Category Archives: Privacy

It’s no longer news that popular sites like Facebook and Twitter provide alluring forums for hackers to lure victims into their traps. As social networks gain new users, cybercriminals increasingly exploit the platforms to spread their malware. However, cyberscams on … Continue reading

Posted in Privacy | Tagged , , , | Leave a comment

USB drives and external hard drives are useful tools for backing up data or transporting files from one computer to another. Yet research shows that many people are careless with these devices. A study conducted in London and New York … Continue reading

Posted in Privacy | Tagged , | 1 Comment

Internet access is like a window — you can see out but other people can also see in. If your information isn’t protected, your computer may be accessible to the criminals and hooligans of the online underworld. Since an ounce … Continue reading

Posted in Privacy | Tagged , | Leave a comment

How much is your identity worth, or at least a small portion of it? Your email username and password, particularly if you are one of many who use Google’s Gmail, are more valuable than you might think, but remain a … Continue reading

Posted in Privacy | Tagged , | Leave a comment

Have you ever accepted a random friend request on Facebook? Maybe from someone who looks a little bit familiar but you can’t quite place, or someone who is a friend of a friend, or even just someone who looks potentially … Continue reading

Posted in Privacy | Tagged , | Leave a comment

These days, it’s hard to go a day without reading news about Facebook and/or Twitter, most revolving around online security, privacy concerns, or the latest cyberattack. One site that seems to fly under the radar is LinkedIn, the social networking … Continue reading

Posted in Privacy | Tagged , , | Leave a comment

As we choose to reveal more and more personal information to others via blogs, social networks, and email, privacy concerns are of paramount importance. Although most of us simply don’t want our personal lives to intersect with our professional lives, … Continue reading

Posted in Privacy | Tagged , | 1 Comment

There are many dangers lurking online – from identity theft to malicious software. Yet, many might not immediately think about the threats that can come from one’s own peers. Cyberbullying is a problem that affects nearly half of American teenagers, … Continue reading

Posted in Privacy | Tagged , | Leave a comment

While some online users may think that choosing an unsecured WiFi network at a coffee shop or friend’s apartment is a harmless endeavor, there are, in fact, many dangers linked to this kind of risky behavior. An unsecured WiFi network … Continue reading

Posted in Privacy | Tagged , , , | Leave a comment

In a previous post, the concept of spear-phishing was introduced. Its more common relative, phishing, is one of the most notorious online security threats. Phishing refers to an attempt by a hacker to obtain confidential information about a user through … Continue reading

Posted in Privacy | Tagged , , , , , | 2 Comments

Most computer users don’t think twice about opening their chosen web browser and searching, exploring and clicking their way to a wealth of information. But how often do you think about how safe the communication portal is? Browsers of all … Continue reading

Posted in Privacy | Tagged , , | Leave a comment

In this growing age of iPhones accompanying silverware at the dinner table and Blackberrys being a table ornament at most business meetings, the question arises of the security of such devices. The rapidly growing demographic of Smartphone and PDA users … Continue reading

Posted in Privacy | Tagged , , | Leave a comment

Open up the wireless network manager on your laptop and chances are you’ll come across a string of available networks, most secured, but a couple not. In a pinch—you just need to check your email really quickly—you might select one … Continue reading

Posted in Privacy | Tagged , , | Leave a comment

Whether looking for a great restaurant in your neighborhood or researching your next vacation, going online is quickly becoming the easiest way to find anything for which you might be looking. A company’s online reputation, therefore, is crucial to maintaining … Continue reading

Posted in Privacy | Tagged , , , | Leave a comment

Debates still rage over what constitutes a good, secure password. A recent Lifehacker article linked to a much older article by Founding Editor Gina Trapani entitled “Choose (and remember) great passwords” (2006). Her suggestions are smart and reasonable, aimed at … Continue reading

Posted in Privacy | Tagged | Leave a comment

The U.S. Secretary of Homeland Security Janet Napolitano was this morning’s keynote speaker at RSA Conference 2010, speaking about succeeding in the cybersecurity battle. She joins the list of prominent speakers this week, along with Symantec’s Enrique Salem on “Defeating the … Continue reading

Posted in Privacy | Tagged , | Leave a comment

Banload is a malware name that is typically associated with banking trojan downloaders, but the Banload-detected sample covered in this post is a bit different than the norm.  The MD5 hash for this sample is 707D3477CBBEAD4923B17CE353D9761D. And, just to note, … Continue reading

Posted in Privacy | 4 Comments

A strange conclusion to Steve Lohr’s NY Times article yesterday “Companies Fight Endless War Against Computer Attacks“, reporting that federal mandates may be considered for software at some point because of market failures. “Just as the government eventually stepped in to … Continue reading

Posted in Privacy | 3 Comments

…John Schiefer is pleading guilty to four federal charges related to fraud and wiretapping. Mr. Schiefer is only 26 years old: Los Angeles hacker to plead guilty to infecting 250,000 computers to steal identities One of the awful things about … Continue reading

Posted in Privacy | Tagged , , | Leave a comment