E-mail Is Insecure by Default
E-mail is insecure because it is more like a postcard, not a sealed envelope.
A number of people are under the misconception that when they draft and send e-mail, two things occur. Their message gets sealed in an envelope (that’s why you have to open e-mail right?) and that it goes directly to the person it [...]
Understanding Your Computer: Email Clients
How do email clients work?
Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server.
For example, let’s assume that your email address is johndoe@example.com, and the person you are contacting is at [...]
Read More About - Understanding Your Computer: Email Clients »
Secure Your Wireless Network
Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information.
How do wireless networks work?
As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your [...]
Beware Of USB Flash drives
1.If you find a USB token in the wild, don’t plug it into your USB port as it could autoinstall software if your system is set to autoplay CDROMs.
2.Though many organizations’ standards call for disabling autoplay of CDROMs, you should check and set yours. To disable autoplay follow these instructions (for WinXP):
Open My Computer
Right click [...]
LifeLock “ID Theft Protection” Claims
HARRISBURG – Pennsylvania, along with 34 other states, has reached a $12 million settlement with LifeLock Inc, an Arizona-based company accused of making confusing or misleading statements in the advertisement and promotion of its identity theft protection services.
“Identity theft is a major subject of concern and consumers deserve clear and accurate information before they spend [...]
Don’t Let Personnel Issues Become Security Issues
Terminate Computer Access Before You End a Contract or Tell People They Are Fired
Shortly before a labor union strike in August 2006, two Los Angeles transportation engineers allegedly disconnected traffic signals at four busy intersections. Subsequently, these disgruntled employees were accused of unauthorized access to a computer, identity theft and unauthorized disruption or denial of [...]
Read More About - Don’t Let Personnel Issues Become Security Issues »
Identifying Hoaxes and Urban Legends
Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or family members. Try to verify the information before following any instructions or passing the message along.
Why are chain letters a problem?
The most serious problem is from chain letters that mask viruses or other [...]
Widespread P2P Data Breaches
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those networks, who could use it to commit identity theft or fraud. The agency also has [...]
Internet Access For Visually Impaired
For more information visit: “100% access to information and communication with 0% human rights violations”
Nearly 200 cyber experts and other stakeholders seeking access to the Web for scores of millions of people with visual and other disabilities wrapped up a four-day United Nations workshop in Geneva today, stressing the need for universal access despite handicaps.
“The [...]
Virtualized Operating System For Supercomputer
The Department Of Energy National Laboratories — New work on the Red Storm supercomputer at DOE’s Sandia National Laboratories is helping to make supercomputers more flexible and accessible, in effect removing them from the constraints of their specialized operating systems. Sandia researchers, working with researchers from Northwestern University and the University of New Mexico, socialized [...]
Read More About - Virtualized Operating System For Supercomputer »