Security Corner:

September, 2015

September 30, 2015  9:10 PM

There’s no place like

Ken Harthun Ken Harthun Profile: Ken Harthun

During a recent rash of malware infections on students' laptops, most of which were probably drive-bys or served by frames in otherwise innocuous pages, I remembered a solution that had once served me well: A HOSTS file. As you know, a HOSTS file is a text file on your computer that is used to map...

September 30, 2015  7:14 PM

Password guidance from Britain’s CPNI

Ken Harthun Ken Harthun Profile: Ken Harthun
Password management, Password policies, Passwords, Security

Britain's Centre for the Protection of National Infrastructure (CPNI), which works with General Communications Headquarters (GCHQ), recently issued a publication...

September 29, 2015  3:41 PM

Passwords today: How long and how complex is enough?

Ken Harthun Ken Harthun Profile: Ken Harthun
Data breach, High performance computing, Passwords, Security

In these days of of high profile data breaches, it behooves us to take another look (or two) at passwords.  Computing power has increased at phenomenal rates over the years making it (relatively) straightforward to defeat short and simple passwords with common, freely available hacking tools. If...

September 18, 2015  7:37 PM

Ransomware on the rise

Ken Harthun Ken Harthun Profile: Ken Harthun
Cybercrime, cybercriminals, malware, Ransomware, Security

cryptolockerAccording to the

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: