Blog Posts Tagged with "Security Awareness"


Ubuntu Snafu: Privacy Is Hard, Let’s Go Shopping

November 10, 2012 Added by:Fergal Glynn

Amusingly, the plugin’s flood of attention means it is already racking up quite the bug count. For example, it does not currently do any NSFW prevention, and the results are returned in plaintext also. Have fun explaining that one to the ol’ boss-a-roni...

Comments  (0)


Joining hands against cybercrime in Africa

November 08, 2012 Added by:Pierluigi Paganini

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Comments  (0)


Cybersecurity Matters in The Election

November 05, 2012 Added by:Robert Siciliano

Whomever is elected president will face an unknown unseen digital enemy unlike any other president has seen in history. Think before you click. Know who’s on the other side of that instant message. What you say or do in cyberspace stays in cyberspace — for many to see, steal and use against you or your government...

Comments  (0)


Windows 8 Security in Action: Part 1

November 04, 2012 Added by:Dan Dieterle

Is Windows 8 the next operating system for your enterprise? In this article, we will take a quick look at Microsoft’s new OS – Windows 8. We will see some of the new security features that make it more secure than its predecessor Windows 7...

Comments  (0)


Does it Make Sense to Keep Changing Your Passwords?

October 31, 2012 Added by:Rafal Los

I'm running a small experiment on myself in which I've set up an account on a public, high-traffic web-based system out there that has a ton of my personal information. I've not changed my password in almost 6 months, but I still feel relatively good and certain that I am the only one who has access to my stuff...

Comments  (0)


Ask The Experts: Online Banking

October 24, 2012 Added by:Brent Huston

Instead of using your actual name as your login, why not use something different that is hard to guess and doesn’t reveal anything about your identity? It always pays to make it as tough on the cyber-criminals as possible..

Comments  (0)


Paying Lip Service (Mostly) to User Education

October 24, 2012 Added by:Fergal Glynn

The connection between improved security and user education is so well-established as to be almost axiomatic. Better technology, coding practices and testing can only accomplish so much. So what’s being done about the dearth of solid user education?

Comments  (13)


Hacktivists Using Shortened Links to Hide Malware Servers

October 15, 2012 Added by:Dan Dieterle

“Most did not recognise that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behaviour can be identified over time..."

Comments  (0)


It’s National Cyber Security Awareness Month

October 11, 2012 Added by:Robert Siciliano

There are few pseudo holiday celebration days or months that truly get my attention. But National Cyber Security Awareness Month is the one month a year that consumers are reminded by news reporters, government agencies, non-profits and companies that security is everyone’s responsibility...

Comments  (0)


Six Questions to Ask Before Posting to Social Networks

October 10, 2012 Added by:Rebecca Herold

Every day I see yet another situation where employees misused, abused or otherwise accused social media sites to the chagrin of their employers. Businesses need to make a coordinated effort, using a combination of policies, training and technology to mitigate the risks of workers using social media sites...

Comments  (0)


October Is National Cyber Security Month

October 01, 2012 Added by:Allan Pratt, MBA

No information is guaranteed to be 100% breach-free. You must be vigilant when it comes to knowing what information about you is online. No business entity is solely responsible for securing the Internet. You play the most important role in protecting your own digital life...

Comments  (0)


Social Engineering: What the Heck Was I Doing? Part 1

September 26, 2012 Added by:Will Tarkington

The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...

Comments  (0)


Malicious Websites: The Web is a Dangerous Place

September 25, 2012 Added by:Robert Siciliano

McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that by just simply visiting a website you could be exposed to malicious things that can do harm to your computer, mobile device, finances or identity...

Comments  (2)


What Exactly is Internet Safety Anyhow?

September 23, 2012 Added by:Theresa Payton

What does Internet safety mean to the average person? It may vary depending upon age, how you use the internet, and the type of work that you do that involves the digital world. Here are some sobering statistics that might give you a perspective...

Comments  (0)


Clipboards, Confidence, and Information Security

September 17, 2012 Added by:Tripwire Inc

How do you teach paranoia and suspicion? We often hire people because of their willingness to help others, their good communication skills, their ability to be responsive, etc. As we work through securing our humans, we need to strike a balance – trust but verify, assist but not unquestioningly...

Comments  (1)


The Fine Print of Smartphone Privacy

September 14, 2012 Added by:Allan Pratt, MBA

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »