E-mail is insecure because it is more like a postcard, not a sealed envelope.
A number of people are under the misconception that when they draft and send e-mail, two things occur. Their message gets sealed in an envelope (that’s why you have to open e-mail right?) and that it goes directly to the person it [...]
How do email clients work?
Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server.
For example, let’s assume that your email address is firstname.lastname@example.org, and the person you are contacting is at [...]
HARRISBURG – Pennsylvania, along with 34 other states, has reached a $12 million settlement with LifeLock Inc, an Arizona-based company accused of making confusing or misleading statements in the advertisement and promotion of its identity theft protection services.
“Identity theft is a major subject of concern and consumers deserve clear and accurate information before they spend [...]
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those networks, who could use it to commit identity theft or fraud. The agency also has [...]
London — You need to be careful what you post to social networking sites. The Mail, a London newspaper, reported that the new head of the British Spy agency (Sir John Sawers ) the Secret Intelligence Service cover was blown on Facebook. The SIS, more popularly known as MI6, is England’s intelligence gathering organization. [...]
Alert — There is a massive new bank fraud phishing scam being conducted via email. The website address that appears in the body of the email looks valid; however, if you view the source, you will see a bogus domain name. Clicking on the link will take you to an unauthorized website. [...]
Google has released a new application called Latitude. The service allows a user to share their physical location with friends and family. Using cell phones towers and WIFI connections, Google creates a map that shows your location and movements. Though they claim your privacy is protected, many people are concerned.
Here is how [...]
Web browsing has become safer with Chrome, Google.com ’s browser. You can download it for free. It’s lightweight on your computer resources but heavy duty on surfing the web… pages load faster.
There is also an awesome feature that is the antithesis of Microsoft’s Internet Explorer (IE) web browser — secure browsing. Whereas Microsoft tries to [...]
by the United States Computer Emergency Readiness Team
Michael D. Durkota and Will Dormann It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, [...]
Federal Trade Commission
Are you taking steps to protect personal information? Safeguarding sensitive data in your files and on your computers is just plain good business. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. A sound data security plan is built on five key principles:
* Take [...]