Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information.
How do wireless networks work?
As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your [...]
1.If you find a USB token in the wild, don’t plug it into your USB port as it could autoinstall software if your system is set to autoplay CDROMs.
2.Though many organizations’ standards call for disabling autoplay of CDROMs, you should check and set yours. To disable autoplay follow these instructions (for WinXP):
Open My Computer
Right click [...]
For more information visit: “100% access to information and communication with 0% human rights violations”
Nearly 200 cyber experts and other stakeholders seeking access to the Web for scores of millions of people with visual and other disabilities wrapped up a four-day United Nations workshop in Geneva today, stressing the need for universal access despite handicaps.
HARRISBURG – A Maryland-based computer training school that suddenly closed in mid-December, after taking nearly $2 million dollars in tuition payments from Pennsylvania students, is the subject of a lawsuit filed by the Attorney General’s Bureau of Consumer Protection.
Attorney General Tom Corbett said the suit was filed against ComputerTraining.com, Inc., (ComputerTraining) which offered computer training [...]
The IBM X-Force 2009 Mid-Year Trend and Risk report finds growing security concerns related to surfing the web.
“The trends highlighted by the report seem to indicate that the Internet has finally taken on the characteristics of the Wild West where no one is to be trusted,” said X-Force Director Kris Lamb. “There is no such [...]
For the fifth year, the National Cyber Security Division (NCSD) is spearheading National Cyber Security Awareness Month, a comprehensive outreach campaign to empower all Americans and businesses to take steps to secure their part of cyberspace. Click here to get more information on steps you can take to contribute to cyber awareness activities.
Announcing the 5th Annual GFIRST National Conference
at the Omni Hotel at CNN Center in Atlanta, Georgia – August 23-28, 2009
GFIRST5: The Five Pillars of Cyber Security: Threat, Vulnerability, Attack & Detection, Mitigation and Reflection. These foundations support the cyber security and incident response community by identifying the core components of incident management. [...]
A massive phishing scam similar to the recent bank fraud scams is being sent in emails that look like the following:
From: “Microsoft Customer Support”
Subject: Update for Microsoft Outlook
Update for Microsoft Outlook / Outlook Express (KB910721)
Microsoft has released an update for Microsoft Outlook / Outlook Express. This update is critical and provides [...]
Microsoft Releases Advance Notification for May Security Bulletin
added May 7, 2009 at 02:58 pm
Microsoft has issued a Security Bulletin Advance Notification indicating that the May release cycle will contain one bulletin with a maximum severity rating of Critical. The notification states that the Critical bulletin is for Microsoft PowerPoint. The release is scheduled for Tuesday, [...]
Mozilla has released a new version of the Firefox web browser. “Firefox has security, speed and new features that will change the way you use the Web. Don’t settle for anything less.”
The Safest Web Browser
Mozilla says, “Simply put, your online security is our top priority. Firefox includes strict anti-phishing and anti-malware measures, plus easy ways [...]