Latest Blog Posts

37d5f81e2277051bc17116221040d51c

Dumb Criminals – The Best Way to Get Caught? Call 911!

April 05, 2010 Added by:Robert Siciliano

In Daytona Beach, Florida, the dumb criminal capital of America, two Florida teenagers are facing charges after breaking into cars. Apparently one teen’s phone was programmed to call 911 and the phone was smarter than the teens and called (maybe accidentally) 911 to inform law enforcement of the crimes taking place.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Beware of Door to Door Conmen

April 05, 2010 Added by:Robert Siciliano

There are bazillion scammers using a bazillion ruses to get your money. The lowest of the low are the ones who scam the elderly. These same conmen often do it door to door and can be very dangerous. Con men posing as city employees seem to be the most effective scam. In one incident 2 men posed as city workers who were trimming trees in a neighborhood. One man would knock on the door and schmoo...

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Why bother with PGP ...???

April 04, 2010 Added by:K S Abhiraj

The very nature of email communication makes it perfect for spying and tapping. Imagine all the emails that fly across the Atlantic Ocean. Every single one of them could be tapped without you even noticing it. Of course, thinking that someone will sit and read every single one of them is preposterous - but the "problem" is that nobody has to.

Comments  (12)

924ce315203c17e05d9e04b59648a942

2010: A Year of Change for the Security Industry

April 04, 2010 Added by:Richard Stiennon

2010 is going to be a dramatic year for the security industry.  Vendors and security professionals should prepare for a sea change.   Here are my predictions for the year. 

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

The Biggest Risk to Security Might Be You...

April 04, 2010 Added by:Theresa Payton

Everyone asks me what the greatest theat to security is. They are visibly disappointed when I give them my answer...I believe it is you or maybe your co-worker.

Comments  (7)

49afa3a1bba5280af6c4bf2fb5ea7669

RSA March 2010 Intelligence Report

April 02, 2010 Added by:Mike Meikle

I’ve been ramping up with client projects over the last month so I haven’t been schedule some serious writing time. Excuses aside, I’m being lame it seems.  However, the latest RSA Intelligence Report has crossed my virtual desk, and I’m posting it for good measure

Comments  (0)

09e5dbdf8a3bd6dccce5621459b11e26

Vector 2 Security show - Windows Forensic Toolkit

April 01, 2010 Added by:Mark Bennett

Well everyone the Vector 2 Security Show here in Novi Michigan was a huge success! We had a large group that packed them out to standing room only in the back.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Inside the Perplexities of Enterprise Privacy Policies

April 01, 2010 Added by:Rebecca Herold

An important consideration with information security incidents is identifying if personally identifiable information (PII) is involved. If it is, then the privacy breach response teamneeds to be put into action to determine whether or not an actual privacy breach occurred.

Comments  (0)

Ba5964a1284ac16d4277991e7225699c

Sometimes, some stuff should just stay private...

April 01, 2010 Added by:Jason Remillard

As reported in the past few days, a site selling  Durex condoms have had a small 'exposure' problem.  As reported, the site had been suffering (time length unknown) from several basic security exposures, including even allowing orders to be viewed online, without a login - simply by changing the order number!

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

How to Avoid the New BOTNET Herders

March 31, 2010 Added by:Theresa Payton

There’s a new game in town offering jobs to anyone with a home office and a computer.   Be careful what you or your kids accept when applying for jobs online.  You or your kids may be accepting a job working for a cybercriminal outfit.

Comments  (2)

E973b16363b3de77b360563237df7e32

Mitigating Risks of the IT Disaster Recovery Test

March 31, 2010 Added by:Bozidar Spirovski

The IT Disaster Recovery Test as part of the Business Continuity testing is becoming an annual event for most IT departments. It is mandated by a lot of regulators, nearly insisted upon by internal audit and ofcourse a very healthy thing to do.

Comments  (0)

6d117b57d55f63febe392e40a478011f

ISAlliance/ANSI Report: The Financial Management of Cyber Risk

March 30, 2010 Added by:Anthony M. Freed

According to the White House Cyberspace Policy Review (CSPR), between 2008 and 2009 American business losses due to cyber attacks had grown to more than $1 trillion of intellectual property - a staggering figure that impacts not only American business, but also our national security, which is dependent upon a robust and secure information infrastructure.

Comments  (0)

959779642e6e758563e80b5d83150a9f

Changing Your Security Requires Learning about Change

March 30, 2010 Added by:Danny Lieberman

Reading through the trade press, DLP vendor marketing collateral and various forums on information security,  the conventional wisdom is that the key threat to an organization is trusted insiders.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Social Media and Identity Theft Risks PT II

March 30, 2010 Added by:Robert Siciliano

Now that the 3 major search engines Google, Bing and Yahoo index real-time search for Twitter and other social networks, consumers and employees must be aware that not all relevant search is a safe click. Scammers and identity thieves see this as real-time free advertising for their malware.

Comments  (2)

F520f65cba281c31e29c857faa651872

An Interview with Symantec CEO Enrique Salem

March 29, 2010 Added by:Rahul Neel Mani

Enrique Salem, President and CEO of Symantec, in a conversation with Vinita Gupta, discusses the new challenges that CIOs are facing and Symantec's roadmap for the years ahead.

Comments  (0)

E973b16363b3de77b360563237df7e32

Accelerating Assessment with MS Security Assessment Tool

March 29, 2010 Added by:Bozidar Spirovski

When working on a security assessment, it is always helpful to use an automated tool that compares the key elements to the known best practices, and generates an overview result set.

Comments  (0)


« First < Previous | 472 - 473 - 474 - 475 - 476 | Next > Last »