Security Corner:

Security


January 12, 2015  6:00 PM

Getting Locked Out! How much security is too much?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Access, Business, Customers, home, ROI, Security

Sometime in October of 2014 I got locked out of my house. The back door has a lock in the handle and a deadbolt. For some reason my keys were inside on the counter as I went out on the deck and pulled the door shut behind me. I immediately realized two things.

    1 Comment     RSS Feed     Email a friend

January 1, 2015  8:29 AM

Paranoia and Personal Security – Redux

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, Mobile, Security, Technology

I got a lot of feedback for my last column of 2014 and not all of it was complimentary. You see, some of the theories I shared and opinions I voiced were based on a decade of being an early adopter of new technology. It placed me in a land where my perspective was polluted because I...


December 31, 2014  5:30 PM

Happy New Year!

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

I wish all of my readers, colleagues and employees of the TechTarget companies a Happy, Safe & Prosperous New Year.

    1 Comment     RSS Feed     Email a friend


December 31, 2014  5:27 PM

There’s a new, free, CA in town

Ken Harthun Ken Harthun Profile: Ken Harthun
Certificate authorities, Encryption, Open source, Security

It's called "Let's Encrypt," and it's a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan.

Let’s Encrypt is a new free certificate authority, built on a foundation of cooperation...


December 30, 2014  6:20 PM

Where are you now? Are you Secure? What about your data?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Applications, Data, location, Security, social media, Technology

As we close the year 2014, I was struck by a few thoughts - and I’ll likely post another blog entry tomorrow before we ring in the new year. But for now, I was wondering about location-based services and personal security.

It occurred to me as I...


December 26, 2014  3:38 PM

Obama’s response to alleged N. Korea cyberattacks: Grandstanding, or truth?

Ken Harthun Ken Harthun Profile: Ken Harthun
Security

Last Friday (12/20/2014), Barack Obama confirmed that the White House believed that North Korea engaged in a cyberattack against Sony Pictures.

They caused a lot of damage, and we will respond. We will respond proportionally, and we'll respond in a place and time and manner...


December 24, 2014  6:13 PM

ATM skimmer doesn’t work? No sweat, just blow it up!

Ken Harthun Ken Harthun Profile: Ken Harthun
ATM, Banking industry, NCR, Security

I guess it's rather dark humor because it happens, but I find it funny how far these cyber-idiots will go to steal from an ATM. From Krebs on Security: "According to quarterly reports from the European ATM...


December 24, 2014  6:09 PM

Apple Pushes out Security Update — HORRORS!

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Apple, Data, news, Security, Update, Windows

To hear Apple fanatics tell the story, the recent (and supposedly first ever) automatic security update marks the end of the company. Apple is doomed now that it has gone the way of MSFT and

    0 Comments     RSS Feed     Email a friend


December 16, 2014  10:06 PM

This ransomware is also a true virus

Ken Harthun Ken Harthun Profile: Ken Harthun
'Virus`, Ransomware, Security, Sophos

gremlinA new ransomware threat, which is...


December 16, 2014  7:58 PM

Symantec: 91% increase in targeted attack campaigns in 2014

Ken Harthun Ken Harthun Profile: Ken Harthun
best practices, SANS, Security, Symantec

Symantec has released its Internet Security Threat Report for 2014. The report is based on an analysis of data from its Global Intelligence Network. You can obtain a copy of the report here:

    0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: