Blog Posts Tagged with "Computer"

37d5f81e2277051bc17116221040d51c

Seventeen Percent of PCs Are Overtly Exposed

June 21, 2012 Added by:Robert Siciliano

If you are part of the 17% without security software installed, listen up: there are millions of viruses out there that will ravage your PC to death. Some can make your PC completely inoperable, while others allow criminals to control your PC remotely, making it part of a botnet, used for nefarious ends...

Comments  (0)

37d5f81e2277051bc17116221040d51c

I Found Your Data on that Used Device You Sold...

March 14, 2012 Added by:Robert Siciliano

What did you do with all of your old devices? Some were probably given away, or you might have hocked a few on eBay or Craigslist. Did you know it is very likely that you inadvertently put all of your digital data in someone else’s hands?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Disappointing Ruling in Compelled Laptop Decryption Case

February 01, 2012 Added by:Electronic Frontier Foundation

A federal district court has handed down an unfortunate early ruling in a case. Prosecutors asked the court to force the defendant to either type an encryption passphrase into the laptop to decrypt the information or turn over a decrypted version of the data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Guidelines: Protecting Computers at Start-Up

December 29, 2011 Added by:Headlines

SP 800-155 explains the fundamentals of BIOS integrity measurement to determine if the BIOS has been modified and how to report changes. The publication provides detailed guidelines to vendors that develop products to support secure BIOS integrity measurement mechanisms...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Signals of PC Failure and Contingency Plans

September 21, 2011 Added by:Robert Siciliano

Has your computer refused to turn on? Or turned on, but only to display a blue screen? The worst is when you’ve been working on a document and your hard drive crashes. If this has yet to happen to you, you’re likely overdue. The following are signs your computer may be close to death...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Ten History-Making Hackers Who Shaped Technology

September 14, 2011 Added by:Headlines

The ensemble is somewhat surprising - a collection of both white and black hat innovators who's activities often landed them on either side of the law, but who nonetheless had a tremendous impact on information technology as we know it today...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Why Your Router is the Weak Point of Your Home Security

June 05, 2011 Added by:Lee Munson

When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Beware of PC Remote Access Assistance Scams

March 11, 2011 Added by:Robert Siciliano

Criminals almost duped a man into handing over remote access to his computer, along with all his personal and financial information. The so-called technician started by telling the man his computer had sent an error message to Microsoft and he was calling to help him rectify the problem...

Comments  (3)

E973b16363b3de77b360563237df7e32

Avoid Security Issues When Servicing Desktop Equipment

January 21, 2011 Added by:Bozidar Spirovski

Contrary to the rules that everyone repeats about laptops, desktop computers do not have encrypted disk drives. So, an IT technician may pick up the computer with the functional hard drive full of information and send it off to an external vendor - thus creating a security incident...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attacking Computers and Smartphones via USB Cable

January 21, 2011 Added by:Headlines

Researchers have designed code which makes it possible to pilfer data when a smartphone is connected by USB cable with a computer. The code adds a mouse or keyboard function to the USB driver that allows the attacker to take control of the units and download files or upload malware...

Comments  (0)