Security Corner:

Security


October 16, 2014  12:28 PM

Password Mindsets and Landmines

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Authentication, computer, Data breach, Hackers, Security

The history of the password takes a few paths…none of which really makes sense if you’re focused on usability. But let’s jump in…

Once upon a time it was enough to be able to remember your first pet’s name and use that as your password for everything. Who...

October 8, 2014  4:22 PM

Photos that Expire – New App from MSFT

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Android, Data, IOS, Microsoft, Security

A news story just came across my desk touting the benefits of photos that expire. Just like a Mission Impossible assignment, the data shared expires after a short period of time....


October 3, 2014  1:40 PM

JP Morgan Chase – Security Tactics 101

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Client, Data breach, Security

A new credit card came in the mail today. An actual card. Not an offer, not a temporary or fake card, but an actual, ready-to-activate credit card from a major financial institution.

What am I supposed to do with it? It feels great to be...


September 30, 2014  8:12 PM

According to employees, Home Depot was vulnerable for years

Ken Harthun Ken Harthun Profile: Ken Harthun
Data breach, Security, Software vulnerabilities, vulnerability management

On top of that, Home Depot hired a person who had been fired from another company for sabotaging their network. According to this article on ars technica,

Home Depot...


September 30, 2014  4:34 PM

Stealing PINs with an iPhone

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

If you're a profit-motivated cybercriminal willing to invest a couple of hundred bucks on some technology, you can easily steal anyone's PIN at most retail card terminals. [brightcove]  


September 29, 2014  3:59 PM

Cybercriminals infecting innocent computers worldwide

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

"What?" You say. "That's not news!" Well, it is when the cyber-criminals are your own government agencies. I'm just going to block quote this from Bruce Schneier's latest Crypto-gram newsletter:

There's a new story on the C't Magazin website about a 5-Eyes program to...


September 18, 2014  8:17 PM

Has Apple received an order under the Patriot Act?

Ken Harthun Ken Harthun Profile: Ken Harthun
Apple, Security, USA Patriot Act

According to ZDNet, Apple has removed the warrant canary from their transparency report,...


September 18, 2014  6:55 PM

Is that email malicious? Here’s how to tell

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

Ian Paul, writing in the Security blog for PCWorld, gives us three warning signs that email is malicious:

  1. Dear Customer -- an email not addressed directly to you using your registered name [or, with no salutation at all....


September 17, 2014  6:45 PM

Highly effective security: Watch that WiFi hotspot!

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

The proliferation of public WiFi hotspots has certainly made it convenient for mobile users, but it has also make it riskier. You have no control over the security features implemented, if any, and you have no way of knowing what they are. Therefore, you have to be extra cautious when using...


September 16, 2014  5:39 PM

Beware of this Facebook scam

Ken Harthun Ken Harthun Profile: Ken Harthun
cyberscams, Facebook, Security

facebook-logo1Beware of this Facebook...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: