April 30, 2011  10:37 PM

Think You’re Not a Target Because You’re Small? Think Again

Posted by: Ken Harthun
Credit Card Fraud, data breach, Data Theft, Hacker, Online banking fraud, security audits, Security best practice, SQL Injection

If you pay attention to mainstream media, you can easily get the wrong idea about online attacks. The press usually only covers the sensational data breaches like the recent Epsilon and Sony fiascoes. Truth is, there are far more people at risk than the press leads you to believe. Consider the...

December 2, 2010  9:26 PM

Hackers Target Holiday Trending Topics on Twitter to Spread Malware

Posted by: Ken Harthun
Hacking, Malware, Panda Security, Social media, Social Networking Hacks, Twitter

Bookmark and Share     0 Comments     RSS Feed     Email a friend

September 17, 2010  1:24 AM

Panda Security Publishes Findings from 1st Annual Social Media Risk Index for SMBs

Posted by: Ken Harthun
Facebook, Privacy, Security best practice, Social media, Twitter, YouTube

If you're not familiar with this great company, you need to be. I've written about them here on several occasions. It seems to me that in this highly competitive security industry, these people just seem to want to do it right. They have great products and they're attentive to their clients and...

April 2, 2010  3:00 PM

Twitter is Under Attack Again

Posted by: Ken Harthun
Blackhat SEO, cyber security, Security, Trending topic attack, Twitter

Bookmark and Share     0 Comments     RSS Feed     Email a friend

December 20, 2009  5:51 PM

ExecTweets IT

Posted by: Ken Harthun
InfoSec, Security, Twitter

While searching for some relevant...

November 9, 2009  1:27 AM

Javascript Must Die!

Posted by: Ken Harthun
Exploits, insecure, javascript, Opinion, Security, Vulnerabilities

At least that's what Mr. John Graham-Cumming says on his blog--and what he told attendees at Virus Bulletin 2009 in his presentation called, "

August 28, 2009  2:39 AM

Twitter Security: TwitBlock Blocks the Spammers

Posted by: Ken Harthun
Fraud, Phishing, Scam, Secure Computing, Security, Security management, Social Engineering, Twitter

Besides being a security Geek, I’m also an Internet marketer (no, not the bad kind—the good kind—I actually try to help people with what I sell). Twitter, at first blush, appears to be a great way to get your message out; it probably is, if done right, but it’s also easily abused. Yes,...

August 14, 2009  7:18 PM

Gmail Vulnerability Points Up the Need for Strong Password Policy

Posted by: Ken Harthun
Email security, Exploits, Gmail, insecure, Password, Secure Computing, Security, Vulnerabilities

There’s a vulnerability affecting Gmail accounts that was recently announced by security researcher Vincente Aguilera Diaz. You can read the posting on the Full Disclosure security list which contains complete...

August 14, 2009  3:02 AM

Twitter Used As Botnet Command & Control Channel

Posted by: Ken Harthun
Botnet, Exploits, Security, Twitter

A botnet that uses Twitter for command and control? You bet. Jose Nazario over at Arbor Networks apparently found one: “Basically what it does is use the status messages to send out new links to contact, then these contain new commands or executables to download and run.” The bots connect to...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: