Security Corner:

Secure Computing


October 15, 2009  3:18 AM

Convert a USB Thumb Drive into a ROBAM



Posted by: Ken Harthun
ROBAM, Secure Computing, Security, Security policy, Security practice

What's a ROBAM? you ask. Check out this post: Protecting Your Business from Online Banking Fraud. SANS says, "The number one recommended...

October 13, 2009  1:20 PM

Protecting Your Business from Online Banking Fraud



Posted by: Ken Harthun
Cybercrime, Fraud, Linux, Microsoft Windows, Online banking fraud, Secure Computing, Security, security awareness

Bookmark and Share     1 Comment     RSS Feed     Email a friend


September 19, 2009  3:05 PM

Malvertising an Ever-expanding Threat



Posted by: Ken Harthun
Anti-malware, Cybercrime, Firefox, Fraud, Malware, Microsoft Windows, Scam, Scareware, Secure Computing, Security

As if we don’t already have enough to deal with, it seems that malvertising--a technique where malicious code is placed in an online ad to either mislead the user or infect their computer—is on the rise. Microsoft recently filed five lawsuits against unnamed individuals accusing them of posting...


August 31, 2009  10:40 PM

Have You Noticed? Phishing Attacks Are Down



Posted by: Ken Harthun
insecure, Malware, Phishing, Secure Computing, Security, Social Engineering, Trojan

It’s just not in fashion anymore; phishing attacks are ‘way down, falling out of favor with cybercriminals who now prefer malicious websites and password-stealing Trojan horse programs.

IBM's security research and development division, X-Force, recently issued a report that found...


August 31, 2009  2:05 AM

14 Golden Rules of Computer Security



Posted by: Ken Harthun
Opinion, Secure Computing, Security, Security management, Security maxim, Security tools

In celebration of (almost) being close to releasing my first eBook to the general public, I’m releasing the list of the 14 Golden Rules of Computer Security in hopes that any last minute errors will be spotted by my peers here at IT Knowledge Exchange. Here’s the list:

#1: The best...


August 28, 2009  2:39 AM

Twitter Security: TwitBlock Blocks the Spammers



Posted by: Ken Harthun
Fraud, Phishing, Scam, Secure Computing, Security, Security management, Social Engineering, Twitter

Besides being a security Geek, I’m also an Internet marketer (no, not the bad kind—the good kind—I actually try to help people with what I sell). Twitter, at first blush, appears to be a great way to get your message out; it probably is, if done right, but it’s also easily abused. Yes,...


August 24, 2009  1:40 AM

Un-guessable Passwords—How to Make Them



Posted by: Ken Harthun
Opinion, Password, Secure Computing, Security, Security management

The sheer number of passwords most of us have is a big problem. Even if we have hints written down, how do we know which one created the password for which login? It would appear as though we're back to writing them down or using a password manager. Don't worry, though. Here's how to create...


August 20, 2009  12:41 AM

Peter Piper Picked a Perfect Password Pattern



Posted by: Ken Harthun
Password, Secure Computing, Security, Security tools

A little Alliteration is good for writing effect every now and then; why not apply this to passwords? I don’t mean to write out an alliterative phrase and turn it into a password or passphrase (though you could, I guess); what I mean is to use a pattern that makes it easy for you to...


August 19, 2009  2:04 AM

Passwords, Again



Posted by: Ken Harthun
Hacking, Microsoft Windows, Password, Secure Computing, Security, Security maxim

The Sydney Morning Herald reports, “Hackers break into police computer as sting backfires:”

An Australian Federal...


August 14, 2009  7:18 PM

Gmail Vulnerability Points Up the Need for Strong Password Policy



Posted by: Ken Harthun
Email security, Exploits, Gmail, insecure, Password, Secure Computing, Security, Vulnerabilities

There’s a vulnerability affecting Gmail accounts that was recently announced by security researcher Vincente Aguilera Diaz. You can read the posting on the Full Disclosure security list which contains complete...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: