Infoworld reports on a new survey of corporate enterprises and the monitoring of their employees. Specifically, it addresses employee network activities and penalties for violating acceptable usage policies. According to the survey, one third of companies surveyed have fired employees for misusing their internet access, and a quarter of them have canned people for abusing […]
By Mark O’Neill For the past few years, I’ve been using AVG Anti-Virus to keep my computer safe from viruses, but deep down, I’m a pretty paranoid kind of guy. Even if AVG gives a file the all-clear, I’m often left wondering, what if AVG is wrong? What if AVG was sleeping on the job […]
There are few people who work with the Internet who understand how truly vulnerable and weak the core infrastructure really is. Nothing demonstrates this basic weakness better than the troubles experienced by YouTube over the past weekend when Pakistan, under orders from its government, put new BGP (Border Gateway Protocol) entries in one of their […]
WikiLeaks is an online clearinghouse for internal documents, memos, emails and bulletins from government agencies, banks, corporations and other entities that may suffer embarrassment should the documents be made public. In many cases, the documents are declassified or for “official use only” and I have even seen some classified material posted as well. The subject […]
In this segment of The Real Hustle, Jess shows why you should never, ever dump important documents in the garbage / recycling bin without having fed them to the paper shredder first.
In my last post, I urged readers to patch weak applications. How do you know which ones to patch? The hard way to do it would be to go through your program files and open each application, check the version, and then see if there is an updated version at the vendor’s website. Or you […]
Love them or hate them, Microsoft has come a long way in making their Windows operating systems secure, mostly by employing built-in firewalls, default security settings and auto-patching features. Despite this, Windows is still the most-targeted operating system on the part of attackers, simply because it is the most ubiquitous. Now, instead of targeting flaws […]
Yesterday, WordPress released a new version of their popular blogging software in response to a security issue. Apparently, there is a concern about the parsing of the xml remote procedure call. It seems specially crafted requests could allow anonymous, unauthenticated users to edit posts or even potentially deface a blog. The bad guys would likely use […]