Preschool

37d5f81e2277051bc17116221040d51c

Students Getting Cyberwise to Become Safe and Responsible Digital Citizens

February 14, 2013 Added by:Robert Siciliano

Australian Prime Minister Julia Gillard unveils the new cyber education module, which was developed in partnership with McAfee and Life Education Australia.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Education Sector is Failing Security

May 13, 2010 Added by:Anthony M. Freed

“The Social Security numbers of about 30,000 people became vulnerable after malicious software attacked Penn State University computers,” announced the headlines in December 2009. “Other data breaches occurred in January and February and in December 2008. One targeted a single computer; the two others affected hundreds of individuals.”

Comments  (8)


From the Web

NC: Kids’ Social Security numbers on school postcards

December 05, 2009 from: Office of Inadequate Security

The Wake County [North Carolina] school system accidentally sent out about 5,000 postcards with students’ Social Security numbers printed on the front, a mistake that angered parents and will cost the district nearly $100,000 to remedy.

Comments  (0)


From the Web

Senate Panel Clears Data Breach Bills

November 05, 2009 from: Office of Inadequate Security

The Senate Judiciary Committee Thursday approved two companion bills that would require businesses and government agencies to notify individuals of security breaches involving sensitive personally identifiable information. Both bills go to the Senate for consideration.

Comments  (0)

B32b392ce3a707f05f4838c48c67d9cf

Good enough security?

October 29, 2009 Added by:Christopher Hudel

We have had 802.1x -- CISCO + Active Directory Integration --  in place for over a year know and it is largely a success; windows systems automatically obtain machine certificates (machines automatically receive certificates when they join the domain), supplicants exist for our IP Phones, and those devices (i.e.: printers)  that are currently incapable of 802.1x are split off in a tightl...

Comments  (2)

B038fefd7a19c26505d1f0671609d8ce

IT Security - Defense in Depth Protection using a Data-centric Model

October 29, 2009 Added by:Mike Cuppett

Start aligning your security strategy to better protect your organization's most critical asset - data. While many security proponents lean toward an outside-in strategy - protect every computer in the company from the outside world first - we really need to understand that the data is the asset that must be protected first and foremost.  The outside-in strategy starts at a macro level and ov...

Comments  (5)

A762974cfbb0a2faea96f364d653cbc6

Where are the DBAs?

October 07, 2009 Added by:Michael Menefee

What I really want to know is this: Where are the Database Admins (DBAs) these days? I cant tell you how many times in the past 18 months that I’ve found real enterprises running vulnerable databases with default passwords, weak passwords and no real permissions management.

Comments  (3)


From the Web

Study: 600K campus records hacked this year

September 21, 2009 from: Office of Inadequate Security

Computer hackers reportedly have stolen identifying information and credit card numbers from more than half a million — some 600,000 — college students, faculty, and alumni this year. This is prompting some campus IT officials to call for a “total overhaul” of computer security protocol.

Comments  (0)


From the Web

Website exposes sensitive details on military personnel

September 08, 2009 from: Office of Inadequate Security

Programming errors on a website that helps commuters carpool to work are exposing sensitive information of workers for hundreds of employers in Southern California, including at least one military installation.

Comments  (1)


From the Web

Email Obfuscation and Spam Robots

September 08, 2009 from: Rsnake's blog at ha.ckers.org

I’ve long been interested in spam and robots that scrape for email addresses. I’ve done tons of work in the space, although I’ve never published any of it. Call it more of a side hobby than anything I really want to go public with - as it is with a lot of my research

Comments  (0)


From the Web

Digital Direct reports breach

September 05, 2009 from: Office of Inadequate Security

Chris Cooper of Bloomberg.com reports that Digital Direct, Inc., a unit of Mitsubishi Corp., had a breach of their e-commerce web site that resulted in the compromise of 52,000 customers’ credit card numbers.

Comments  (0)


From the Web

Helping users keep plugins updated

September 04, 2009 from: Mozilla Security Blog

Starting with the upcoming releases of Firefox 3.5.3 and Firefox 3.0.14, Mozilla will warn users if their version of the popular Adobe Flash Player plugin is out of date. Old versions of plugins can cause crashes and other stability problems, and can also be a significant security risk.

Comments  (0)


From the Web

Best of Application Security (Friday, Sep. 4)

September 04, 2009 from: Jeremiah Grossman's Blog

Ten of Application Security industry's coolest, most interesting, important, and entertaining links from the past week -- in no particular order. Regularly released until year end. Then the Best of Application Security 2009 will be selected!

Comments  (0)


From the Web

Announcement Regarding The October 2009 Critical Patch Update

September 03, 2009 from: The Oracle Global Product Security Blog

Because many Oracle customers with responsibility for deploying the Critical Patch Update within their respective organizations will be attending Oracle OpenWorld on October 11-15, 2009; the October 2009 Critical Patch Update originally scheduled to be published on Tuesday, October 13th 2009, will be released on October 20th 2009.

Comments  (0)

A762974cfbb0a2faea96f364d653cbc6

OWASP Testing Guide Version 3

August 03, 2009

This is an excellent resource on the process of testing web applications for security vulnerabilities/general insecurities...this is by no means exhaustive nor perfect for every envirnment, but a valuable read for anyone who manages or tests web applications

Comments  (2)


From the Web

Leahy reintroduces data breach bill

July 23, 2009 from: Office of Inadequate Security

Senate Judiciary Chairman Patrick Leahy (D-Vt.) has reintroduced a data breach bill that would set tougher rules for government agencies and private sector firms regarding consumers’ personal information.

Comments  (0)