The Only Secure Password Is the One You Can’t Remember
Let's assume you log onto a bunch of different websites; Facebook, Gmail, eBay, PayPal, probably some banking, maybe a few discussion forums, and probably much, much more. Consider a couple of questions:
- Do you always create unique passwords such that you never use the same one twice? Ever?
- Do your passwords always use different character types such as uppercase and lowercase letters, numbers and punctuation? Are they "strong"? read more
Honeywell’s Home Automation Touchscreen: Security Optional
New 6280 'graphical keypad' to feature WiFi, Z-Wave and Honeywell security sensor protocol; built-in Web server enables remote access to cameras, security, thermostats, lights, locks and more.
Honeywell isn't just for security anymore. At the Electronic House Expo last week, the company unveiled a home automation system -- security optional. read more
Anonymous Exposed: Hacker Group Infiltrated, Chat Logs Leaked
Late last week Gawker posted a story outing correspondence between users thought to be "leadership" members of the internet hacker and activist group Anonymous, one previously referred to in the press as non-hierarchical. In the chat logs, a clear chief can be seen giving orders to his fellow "anons" as the small group takes credit for hacking the emails of computer security firm HBGary and ravaging the security of Gawker.com back in December. The chat logs have since been revealed......... read moreExpert: RSA security breach compromised key federal networks
A product many federal employees use to log on to computers and networks should be regarded as compromised, due to the infiltration of key information about the application during a cyberattack against manufacturer RSA, some security experts said. read more
Mobile security moving to the forefront?
Extending central station monitoring beyond the homeMobileTREC solutions work with both smartphones and traditional mobile phones and address a 2010 call to action from the FCC. After the Virginia Tech shootings—during which students allegedly....... read more
Local ethical hackers nurtured in Kenya
EC-Council, leaders in information security training and education in conjunction with SIMOS Consultancy Services launched a network security product to deter hackers' from infiltrating information systems. read more
Malware exploding, especially on mobile devices
Two reports find malware growth in the double digits. Mobile devices are the latest favorite cyber crime target says McAfee.Mobile malware is soaring and Adobe is the main vector of attack, according to new figures from security firm McAfee that were issued Tuesday. read more
Facebook is biggest mobile malware threat, says security firm
Researcher claims bad links on Facebook responsible for much higher infection rate that targeted mobile malware.The biggest mobile infection threat isn't malware that specifically targets mobile devices.... read more
3 reasons trustworthy sites can no longer be trusted
Research from Blue Coat Systems claims cybercriminals have shifted their malware-delivery technique from the internet's shadier sites and are hacking the domains we visit every day
Last year, malware became increasingly more
read more
9 Dirty Tricks: Social Engineers' Favorite Pick-Up Lines
Congrats on your inheritance! Okay, you knew that one's the start of a scam. Here are other come-ons you'll encounter when criminals come knocking
What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks (See: Social Engineering: Eight Common Tactics). Here we look at some of the most common lines these people are using to fool their victims.. read more
Social Media Risks: The Basics
Social media sites unfortunately pose many security risks for the unwary. Here's a guide to avoiding scams of all sorts.
You may be a champ at Mafia Wars and Farmville, but what do you know about the security risks of social media sites?
read more