Security Corner:

Security


July 29, 2015  5:19 PM

More on a novel password strengthening approach

Ken Harthun Ken Harthun Profile: Ken Harthun
Brute force attack, cybercriminals, Hackers, Password cracking, password encryption and decryption., Password hack, Security

Key to the...</p>
			<span class=

    0 Comments     RSS Feed     Email a friend

July 21, 2015  6:04 PM

A novel password strengthening approach

Ken Harthun Ken Harthun Profile: Ken Harthun
morse code, Password, Password cracking, password encryption and decryption., Security

We all agree that strong passwords are especially necessary in today's hack-a-day world and there are sites galore giving advice on how to create memorable strong passwords. I've posted more than my share of advice on this subject over the years. One thing that has always been frustrating is...


June 26, 2015  2:04 AM

Samsung making Microsoft a little unhappy

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Apple, Business, laptop, Microsoft, news, samsung, Security, Updates, Windows

You know the person in your office who leaves their passwords taped to the front of their monitor? Sure you do. They're putting everyone's data and hard work at risk because they've short-circuited the security process. It's not nice and it sometimes could cost the company money.

    0 Comments     RSS Feed     Email a friend


June 16, 2015  2:39 PM

Opiates, Hospital Records and Communication

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, Email, Hack, Healthcare, Password

In the news lately in MA is the discussion over stricter laws/legislation/rules about prescribing drugs. That's pretty much always been the case, but this time the...

    0 Comments     RSS Feed     Email a friend


June 11, 2015  1:50 AM

Hacking Roundup – Tech News World

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, Hacking, Internet, news

I like hacking news. Not because it trumpets vulnerabilities, but because it keeps people on their toes and holds all of us to common-sense standards. If we hear about someone waltzing onto the White House lawn, don't we all think a little harder about how we keep people off our business campus?...


June 1, 2015  12:22 AM

Airport Security Breaches – Inconvenient, but it’s not a data breach.

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, Security

In the news today is a story about how the the Winnipeg Airport had a security breach the other day and more than 400 flights were affected. It's just the latest of a series of breaches affecting...


May 11, 2015  11:22 PM

Football Security – Deflategate and its Lessons

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
football, Game, information, Security

A few moments ago the journalists on ESPN announced that Tom Brady - quarterback for the New England Patriots - has been suspended for the first four games of the 2016 NFL season. This is a result of the #Deflategate investigation and the penalties handed out by the league. Added to the penalties...


April 30, 2015  8:18 PM

NCIS New Orleans – Smuggling Information

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
computer, Data, PC, Security, Thumb drive

In a plot twist worthy of Back to the Future, X-Men and Mission Impossible, a recent NCIS New Orleans show dealt with data encryption and smuggling and kidnapping. That's not the coolest part. All of it was done using some real terminology and tools - not just movie magic or TV smoke and...


April 30, 2015  8:06 PM

Are You Driving an Easy Target? Car Security.

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Computers, Data, keys, Security

The television show Sherlock got me thinking about automotive security. While lots of folks are moving to cars with keyless entry and key fobs in their pocket and not in the dash, are thieves finding easier technological ways to boost your car?

    0 Comments     RSS Feed     Email a friend


April 30, 2015  7:11 PM

Five steps to avoid webcam spying

Ken Harthun Ken Harthun Profile: Ken Harthun
Security, spy, Webcams

If you recall, last year, Miss Teen USA, Cassidy Wolf's, computer was hacked and the hacker then attempted to "sextort" her by threatening to post nude photographs of her on various social media sites. The hacker employed the notorious Blackshades RAT malware on her laptop to do his dirty work....


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: