Tag Archives: computer security

Basic Computer Security

There’s a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date. 1. Install security software: There is a lot of security software available and most well … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Basic Computer Security

JP Morgan Follow Up: 2 Factor Authentication Fail

Back in October, I wrote about JP Morgan getting breached, and 76 million households and 7 million small businesses were affected. (83 Million in total) Most big banks use two-factor authentication, which requires a second one-time password to gain access … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on JP Morgan Follow Up: 2 Factor Authentication Fail

Microsoft’s Safer Online Videos #NCSAM

The Internet’s Most Wanted! Subscribe to the Microsoft Safer Online Youtube channel here.

Posted in Security Blog | Tagged , , , , | Comments Off on Microsoft’s Safer Online Videos #NCSAM

An Introduction to Cyber Security

The Open University Presents: An Introduction to Cyber Security, which starts on October 13th, so register now! This free online course will help you to understand online security and start to protect your digital life, whether at home or work. … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on An Introduction to Cyber Security

Nude Celebs (The Fappening) !!! and Password Recovery

Nude Jennifer Lawrence… Sorta. Apple says that the mass theft of nude celebrity photos (Dubbed, the Fappening) that were released over the weekend did not occur because of a breach in any Apple systems, including iCloud. Apple also says that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Nude Celebs (The Fappening) !!! and Password Recovery

Mid-year 2014 Data Breaches Exposed

2014 is going to replace 2013 as the highest year on record for exposed records, according to Risk Based Security. Mid-year 2014 at a Glance … • There were 1331 incidents reported during the first six months of 2014 exposing … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Mid-year 2014 Data Breaches Exposed

More James Lyne, Anatomy of an Attack

I really like how passionate James Lyne is about his field. It was a presentation very similar to this that got me intrigued into the security field. It was a Cisco security conference in Tucson where the presenter hacked a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on More James Lyne, Anatomy of an Attack

QualysGuard

Need to learn Qualys? They offer free training on their website in video format. What is QualysGuard you ask? It’s basically a network scanning tool to scan networks to discover new or existing devices, perform compliance and vulnerability checks, and … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on QualysGuard

Six Failures of Target’s Non-Compliance

Ira Winkler, is very well known champion in the security arena who is super busy and he still found time to write this article on ComputerWorld in regards to the 6 Failures of Target. To summarize the article, basically, there … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Six Failures of Target’s Non-Compliance

Albert Gonzalez

It’s hard not to be a little envious of the amazing technical skills and charismatic charm of Albert Gonzalez. Then again, I’m glad I haven’t done anything as crazy and super happy to not be serving a 20 year sentence. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Albert Gonzalez