Blog Posts Tagged with "online safety"
December 28, 2012 Added by:Allan Pratt, MBA
As the New Year approaches, have you thought about your New Year’s resolutions? As a member of the information security industry, I would like to share five resolutions that you should definitely add to your list...
December 18, 2012 Added by:Kelly Colgan
Services such as BillMeLater, a PayPal company that allows customers to make purchases on credit after a simple sign-up process and credit check, have created an identity theft trend and left victims fighting to clear their names...
November 26, 2012 Added by:Tripwire Inc
I might possibly be in the wrong business. Google announced recently that teenage hacker “Pinkie Pie” was awarded $60,000 for finding and reporting a bug in the company’s Chrome web browser. Apparently this is not even the first time he has accomplished this feat...
October 31, 2012 Added by:Electronic Frontier Foundation
We released version 3.0 of HTTPS Everywhere, which adds encryption protection to 1,500 more websites, twice as many as previous stable releases. Our current estimate is that HTTPS Everywhere 3 should encrypt at least a hundred billion page views in the next year, and trillions of individual HTTP requests...
October 28, 2012 Added by:Robert Siciliano
Obama’s framework consists of four elements: A Consumer Privacy Bill of Rights, a multi-stakeholder process to specify how the principles in the Bill of Rights apply in particular contexts, effective enforcement, and a commitment to increase interoperability with the US’s international partners...
October 24, 2012 Added by:Brent Huston
Instead of using your actual name as your login, why not use something different that is hard to guess and doesn’t reveal anything about your identity? It always pays to make it as tough on the cyber-criminals as possible..
October 11, 2012 Added by:Robert Siciliano
There are few pseudo holiday celebration days or months that truly get my attention. But National Cyber Security Awareness Month is the one month a year that consumers are reminded by news reporters, government agencies, non-profits and companies that security is everyone’s responsibility...
October 04, 2012 Added by:Robert Siciliano
Data can sometimes be held hostage with the help of ransomware, software that infiltrates your computer when you download an infected attachment or clicking a link within the body of an email. You can also get ransomware simply by visiting the wrong website, in what is called a drive-by...
October 01, 2012 Added by:Allan Pratt, MBA
No information is guaranteed to be 100% breach-free. You must be vigilant when it comes to knowing what information about you is online. No business entity is solely responsible for securing the Internet. You play the most important role in protecting your own digital life...
September 26, 2012 Added by:Brent Huston
One of the most difficult tasks for an organization is conveying the importance of discretion for employees who use social media. Not only are organizations at risk from having their networks attacked, but they must protect their reputation and proprietary ideas...
September 25, 2012 Added by:Robert Siciliano
McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that by just simply visiting a website you could be exposed to malicious things that can do harm to your computer, mobile device, finances or identity...
September 23, 2012 Added by:Theresa Payton
What does Internet safety mean to the average person? It may vary depending upon age, how you use the internet, and the type of work that you do that involves the digital world. Here are some sobering statistics that might give you a perspective...
September 18, 2012 Added by:Dan Dieterle
Looks like Windows 8 is capped at a 16 character limit for compatibility with existing Microsoft Accounts. With the decrease of the character set, by limiting special characters for compatibility with Microsoft’s other services, the passwords are less secure than before...
September 17, 2012 Added by:Electronic Frontier Foundation
Rather than waiting for bad legislation, Wikipedians should take this opportunity to make one relatively small technical change that could serve as a bulwark against all kinds of government surveillance, filtering and data retention laws...
September 16, 2012 Added by:Ben Rothke
In the new world of social media and Web 3.0, which is claiming to revolutionize communication and interactions, history is repeating itself. Web 3.0 is turning into an Orwellian infrastructure where the ruling party wields total power over the inhabitants...
September 11, 2012 Added by:Robert Siciliano
While your company’s IT guy has a relative hold on the work laptops and desktops, and even some of the mobiles, he is quickly losing control when you bring your new Droid and connect it to the corporate network. Now he has to worry if that last app you downloaded will infect the network...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013