Monday, November 16th, 2009
Finally, some help with explaining internet security to my non-geek friends! The Guide to Scary Internet Stuff video series will hopefully make my life a little easier. Explaining the intricacies of Internet security is a challenging task. I often have difficulty explaining to my non-technical friends and relatives why they ...
Posted in Internet, Privacy, Security | No Comments
Monday, November 16th, 2009
Nearly 80 percent of security products fail to perform as intended when first tested and generally require two or more cycles of testing before achieving certification, according to a new ICSA Labs report. The “ICSA Labs Product Assurance Report” - co-authored by the Verizon Business Data Breach Investigations Report research ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, November 14th, 2009
A Swiss grad student has devised a serious, real-world attack on Twitter that targeted a recently discovered vulnerability in the secure sockets layer protocol.The exploit by Anil Kurmus is significant because it successfully targeted the so-called SSL renegotiation bug to steal Twitter login credentials that passed through encrypted data streams. ...
Posted in Internet, Networking, Privacy, Security | No Comments
Monday, November 9th, 2009
If you spend much time online, you probably have the same problem I do: How to remember your ever-growing list of online usernames and passwords-and stay secure at the same time.
You're savvy enough to know that identity theft and illegal access to personal and financial data are real-world problems that ...
Posted in Internet, Privacy, Security | No Comments
Thursday, November 5th, 2009
Software makers around the world are scrambling to fix a serious bug in the technology used to transfer information securely on the Internet.The flaw lies in the SSL protocol, best known as the technology used for secure browsing on Web sites beginning with HTTPS, and lets attackers intercept secure SSL ...
Posted in Internet, Networking, Privacy, Security, Software | 1 Comment