E-mail Is Insecure by Default
E-mail is insecure because it is more like a postcard, not a sealed envelope.
A number of people are under the misconception that when they draft and send e-mail, two things occur. Their message gets sealed in an envelope (that’s why you have to open e-mail right?) and that it goes directly to the person it [...]
Understanding Your Computer: Email Clients
How do email clients work?
Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server.
For example, let’s assume that your email address is johndoe@example.com, and the person you are contacting is at [...]
Read More About - Understanding Your Computer: Email Clients »
LifeLock “ID Theft Protection” Claims
HARRISBURG – Pennsylvania, along with 34 other states, has reached a $12 million settlement with LifeLock Inc, an Arizona-based company accused of making confusing or misleading statements in the advertisement and promotion of its identity theft protection services.
“Identity theft is a major subject of concern and consumers deserve clear and accurate information before they spend [...]
Widespread P2P Data Breaches
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those networks, who could use it to commit identity theft or fraud. The agency also has [...]
Top British Spy Life Put on Facebook by Wife… Cover Blown?
London — You need to be careful what you post to social networking sites. The Mail, a London newspaper, reported that the new head of the British Spy agency (Sir John Sawers ) the Secret Intelligence Service cover was blown on Facebook. The SIS, more popularly known as MI6, is England’s intelligence gathering organization. [...]
Read More About - Top British Spy Life Put on Facebook by Wife… Cover Blown? »
Phishing Scams: Chase, Bank of America, Sun Trust
Alert — There is a massive new bank fraud phishing scam being conducted via email. The website address that appears in the body of the email looks valid; however, if you view the source, you will see a bogus domain name. Clicking on the link will take you to an unauthorized website. [...]
Read More About - Phishing Scams: Chase, Bank of America, Sun Trust »
Google’s Latitude Tracks Your Every Move
Google has released a new application called Latitude. The service allows a user to share their physical location with friends and family. Using cell phones towers and WIFI connections, Google creates a map that shows your location and movements. Though they claim your privacy is protected, many people are concerned.
Here is how [...]
Read More About - Google’s Latitude Tracks Your Every Move »
Google’s New Web Browser Let’s You Go Incognito
Web browsing has become safer with Chrome, Google.com ’s browser. You can download it for free. It’s lightweight on your computer resources but heavy duty on surfing the web… pages load faster.
There is also an awesome feature that is the antithesis of Microsoft’s Internet Explorer (IE) web browser — secure browsing. Whereas Microsoft tries to [...]
Read More About - Google’s New Web Browser Let’s You Go Incognito »
Recovering from a Trojan Horse or Virus
by the United States Computer Emergency Readiness Team
www.us-cert.gov
Michael D. Durkota and Will Dormann It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, [...]
Is your company keeping information secure?
Federal Trade Commission
Are you taking steps to protect personal information? Safeguarding sensitive data in your files and on your computers is just plain good business. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. A sound data security plan is built on five key principles:
* Take [...]
Read More About - Is your company keeping information secure? »