June 30, 2010  8:40 PM

How to Recognize and Avoid Email Scams – Part 1

Posted by: Ken Harthun
E-mail scam, Phishing, spam

Bookmark and Share     0 Comments     RSS Feed     Email a friend

June 30, 2010  8:27 PM

My Top Five Security Tools

Posted by: Ken Harthun
Security, Security tools, Top Five List, Utilities

Over the years, I've accumulated hundreds of tools and utilities that I use to help others--and myself--stay secure on the Web. In fact, I've compiled these into my Geek Toolkit which I've made available to...

June 27, 2010  9:19 PM

My Top Five Biggest Security Issues

Posted by: Ken Harthun
firewall, Password, Phishing, secrurity practice, Secure Computing, Security

How long have you been in...

June 27, 2010  2:59 AM

Vulnerability in Windows Help and Support Center Could Allow Remote Code Execution

Posted by: Ken Harthun
Microsoft, Patch management, Vulnerabilities, Zero-day vulnerability

This was first revealed on June 10, 2010 in...

June 26, 2010  3:30 PM

Scam Alert: Thanks for Your Order!

Posted by: Ken Harthun
E-mail scam, OpenDNS, Phishing, spam

Nothing new about these phishing scams, but it seems they've gotten more frequent. I've gotten my share of them before, but now two in as many days. Here's the first one purportedly about my amazon.com order that I never placed.

June 18, 2010  1:12 AM

Physical Security: Kwikset SmartKey Lock

Posted by: Ken Harthun
locks, physical security, security awareness, Security best practice

Bookmark and Share     0 Comments     RSS Feed     Email a friend

June 16, 2010  12:23 AM

Software for Secure Computing: Mozilla Plug-in Check

Posted by: Ken Harthun
Critical update, Firefox add-on, Insecure Plugins, Mozilla, Patch management

Plugins and add-ons, extensions, oh,my! If you use Firefox, chances are you have plenty of these things installed. I counted 15 on my installation. Of course, the plug-in check only checks plug-ins, but it serves to alert you to the possibility that other add-ons need attention. To check your...

June 12, 2010  1:13 AM

Craigslist Targeted Phishing Emails

Posted by: Ken Harthun
Email security, Phishing, Scam, Security, spam

Bookmark and Share     0 Comments     RSS Feed     Email a friend

June 9, 2010  12:59 AM

Should Internet Services That Can Be Used As Terrorist Tools Be Shut Down?

Posted by: Ken Harthun
cyber security, Cyber warfare, National security, terrorism

I first addressed this question three years ago in my seldom-updated Geek Gripes blog in response to Deb Shinder's editorial piece in Issue #285 of WXP News. With...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: