Blog Posts Tagged with "SSL"

69dafe8b58066478aea48f3d0f384820

Disabling Facebook's Facial Recognition for Privacy

June 08, 2011 Added by:Headlines

What is truly annoying about Facebook's setup from a privacy perspective is that users have very little control over what other members post about them, particularly when it comes to photos and tagging, and the facial recognition feature further aggravates the situation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LinkedIn SSL Leaves Accounts Vulnerable to Hijacking

May 23, 2011 Added by:Headlines

"There exists multiple vulnerabilities in LinkedIn in which it handles the cookies and transmits them over SSL. This vulnerability if exploited, can result in hijacking of user accounts, and/or modifying the user information without the consent of the profile owner..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA Scorecard: 74% Fail to Protect Consumers Online

May 18, 2011 Added by:Headlines

While the number honored in 2011 represents a promising 3-fold increase from this time last year, 74% of the top websites analyzed did not qualify and remain vulnerable to the increased levels of cybercrime and online fraud...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Issues Guide for Keeping Home Networks Secure

May 04, 2011 Added by:Headlines

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sophos Shames Facebook over Lax Security

April 18, 2011 Added by:Headlines

"Every day, victims report to us numerous incidents of crime and fraud on Facebook. They have been personally affected and are desperate for advice on how to deal with the consequences. A frequent refrain from users who contact us is, ‘Why doesn’t Facebook do more to protect us?’..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

SSL Issues: From Man-in-the-Middle Attacks to Hackers

April 16, 2011 Added by:Dan Dieterle

There seems to be little verification before certificates are handed out. When you add in reports of hackers stealing or creating fake certificates and also hardware devices that perform SSL man-in-the-middle attacks, it sounds like SSL is really in need of an overhaul...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Digital Certificates Only Provide the Illusion of Security

April 11, 2011 Added by:Headlines

“Right now, it's just an illusion of security. Depending on what you think your threat is, you can trust it on varying levels, but fundamentally, it has some pretty serious problems..."

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

How Accurate is Your Software Vulnerability Scanner?

April 05, 2011 Added by:Jamie Adams

System admins must take into account all methods in which software may get installed onto systems. A strong change management program and strict access is required. Unfortunately, I have yet to experience an all-encompassing software version scanner and patch management tool...

Comments  (2)

Aecf1189abe745df32ec68f5864649a6

RSA Breach Long Term Impact for Security Professionals

March 30, 2011 Added by:Nick Owen

With the explosion of cloud-based services, organizations are relying on the security of their vendor's vendors. What lessons can we learn from the RSA and Comodo episodes, and how should it impact decision making? Here are some longer-term items to think about...

Comments  (0)

15058930cc374dcfa98c0342a08be0b2

Is Your e-file Tax Return Secure?

March 23, 2011 Added by:Ken Stasiak

The IRS issued six new security requirements to supplement GLBA and other regulations. The ruling went into effect on January 1, 2010, with a one year grace period. That means now all Cloud Providers that either store, process, or transmit individual income tax returns must demonstrate compliance...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Privacy International Warns of Skype Security Concerns

March 18, 2011 Added by:Headlines

"If the company cannot address and resolve these issues for those who are seeking secure communications, then vulnerable users will continue to be exposed to avoidable risks. Skype's misleading security assurances continue to expose users around the world to unnecessary and dangerous risk..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Twitter Offers "Always Use HTTPS" Security Feature

March 17, 2011 Added by:Headlines

The new feature allows users the option to "Always Use HTTPS". Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by Firesheep attackers when logging in to their accounts over unencrypted Wi-Fi connections...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Nine Tips for Securing Mobile Devices When Traveling

March 03, 2011 Added by:Headlines

Logan Kugler writes about his experience with being "firesheeped" on a recent trip. Firesheep can harvest login credential on unencrypted Wi-Fi networks. He interviewed several information security experts to compile the following tips on locking down your mobile devices when traveling...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Mobile Device Security Challenges

February 23, 2011 Added by:Danny Lieberman

Deploying line of business or life science applications on mobile Android tablets or an iPad has a different set of security requirements than backing up your address book. It requires thinking about the software security and privacy vulnerabilities in a systematic way...

Comments  (1)

1789975b05c7c71e14278df690cabf26

Getting Off the Patch

January 10, 2011 Added by:Pete Herzog

Patching is just one small part of the solution that includes Anti-virus, firewalls, intrusion detection systems, strong authentication, encryption, physical locks, disabling of scripting languages, reduced personal information on social networks,as part of a healthy lifestyle solution...

Comments  (13)

69dafe8b58066478aea48f3d0f384820

Gawker Admits Lax Security Led to Breach

December 20, 2010 Added by:Headlines

“It is clear that the Gawker tech team did not adequately secure our platform from an attack of this nature. We were also not prepared to respond when it was necessary,” said Gawker's Tom Plunkett in a statement released last Friday...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »