Blog Posts Tagged with "online safety"


Google Wallet: Please Tell Me They’re Joking...

September 08, 2012 Added by:Joel Harding

No computer in the world is safe from a determined hacker. Most of us don’t properly secure our computer, our smart phone, or even our wallets. So how in the heck does storing your credit and debit card information “in the cloud” help you secure your already vulnerable information?

Comments  (1)


FTC Seeks Comment on Proposed Revisions to COPPA Rule

August 27, 2012 Added by:David Navetta

The proposed modifications to the definitions of "operator" and "website or online service directed to children" address commenters’ concerns related to the use of third party advertising networks and downloadable software kits, or plug ins, that collect personal information through child-directed websites...

Comments  (2)


If Facial Recognition Creeps You Out, What You Can Do About It

August 24, 2012 Added by:Theresa Payton

Facebook’s software isn’t just about placing a name with a face. If you think about how people use the like button, connect to groups, connect to each other, a tagged photo gives additional context. Hackers would love to have this information about you...

Comments  (1)


Misinformation and Manipulation in the Age of Social Media

August 21, 2012 Added by:Ben Rothke

Terms such as revolutionary, and groundbreaking are often used in reference to the web and social media. The web and social media have also been so for scammers, thieves, liars, manipulators, and the like who use social media in a big way. To avoid being caught in their lair, it is imperative to know the risks...

Comments  (1)


One-Third of Banking Account Takeover Attempts Successful

August 20, 2012 Added by:Robert Siciliano

While less money was ultimately siphoned from banks and customers than in past years, there are new attack strategies on the horizon, which may push these numbers up in 2012. Threats, defenses, and vulnerabilities continually emerge, so stay tuned as we track the shifts in our evolving security landscape...

Comments  (0)


To Tweet, or Not to Tweet, That is the Question...

August 19, 2012 Added by:Christopher Laing

Activities that threaten your business are the downloading and opening of attachments and Internet files that contain malicious software, and the electronic delivery/distribution of business sensitive information without encryption. This may done either accidentally or deliberately by a disgruntled employee...

Comments  (1)


The Day I Was Erased Digitally

August 17, 2012 Added by:Theresa Payton

It’s everyone’s worst night nightmare - everything digital in your life gets wiped out. Your phone, your computer, your tablet, every email address, social network profile. It really does happen, and most of you probably didn’t know that even techies and security experts worry about this happening to them...

Comments  (0)


Is a Password Enough? A Closer Look at Authentication

August 16, 2012 Added by:Robert Siciliano

Yahoo and LinkedIn were recently breached and usernames and passwords were stolen. These sites did something wrong that allowed those passwords to get hacked. However passwords themselves are too hackable. If multi-factor authentication was used, then the hacks may be a moot point and the data useless...

Comments  (0)


Ask the Experts: Facebook Security for Teenagers

August 14, 2012 Added by:Brent Huston

"Watch the scams and traps that are strewn like land mines throughout the site. Watch the free give-aways, be wary of clicking on pictures and videos and look carefully at any messages that contain links or suggest web sites to visit. Also, be VERY careful about ‘friends’ of friends..."

Comments  (0)


Teenage Olympics: Pouts, Pot and Piddle

August 12, 2012 Added by:Kelly Colgan

Identity theft is one area where the ignorance of children and their parents can be more costly than a wobbly landing or delayed start off the blocks. It can hamper their ability to secure funding to attend college or buy a car, and to land a job. Children aren’t the only ones who are vulnerable to identity theft...

Comments  (1)


Online Threats That Will Throw You Off the Security Balance Beam

August 09, 2012 Added by:Kelly Colgan

We can’t sugarcoat it, because there’s more at stake for online users than going for gold or settling for silver. One blip on the beam or pratfall on the pommel can make a bank-account balance drop faster than an icy judge’s score. And it’ll take more than a Wheaties box to build it back...

Comments  (0)


The Bad Guys Know You’re an Olympics Addict

August 08, 2012 Added by:Kelly Colgan

The emerging theme from these Summer Games: There’s a general lack of awareness among consumers and end users about possible threats when they’re online. Even with corporate security professionals on high alert, it is ultimately end users and consumers who will make the choice that infects the system...

Comments  (0)


Do You Use Foursquare?

August 05, 2012 Added by:Allan Pratt, MBA

If we don’t continue to raise issues about online privacy and security, websites and their companies’ leadership will continue to demand access to our confidential information under the pretense of doing business, or in scarier terms, doing business as usual. One website that causes concern is Foursquare...

Comments  (1)


Take Social Media Privacy into Your Own Hands

July 23, 2012 Added by:Bill Mathews

I've gotten in a lot of arguments lately about the end-user side of technology - privacy. Many in the security industry already know most of the things people are discovering, and have screamed warnings from the mountaintops to the folks below. Alas, this is the woe of being a security engineer...

Comments  (1)


Between You and Me, This is Not Private...

July 22, 2012 Added by:Fergal Glynn

If most websites can’t get password storage right, you can bet they can’t get storage of the content you are trusting them with right either. The private documents that you stored with your favorite cloud service are probably not encrypted in a way that only your account can decrypt, if they’re encrypted at all...

Comments  (0)


DHS: Cybersecurity Awareness and the Summer Olympics

July 19, 2012 Added by:Infosec Island Admin

Hackers frequently take advantage of highly-publicized events and popular news to get users to click on fraudulent links and unknowingly download malware onto their computers, smart phones, tablets, and other wireless devices. To avoid these online scams, it's important to follow these practices...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »