8 Dirty Secrets Of The IT Security Industry
Bill Brenner at CSO Magazine is quoting IBM ISS Security Strategist Joshua Corman who has been on a crusade with his 8 Dirty Secrets campaign. Here they are and I'm quoting Dirty Secret ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Bill Brenner at CSO Magazine is quoting IBM ISS Security Strategist Joshua Corman who has been on a crusade with his 8 Dirty Secrets campaign. Here they are and I'm quoting Dirty Secret ...
An ordinary piece of spam slips through the filters, and you see a gorgeous sandy beach with palm trees. It's an enticing ad for a vacation to a tropical island, basically a big picture ...
Neil Rubenking, who has been writing about antivirus for 30 years now, came up with an excellent article about what to do when your personal email or social media account. This is a ...
IT pros surveyed by Network World and SolarWinds shared a range of tactics for handling the mobile device management challenge. Mobile devices are multiplying and -- sanctioned or ...
Last week you may have read a headline that blared "100 million TVs will be Web-connected by 2016." Regular readers of this blog know I'm always on the lookout for new threats, so the ...
The Criminal Tracker app by U.S. Publications Inc says that a study by the U.S. Department of Justice has revealed that sex offenders are four times more likely to re-offend than other ...
[caption id="" align="alignleft" width="260" caption="Vaccine"][/caption] Simon Edwards created a great blog post about this April 12, 2012. He started out with: " Once upon a time, ...
[caption id="" align="alignleft" width="250" caption="MS DOS 6.0"][/caption] Remember MS-DOS Version 6? It was released March 1993. The new 6.0 had a lot of new stuff including a basic ...
Cybercriminals are as organized and industrious as any legitimate business. Case in point: exploit kits, also known as crimepacks, which bad guys can purchase and which make infecting ...
Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things ...
Roger Grimes made this remark on InfoWorld when he commented on the 2012 Verizon Data Breach Investigations Report that was released last week. What he said was: "You should enable event ...
The CSO website reported: "A Mac trojan horse spotted by security analysts since last year has infected more than 600,000 Apple computers, says Dr. Web, a Russian antivirus vendor. Apple ...
This is a good hint for your users from the Microsoft website: "If you plan to share an electronic copy of a Microsoft Word document with clients or colleagues, it is a good idea to ...
Roger Grimes at InfoWorld observes something encouraging..."Every public speaker and writer likes a good catchphrase or refrain that will grab the audience's attention. One of mine: ...
[caption id="" align="alignleft" width="650" caption="Advanced Persistent Threat"][/caption]
[caption id="" align="alignleft" width="290" caption="Global Payment Hacked"][/caption] This is what they said in their press release: Global Payments Inc. (NYSE: GPN), a leader in ...
[caption id="" align="alignleft" width="175" caption="Fighting Phishing"][/caption] BankInfo Security summarized the phishing problem for the Financial Industry, and quotes the security ...