Security Corner:

Security


October 3, 2014  1:40 PM

JP Morgan Chase – Security Tactics 101

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Client, Data breach, Security

A new credit card came in the mail today. An actual card. Not an offer, not a temporary or fake card, but an actual, ready-to-activate credit card from a major financial institution.

What am I supposed to do with it? It feels great to be...

September 30, 2014  8:12 PM

According to employees, Home Depot was vulnerable for years

Ken Harthun Ken Harthun Profile: Ken Harthun
Data breach, Security, Software vulnerabilities, vulnerability management

On top of that, Home Depot hired a person who had been fired from another company for sabotaging their network. According to this article on ars technica,

Home Depot...


September 30, 2014  4:34 PM

Stealing PINs with an iPhone

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

If you're a profit-motivated cybercriminal willing to invest a couple of hundred bucks on some technology, you can easily steal anyone's PIN at most retail card terminals. [brightcove]  


September 29, 2014  3:59 PM

Cybercriminals infecting innocent computers worldwide

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

"What?" You say. "That's not news!" Well, it is when the cyber-criminals are your own government agencies. I'm just going to block quote this from Bruce Schneier's latest Crypto-gram newsletter:

There's a new story on the C't Magazin website about a 5-Eyes program to...


September 18, 2014  8:17 PM

Has Apple received an order under the Patriot Act?

Ken Harthun Ken Harthun Profile: Ken Harthun
Apple, Security, USA Patriot Act

According to ZDNet, Apple has removed the warrant canary from their transparency report,...


September 18, 2014  6:55 PM

Is that email malicious? Here’s how to tell

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

Ian Paul, writing in the Security blog for PCWorld, gives us three warning signs that email is malicious:

  1. Dear Customer -- an email not addressed directly to you using your registered name [or, with no salutation at all....


September 17, 2014  6:45 PM

Highly effective security: Watch that WiFi hotspot!

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

The proliferation of public WiFi hotspots has certainly made it convenient for mobile users, but it has also make it riskier. You have no control over the security features implemented, if any, and you have no way of knowing what they are. Therefore, you have to be extra cautious when using...


September 16, 2014  5:39 PM

Beware of this Facebook scam

Ken Harthun Ken Harthun Profile: Ken Harthun
cyberscams, Facebook, Security

facebook-logo1Beware of this Facebook...


August 31, 2014  3:15 PM

What?! You don’t run antivirus software? Are you nuts?

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

question-mark1 Bookmark and Share     1 Comment     RSS Feed     Email a friend


August 30, 2014  6:48 PM

A novel approach to creating secure pass phrases (that no one will use)

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

top500passwordsgraphicWe...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: