Blog Posts Tagged with "internet"
October 20, 2011 Added by:Joel Harding
An attention grabbing report recently by Norton reveals that cybercrime nets more than marijuana, heroin and cocaine combined. Even worse, over 1 million people per day are victimized by online crime. In spite of this, 41% of us do not have adequate up to date virus or malware protection...
October 20, 2011 Added by:john melvin
This article is not an analysis of the backdoor, but instead describes the methodology and techniques used to decipher malicious code embedded and encoded in a seemingly normal web page. The following is a snippet of the PHP code that caught my attention and began my investigation...
October 18, 2011 Added by:Robert Siciliano
Now as companies leverage the power of the web, information security has evolved yet again: We are in the application security era. And as big companies get better at locking down their software and protecting their data, criminals are targeting the little guy...
October 11, 2011 Added by:Robert Siciliano
The cloud will encourage the development of identification technologies designed to authenticate individuals online and via mobile. The sheer connectedness facilitated by the cloud and our complimentary devices will ultimately allow for a more seamless and secure digital life...
October 03, 2011 Added by:Headlines
"When the possibility exists for information to be obtained that wasn't possible before, it's entirely understandable that law enforcement is interested. Then the issue would be, what's the right policy? And that, or course, engenders a lot of debate..."
October 01, 2011 Added by:Craig S Wright
Intermediaries have the ability to stop transgressions on the Web now, but the lack of clear direction and potential liability associated with action remains insufficient to modify behavior. In the face of tortuous liability, the economic impact of inaction is unlikely to lead to change...
September 30, 2011 Added by:David Navetta
The proposed amendments would modify the Rule in five areas: definitions, parental notice, parental consent mechanisms, confidentiality and security of children’s personal information, and safe harbor programs. Each may have a significant impact on a company’s current online practices...
September 29, 2011 Added by:Javvad Malik
Consider what assets the employee has had access to during their time. Do you need to get a laptop back from them? A mobile phone perhaps, revoke their access maybe? What you don’t want is someone who is no longer employed by you to still have access to your systems or information...
September 14, 2011 Added by:Headlines
The ensemble is somewhat surprising - a collection of both white and black hat innovators who's activities often landed them on either side of the law, but who nonetheless had a tremendous impact on information technology as we know it today...
September 05, 2011 Added by:Allan Pratt, MBA
As we have become more and more absorbed in social media, when was the point that we stopped caring about our confidential information? When did we lose control of our privacy? Is the simple solution to blame Mark Zuckerberg? Or should we blame companies who want access to our data?
August 30, 2011 Added by:Craig S Wright
Cybercriminals are actually extremely rational. And not necessarily talking of hacktivists and others without a clear profit motive, but those with a drive to make money act extremely rationally. Consequently, there is a solution: Reduce their profit...
August 30, 2011 Added by:Headlines
"DNSwatch will help you avoid known bad websites or sites that will trick your computer into downloading and installing malicious programs on your computer. Even better, DNSwatch will also prevent you from accessing malicious websites that you may not even know your computer is trying to access..."
August 29, 2011 Added by:Headlines
“This investigation is about the patently unsafe, unlawful, importation of prescription drugs by Canadian on-line pharmacies, with Google’s knowledge and assistance, into the United States, directly to U.S. consumers,” said U.S. Attorney Neronha...
August 26, 2011 Added by:Joel Harding
Without electricity most of us are going to be hosed, we won't have access to social media to communicate with family and friends. We won't be able to check the latest news and information from the government from websites and once everybody has moved to the cell phone networks, they'll crash...
August 14, 2011 Added by:Lenny Zeltser
To understand riots, consider the importance of de-individuation of the mob's participants, the importance of instigating events and the role of the "entrepreneur" in starting the chain reaction of a riot. There are parallels to the dynamics of modern Internet hacktivism...
August 13, 2011 Added by:Kelly Colgan
Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...
Securing Bitcoin - The New Frontier... williama willis on 03-06-2015
How to Manage Secure Communications in M2M E... Charles Devon on 03-05-2015
Seven “Sins” of Cyber Security... John Terry on 03-05-2015