Blog Posts Tagged with "internet"

94ae16c30d35ee7345f3235dfb11113c

Cyber Crime Explodes - But Few Take Action

October 20, 2011 Added by:Joel Harding

An attention grabbing report recently by Norton reveals that cybercrime nets more than marijuana, heroin and cocaine combined. Even worse, over 1 million people per day are victimized by online crime. In spite of this, 41% of us do not have adequate up to date virus or malware protection...

Comments  (0)

C9f10ffa24531c96d85e0445499fd1e4

Browser-Based Malware: Decoding a PHP Backdoor

October 20, 2011 Added by:john melvin

This article is not an analysis of the backdoor, but instead describes the methodology and techniques used to decipher malicious code embedded and encoded in a seemingly normal web page. The following is a snippet of the PHP code that caught my attention and began my investigation...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Think You’re Protected? Think Again...

October 18, 2011 Added by:Robert Siciliano

Now as companies leverage the power of the web, information security has evolved yet again: We are in the application security era. And as big companies get better at locking down their software and protecting their data, criminals are targeting the little guy...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How the Cloud Will Change Technology

October 11, 2011 Added by:Robert Siciliano

The cloud will encourage the development of identification technologies designed to authenticate individuals online and via mobile. The sheer connectedness facilitated by the cloud and our complimentary devices will ultimately allow for a more seamless and secure digital life...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Giants Enlisted for Government Surveillance

October 03, 2011 Added by:Headlines

"When the possibility exists for information to be obtained that wasn't possible before, it's entirely understandable that law enforcement is interested. Then the issue would be, what's the right policy? And that, or course, engenders a lot of debate..."

Comments  (1)

8b5e0b54dfecaa052afa016cd32b9837

Legal Consequences of Breaches to Security and Privacy

October 01, 2011 Added by:Craig S Wright

Intermediaries have the ability to stop transgressions on the Web now, but the lack of clear direction and potential liability associated with action remains insufficient to modify behavior. In the face of tortuous liability, the economic impact of inaction is unlikely to lead to change...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Proposes Revisions to COPPA Rule

September 30, 2011 Added by:David Navetta

The proposed amendments would modify the Rule in five areas: definitions, parental notice, parental consent mechanisms, confidentiality and security of children’s personal information, and safe harbor programs. Each may have a significant impact on a company’s current online practices...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Insider Threats: Ghostwriter Gone Rogue

September 29, 2011 Added by:Javvad Malik

Consider what assets the employee has had access to during their time. Do you need to get a laptop back from them? A mobile phone perhaps, revoke their access maybe? What you don’t want is someone who is no longer employed by you to still have access to your systems or information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Ten History-Making Hackers Who Shaped Technology

September 14, 2011 Added by:Headlines

The ensemble is somewhat surprising - a collection of both white and black hat innovators who's activities often landed them on either side of the law, but who nonetheless had a tremendous impact on information technology as we know it today...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Is Social Media Eroding Our Privacy?

September 05, 2011 Added by:Allan Pratt, MBA

As we have become more and more absorbed in social media, when was the point that we stopped caring about our confidential information? When did we lose control of our privacy? Is the simple solution to blame Mark Zuckerberg? Or should we blame companies who want access to our data?

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Question: Why Cybercrime?

August 30, 2011 Added by:Craig S Wright

Cybercriminals are actually extremely rational. And not necessarily talking of hacktivists and others without a clear profit motive, but those with a drive to make money act extremely rationally. Consequently, there is a solution: Reduce their profit...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CERT Malaysia Releases DNSwatch Tool

August 30, 2011 Added by:Headlines

"DNSwatch will help you avoid known bad websites or sites that will trick your computer into downloading and installing malicious programs on your computer. Even better, DNSwatch will also prevent you from accessing malicious websites that you may not even know your computer is trying to access..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Settles with DOJ for $500 Million Over Drug Ads

August 29, 2011 Added by:Headlines

“This investigation is about the patently unsafe, unlawful, importation of prescription drugs by Canadian on-line pharmacies, with Google’s knowledge and assistance, into the United States, directly to U.S. consumers,” said U.S. Attorney Neronha...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Social Media During a Crisis

August 26, 2011 Added by:Joel Harding

Without electricity most of us are going to be hosed, we won't have access to social media to communicate with family and friends. We won't be able to check the latest news and information from the government from websites and once everybody has moved to the cell phone networks, they'll crash...

Comments  (1)

F7e202a206691e473e509d080620af68

Similarities Between Riots and Modern Internet Hacktivism

August 14, 2011 Added by:Lenny Zeltser

To understand riots, consider the importance of de-individuation of the mob's participants, the importance of instigating events and the role of the "entrepreneur" in starting the chain reaction of a riot. There are parallels to the dynamics of modern Internet hacktivism...

Comments  (3)

F29746c6cb299c1755e4087e6126a816

Teen Tips for a Safe Cyber Summer

August 13, 2011 Added by:Kelly Colgan

Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »