Blog Posts Tagged with "Security"

8b5e0b54dfecaa052afa016cd32b9837

The Growth of Cyber Terror

September 07, 2011 Added by:Craig S Wright

SCADA systems and other critical infrastructure is taken for granted and we forget just how much of our lives are managed through private systems. Exploits have been noted as being of critical concern in US government briefs. We also forget that SCADA systems are connected to the world...

Comments  (15)

Bddcc5065237c686cb4d89dba8b276f2

Promoting Security Policies Using Organizational Culture

September 06, 2011 Added by:Steven Fox, CISSP, QSA

Optimal utilization of security policies relies on the audience for which they are created. Policy creation and marketing must recognize and capitalize on organizational culture to promote its value proposition. People can be the strongest link in the security chain...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Corporation Taps Philip Reitinger as First CISO

September 06, 2011 Added by:Headlines

The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Security: What Was Old is New Again

September 06, 2011 Added by:Craig S Wright

So, when all is said and done, we have not really changed much as a species. We love to believe that we as a generation are forging something new and facing problems that no other has faced before, but in reality, the analogy remains as it is always likely to remain. Change is the only constant...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Consumers Still Prefer Convenience Over Security

August 24, 2011 Added by:Headlines

"Any change to the way a customer accesses their account is going to take a while to get used to. But this small extra step delivers such an increase in security to our internet banking users, that we are confident we have got the balance right," an HSBC official said...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Facebook Releases User Security Guide

August 19, 2011 Added by:Headlines

The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Five Security Considerations for a Mobile Phone

August 18, 2011 Added by:Robert Siciliano

Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Mobile Device Security: The Matrix in 2011

August 15, 2011 Added by:Simon Heron

Remember that scene in the Matrix where our hero Neo is on the run and he just grabs a phone off some bystander and is immediately able to cancel the existing call and dial a new one? That seemed totally believable at the time. I just wondered what the equivalent might be these days?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ISO and IEC Publish Biometric Authentication Standard

August 15, 2011 Added by:Headlines

Unlike other authentication systems, the breach of biometric data is difficult to remedy. Users can not simply alter the authenticating data used to access secure networks, as one would with usernames and passwords - the data is permanently and uniquely identifiable to the individual user...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Teen Tips for a Safe Cyber Summer

August 13, 2011 Added by:Kelly Colgan

Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Man Gets Eighteen Years for Hacking Neighbors

August 12, 2011 Added by:Robert Siciliano

In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Don't Miss Security BSides in Los Angeles

August 12, 2011 Added by:Headlines

This is a community event - for all of us, by all of us. In exchange for it being a free event, you will be encouraged to be active. Come and talk, speak up, ask questions and participate throughout the event. It is a time for all of us to learn, share and explore without judgment, and con-fees...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Standards Will Bring Mobile Payment Security

August 09, 2011 Added by:Robert Siciliano

The mobile carriers want to control near-field communication and mobile payment fees by maintaining control over the phones payment technology containing their users’ credentials. Meanwhile, consumers crave mobile payment and must adapt until the big guys fight it out to see who ends up top dog...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Israeli Cyber Command Plans to Cripple Iran in Cyberspace

August 09, 2011 Added by:Headlines

"The center, which has been set up under the auspices of military intelligence unit 8200 has already conducted a series of 'soft' espionage missions, including hacking into Iran’s version of Facebook and other social networking sites..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Preparing a Mobile or PC for Resale or Donation

July 29, 2011 Added by:Robert Siciliano

You may have read my last post where I talked about “Clean the Clutter” out of your life and sell all the stuff you don’t absolutely need. Prior to selling my electronics I wiped all the data off of each device. Cleaning all the data off your salable electronics is absolutely essential...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Today is Annual System Administrator Appreciation Day

July 29, 2011 Added by:Headlines

While we enjoy the opportunity to go home from the office at the end of the work day, SysAdmins are still on the job fighting off unauthorized access attempts, protecting our sensitive data, and working hard to improve network performance...

Comments  (1)

Page « < 8 - 9 - 10 - 11 - 12 > »