July 31, 2013  12:40 AM

Three ways to deal with an attack on your network



Posted by: Ken Harthun
Cybercrime, Ethical hacking, Hacker, hackers, Secure Computing, Security, Security best practice, Security management

chuck-norris-thumb

Bookmark and Share     2 Comments     RSS Feed     Email a friend


July 28, 2013  9:20 PM

Everyone knows Sarah



Posted by: Ken Harthun
Secure Computing, Security, Security best practice

Every day, I see student computers and laptops infected with malware. Every day, I see questionable posts made by people who think only their friends can see what they write. That's what "Sarah" thought and this video is a reminder that the internet is a very dangerous--and public--place. Please...


July 27, 2013  4:22 PM

Criminal ransomware tricks child sex abuse image addict into turning self in to cops



Posted by: Ken Harthun
Cybercrime, Malware, Poetic Justice, Secure Computing, Security

jay-riley

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 25, 2013  12:15 AM

Video: The internet is a dangerous place



Posted by: Ken Harthun
Secure Computing, Security, Video, YouTube

video1

Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 30, 2013  2:25 PM

Video: Three wireless security myths



Posted by: Ken Harthun
Secure Computing, Security, Security best practice, Security management, wifi

Sophos produces some excellent videos and this one definitely qualifies. I have been saying these things for years, but this video punches home the whys and wherefores of the three biggest wireless security myths. Enjoy! [brightcove]


June 30, 2013  1:49 PM

The security processes



Posted by: Ken Harthun
Secure Computing, Security, Security best practice, Security management

laptopinchains

Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 29, 2013  10:26 PM

Want to be secure? Be unpredictable



Posted by: Ken Harthun
Secure Computing, Security, Security best practice

We tend to be creatures of habit. For some areas of our lives, that's a good thing; there's nothing wrong with establishing healthy eating habits or good home maintenance habits. When it comes to security (both physical security and cyber security), however, habits can be a very bad thing. For...


May 29, 2013  8:02 PM

Is your password “qeadzcwrsfxv1331?”



Posted by: Ken Harthun
crackers, hackers, Password, Secure Computing, Security

If so, it has been cracked. And rather easily, I might add. How is it that a 16 character password with seemingly random characters could be easily cracked? The answer might surprise you and you'll definitely rethink the way you create passwords. An article on Ars Technica (


May 25, 2013  4:54 PM

Twitter now has two-factor authentication



Posted by: Ken Harthun
Secure Computing, Security, Security best practice, Security management, Twitter Attack, Two-factor authentication

twitter-bird-white-on-blue

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: