Security Corner:

cyber security

December 31, 2010  12:40 AM

Friend Sent You a Link? Verify it!

Posted by: Ken Harthun
cyber security, Hacking, Phishing, Security best practice, spam

A friend of mine, whom I'll call Sally, told me of a recent hack on their PayPal account that could only have resulted from her clicking a link that a "trusted friend" sent her in an email. You know, one of those "You have to see this!" things. She gets them all the time of course, and most of the...

December 28, 2010  1:48 AM

Web Account Creation Tips

Posted by: Ken Harthun
cyber security, Password, Security best practice, User education

Although I consider it OK to use the same user name across multiple accounts, there's no question that using a different user name for each account along with a strong, unique password is probably a good idea. The more difficult you make it for hackers to guess your information, the more secure you...

December 26, 2010  3:11 PM

Have You Been Gawkered?

Posted by: Ken Harthun
cyber security, Hacking, Password, Vulnerabilities

A couple of weeks ago, servers at Gawker Media, Inc., who also runs the sites and were hacked by a group who calls itself Gnosis. Reportedly, more than 1.3 million user accounts, email addresses and passwords were obtained. The hacker group has managed to decrypt about...

October 20, 2010  5:49 PM

Why Trusting Users With Security is a Bad Idea

Posted by: Ken Harthun
cyber security, Security policy, Security practice

I have seen it happen time and...

October 10, 2010  1:54 PM

Five Poor Security Practices That Hackers Exploit

Posted by: Ken Harthun
cyber security, security audits, Security best practice, Security policy

Security audits are vital if you plan to keep your network safe in today's environment. It doesn't have to be complicated. Here are 10 of the most common poor security practices that hackers exploit.

  1. Using weak passwords - Don't even get me started on this one! Most of...

October 8, 2010  11:55 PM

It’s National Cybersecurity Awareness Month in the U.S.

Posted by: Ken Harthun
cyber security, microsoft security essentials, National Cybersecurity Month


September 30, 2010  6:22 PM

Breaking News: PandaLabs Publishes Interview with “Anonymous” Group Behind Operation Payback

Posted by: Ken Harthun
anti-piracy laws, cyber security, DDoS, Hacking, RIAA

PandaLabs has just published an exclusive Q&A with the leaders of the “Anonymous” group responsible for the anti-piracy motivated attacks against the Motion Picture Association of...

September 6, 2010  3:13 PM

Book Review: Scrappy Information Security by Michael Seese

Posted by: Ken Harthun
Book Review, cyber security, InfoSec, physical security, Security best practice, security training

Bookmark and Share     0 Comments     RSS Feed     Email a friend

September 4, 2010  2:12 PM

Security Online vs. Security in the Real World

Posted by: Ken Harthun
Anti-malware, Anti-virus, cyber security, Encryption, Firewalls, Intrusion detection, Intrusion prevention, physical security

Security online is analogous...

August 25, 2010  11:59 PM

Forty-Six Percent of SMBs Have Been Infected by Internet Threats

Posted by: Ken Harthun
cyber security, Panda Security, Security, security awareness

Panda's PR department sent me the following yesterday:

Panda Security, the Cloud Security Company, today announced the...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: