow money…perhaps many of you have received an e-mail like this too?  In reality, my friend’s e-mail account had been hacked and the e-mail was a hoax.

Comments  (5)

37d5f81e2277051bc17116221040d51c

Is That Portable Device a Data Hazard?

April 06, 2010 Added by:Robert Siciliano

According to a survey  of London and New York City taxi companies last year revealed that more than 12,500 devices, such as laptops, iPods and memory sticks, are forgotten in taxis every six months. Portable devices that may have troves of sensitive data.

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

Gangs Are Targeting Your Kids Via the Internet

April 05, 2010 Added by:Theresa Payton

Word for the Week: Cyber Banging. Also called Net Banging - This refers to the internet recruiting process that gangs use to target kids. Gangs typically target high school and middle school kids but there are cases where kids as young as 8 have been recruited.

Comments  (2)

49afa3a1bba5280af6c4bf2fb5ea7669

Quandary of Social Media Security

April 05, 2010 Added by:Mike Meikle

I was recently asked a question regarding the top IT concerns for social media (Web 2.0) implementation plan. Well, in my view information security is at the top.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Beware of Door to Door Conmen

April 05, 2010 Added by:Robert Siciliano

There are bazillion scammers using a bazillion ruses to get your money. The lowest of the low are the ones who scam the elderly. These same conmen often do it door to door and can be very dangerous. Con men posing as city employees seem to be the most effective scam. In one incident 2 men posed as city workers who were trimming trees in a neighborhood. One man would knock on the door and schmoo...

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Why bother with PGP ...???

April 04, 2010 Added by:K S Abhiraj

The very nature of email communication makes it perfect for spying and tapping. Imagine all the emails that fly across the Atlantic Ocean. Every single one of them could be tapped without you even noticing it. Of course, thinking that someone will sit and read every single one of them is preposterous - but the "problem" is that nobody has to.

Comments  (12)

924ce315203c17e05d9e04b59648a942

2010: A Year of Change for the Security Industry

April 04, 2010 Added by:Richard Stiennon

2010 is going to be a dramatic year for the security industry.  Vendors and security professionals should prepare for a sea change.   Here are my predictions for the year. 

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

The Biggest Risk to Security Might Be You...

April 04, 2010 Added by:Theresa Payton

Everyone asks me what the greatest theat to security is. They are visibly disappointed when I give them my answer...I believe it is you or maybe your co-worker.

Comments  (7)

D13f77e036666dbd8f93bf5895f47703

How to Avoid the New BOTNET Herders

March 31, 2010 Added by:Theresa Payton

There’s a new game in town offering jobs to anyone with a home office and a computer.   Be careful what you or your kids accept when applying for jobs online.  You or your kids may be accepting a job working for a cybercriminal outfit.

Comments  (2)

6d117b57d55f63febe392e40a478011f

Interview with Former White House CIO Theresa Payton

March 23, 2010 Added by:Anthony M. Freed

I recently had the pleasure of making the acquaintance of the illustrious Theresa Payton, who's long and vibrant career has spanned multiple industry sectors and government service at the highest levels.

Comments  (4)

A1579a5845ff87a92326174e52499707

Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)

37d5f81e2277051bc17116221040d51c

Social Media Sticky Situations

March 15, 2010 Added by:Robert Siciliano

Maybe you’re a Mom or a Dad, a Student or a Grad. No matter what you are, you have a reputation to protect. How we are viewed in society matters to most people. Being viewed as someone who is respectable, responsible, someone who has integrity and is generally a decent person is what most people strive for.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Releases Second Video of Enhanced XerXeS DoS Attack on Apache Vulnerability

March 11, 2010 Added by:Anthony M. Freed

Infosec Island has once again gained exclusive access to a video demonstration of the XerXeS DoS. This new video shows a little more of the XerXeS dashboard, and reveals even more about the attack technique – watch the text box on the left as Jester mentions “Apache” for the first time outside of our private conversations.

Comments  (15)

2ae549cf604c064a34019c7bd4a81e24

Newbie introduction to digital forensics Part 1.

March 08, 2010 Added by:Juan Granados

The economic and business challenges of the last year have forced changes to business priorities in many areas. For IT, increased scrutiny was placed on data leakage and security. When times are good, businesses can become distracted with new products and technologies. It is not until budgets are cut that the focus moves inward.

Comments  (1)

Ba5964a1284ac16d4277991e7225699c

Trust but verify...

March 08, 2010 Added by:Jason Remillard

Very interestingly enough, in the past five or six days we have been detecting ad networks including Google Adsense, Adultadwords, and Adbrite allowing malware-laden ads on their networks.  We are not the only ones who have identified this issue, check out the following links for more information about them:

Comments  (1)

Page « < 53 - 54 - 55 - 56 - 57 > »