Understanding Your Computer: Email Clients
How do email clients work?
Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server.
For example, let’s assume that your email address is johndoe@example.com, and the person you are contacting is at [...]
Read More About - Understanding Your Computer: Email Clients »
Don’t Let Personnel Issues Become Security Issues
Terminate Computer Access Before You End a Contract or Tell People They Are Fired
Shortly before a labor union strike in August 2006, two Los Angeles transportation engineers allegedly disconnected traffic signals at four busy intersections. Subsequently, these disgruntled employees were accused of unauthorized access to a computer, identity theft and unauthorized disruption or denial of [...]
Read More About - Don’t Let Personnel Issues Become Security Issues »
Identifying Hoaxes and Urban Legends
Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or family members. Try to verify the information before following any instructions or passing the message along.
Why are chain letters a problem?
The most serious problem is from chain letters that mask viruses or other [...]
Widespread P2P Data Breaches
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those networks, who could use it to commit identity theft or fraud. The agency also has [...]
How To Choose An ISP
National Cyber Alert System
Understanding ISPs
ISPs offer services like email and internet access. Compare factors like security, services, and cost so that you find an ISP that supports all of your needs.
What is an ISP?
An ISP, or internet service provider, is a company that provides its customers access to the internet and other web [...]
Fraudulent Web Sites
We are aware of public reports indicating that attackers are using legitimate web pages to run malicious code on victims’ machines.
Reports, including a posting by Sophos, indicate that these messages
* Include keywords and names related to a current event (such as, the 9/11/2001 terrorist attack)
* Prompt users [...]
7 Practices for Computer Security
1. Protect your personal information. It’s valuable.
2. Know who you’re dealing with.
3. Use security software that updates automatically.
4. Keep your operating system and Web browser up-to-date, and learn about their security features.
5. Protect your passwords.
6. Back up important files.
7. Learn what to do in an e-mergency.
Access to information and entertainment, credit and financial services, products [...]
Alert: Apple iTunes
Apple Releases iTunes 8.2 and QuickTime 7.6.2
Apple has released iTunes 8.2 and QuickTime 7.6.2 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.
US-CERT encourages users to review Apple articles HT3592 and HT3591 and apply any necessary updates to help mitigate the risks.
Available for: Mac [...]
BlackBerry Security Advisory
Research In Motion has released security advisory KB18327 to address multiple vulnerabilities in the PDF distiller of the BlackBerry Attachment Service. By convincing a user to open a specially crafted PDF file on a BlackBerry smartphone, an attacker may be able to execute arbitrary code on the computer hosting the BlackBerry Attachment Service.
US-CERT encourages [...]
Obama Creating A “Cyber Czar”
Washington, DC — President Barack Obama considers computer security a top priority. Immediately after taking office, the President ordered the National Security and Homeland Security Advisors to conduct an immediate Cyber Security Review. The creation of the positioin “Cyber Czar” is a direct result of the security review.
——————————————
President Obama Directs the [...]