Blog Posts Tagged with "internet"

0a8cae998f9c51e3b3c0ccbaddf521aa

Leap Second, Public Cloud and a Lesson in Enterprise Resiliency

July 06, 2012 Added by:Rafal Los

Everything in life will fail at some point - it is a smart thing to plan for and architect into your applications or services. Undoubtedly this type of strategy costs more - having multiple providers, more complex software, more data shipping and redundancy isn't cheap - but this is one lesson you must learn...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

I Know What You Tweeted Last Summer...

July 04, 2012 Added by:Theresa Payton

We have mentioned before that Twitter will send every tweet to the National Archives and the Library of Congress, so watch what you tweet. Now new tools unleash a trove of data in moments. For the 140 million and growing user base that tweets over 400 million tweets per day, this might be a little more than alarming...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Cyber Crime: Government vs. Bitcoin Anonymity

June 28, 2012 Added by:gaToMaLo r. amores

For anonymous transactions to be possible through Bitcoin, a mixing system must be used. There are two types: Those secure against attack from people viewing the public transaction like Bitcoin Laundry, and those secure against attack from the mixing system itself, like Open Transactions...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

System D: Bitcoin’s Underground Economy

June 27, 2012 Added by:gaToMaLo r. amores

What is System D? It is a term that refers to a manner of responding to challenges that requires one to have the ability to think fast, to adapt, and to improvise when getting a job done. This can be applied to hackers and of course the Tor-Onion network. They are all System D and growing because of it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twenty-Four Arrests in Eight Countries in Cyber Crime Takedown

June 27, 2012 Added by:Headlines

“As the cyber threat grows more international, the response must be increasingly global and forceful. The coordinated law enforcement actions taken by an unprecedented number of countries around the world demonstrate that hackers and fraudsters cannot count on being able to prowl the Internet..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Control System Internet Accessibility

June 25, 2012 Added by:Infosec Island Admin

ICS-CERT is tracking and has responded to multiple reports of researchers using SHODAN, Every Routable IP Project (ERIPP), Google, and other search engines to discover Internet facing control systems. ICS-CERT has identified system owners and operators to notify them of their potential vulnerability...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Social Media Security: What Parents Should Worry About

June 21, 2012 Added by:Kelly Colgan

There’s no shortage of cautionary tales about social media risks for children. They’re all over the news. In a recent Harris Interactive poll, parents said their top concerns included sexual predators, cyberbullying and a desire to monitor their children’s activities online and on mobile phones...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Microsoft, the CIA and NSA Collude to Take Over the Internet

June 20, 2012 Added by:J. Oquendo

The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Not So Tweet and Innocent: Social Networking Security Webinar

June 19, 2012 Added by:Kelly Colgan

In conjunction with the National PTA Convention, Tim Woda will present about the specific risks plaguing parents and ways to mitigate their concerns. Matt Cullina will unveil findings from a Harris Interactive survey of parents about their child’s social networking habits and what issues cause them the most fear...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

June is National Internet Safety Month

June 19, 2012 Added by:Headlines

"Considering how critical Internet access is to our daily lives, we want all Internet users to understand that they have a shared responsibility in protecting themselves online and that safer practices online help protect everyone"...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cyber Criminals Hiding Behind Travel Emails

June 17, 2012 Added by:Theresa Payton

Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Congressional Witnesses Agree: Multistakeholders Right for Internet Regulation

June 15, 2012 Added by:Electronic Frontier Foundation

The threat posed by the International Telecommunication Union (ITU) is not limited to an outright "takeover" by Russia or China. ITU's vision of Internet policy-making is more like "taking control" than the transparent and bottom-up multi-stakeholder process typically associated with Internet governance...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

It’s the 90′s All Over Again, Except This Time Online...

June 15, 2012 Added by:Infosec Island Admin

It’s one thing to make something criminal, and another to attempt to force behavioral modifications that infringe on our first amendment rights. We are at the tipping point with all the cyber hubbub over warfare and criminality, and Congress will likely frak us all with their swift pens of “justice”...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Ten Networking Alternatives After LinkedIn's Security Breach

June 13, 2012 Added by:Allan Pratt, MBA

Much has been written about the LinkedIn security breach and the millions of passwords at risk. Hopefully by now all users have changed them and made them more complex. When it comes to professional social networking sites though, LinkedIn is not the only game in town. Here are the Top 10 alternatives...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Organization for Computer Professionals Opposes CISPA

June 12, 2012 Added by:Electronic Frontier Foundation

ACM is the world's largest organization for computer professionals. They are joining a diverse group in opposing CISPA, including a wide array of digital civil liberties organizations like EFF, computer scientists like Bruce Schneier and Tim Berners-Lee, and companies like the Mozilla Foundation...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Big Brother Likes Big Data: Balancing Privacy with Innovation

June 05, 2012 Added by:Rebecca Herold

Big Data and associated analytics can be used to improve business and customer experiences and bring innovation and medical breakthroughs. However, organizations must make sure they don’t cross that line of customization and business improvements into creepiness and full-blown privacy invasion...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »