Blog Posts Tagged with "internet"
July 08, 2012 Added by:Allan Pratt, MBA
It should come as no surprise that businesses are taking advantage of the public’s fascination of placing their day-to-day activities on social networking sites. This may seem inappropriate and offensive, and it might be – but for the moment, it’s not illegal. We have only ourselves to blame...
July 06, 2012 Added by:Rafal Los
Everything in life will fail at some point - it is a smart thing to plan for and architect into your applications or services. Undoubtedly this type of strategy costs more - having multiple providers, more complex software, more data shipping and redundancy isn't cheap - but this is one lesson you must learn...
July 04, 2012 Added by:Theresa Payton
We have mentioned before that Twitter will send every tweet to the National Archives and the Library of Congress, so watch what you tweet. Now new tools unleash a trove of data in moments. For the 140 million and growing user base that tweets over 400 million tweets per day, this might be a little more than alarming...
June 28, 2012 Added by:gaToMaLo r. amores
For anonymous transactions to be possible through Bitcoin, a mixing system must be used. There are two types: Those secure against attack from people viewing the public transaction like Bitcoin Laundry, and those secure against attack from the mixing system itself, like Open Transactions...
June 27, 2012 Added by:gaToMaLo r. amores
What is System D? It is a term that refers to a manner of responding to challenges that requires one to have the ability to think fast, to adapt, and to improvise when getting a job done. This can be applied to hackers and of course the Tor-Onion network. They are all System D and growing because of it...
June 27, 2012 Added by:Headlines
“As the cyber threat grows more international, the response must be increasingly global and forceful. The coordinated law enforcement actions taken by an unprecedented number of countries around the world demonstrate that hackers and fraudsters cannot count on being able to prowl the Internet..."
June 25, 2012 Added by:Infosec Island Admin
ICS-CERT is tracking and has responded to multiple reports of researchers using SHODAN, Every Routable IP Project (ERIPP), Google, and other search engines to discover Internet facing control systems. ICS-CERT has identified system owners and operators to notify them of their potential vulnerability...
June 21, 2012 Added by:Kelly Colgan
There’s no shortage of cautionary tales about social media risks for children. They’re all over the news. In a recent Harris Interactive poll, parents said their top concerns included sexual predators, cyberbullying and a desire to monitor their children’s activities online and on mobile phones...
June 20, 2012 Added by:J. Oquendo
The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...
June 19, 2012 Added by:Kelly Colgan
In conjunction with the National PTA Convention, Tim Woda will present about the specific risks plaguing parents and ways to mitigate their concerns. Matt Cullina will unveil findings from a Harris Interactive survey of parents about their child’s social networking habits and what issues cause them the most fear...
June 19, 2012 Added by:Headlines
"Considering how critical Internet access is to our daily lives, we want all Internet users to understand that they have a shared responsibility in protecting themselves online and that safer practices online help protect everyone"...
June 17, 2012 Added by:Theresa Payton
Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...
June 15, 2012 Added by:Electronic Frontier Foundation
The threat posed by the International Telecommunication Union (ITU) is not limited to an outright "takeover" by Russia or China. ITU's vision of Internet policy-making is more like "taking control" than the transparent and bottom-up multi-stakeholder process typically associated with Internet governance...
June 15, 2012 Added by:Infosec Island Admin
It’s one thing to make something criminal, and another to attempt to force behavioral modifications that infringe on our first amendment rights. We are at the tipping point with all the cyber hubbub over warfare and criminality, and Congress will likely frak us all with their swift pens of “justice”...
June 13, 2012 Added by:Allan Pratt, MBA
Much has been written about the LinkedIn security breach and the millions of passwords at risk. Hopefully by now all users have changed them and made them more complex. When it comes to professional social networking sites though, LinkedIn is not the only game in town. Here are the Top 10 alternatives...
June 12, 2012 Added by:Electronic Frontier Foundation
ACM is the world's largest organization for computer professionals. They are joining a diverse group in opposing CISPA, including a wide array of digital civil liberties organizations like EFF, computer scientists like Bruce Schneier and Tim Berners-Lee, and companies like the Mozilla Foundation...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015