Article Query: Computer Security
October 5, 2011

Not long ago, the phrase portable secure storage did not mean a great deal to the average business traveler. Today, however, carrying large amounts of data, including application files, digital photos, and music, is a reality for most tech-savvy travelers. Whether you are on the go for business or personal reasons, you likely carry a large quantity [...]

July 26, 2011

The term security posture is used in information security to describe the overall security effectiveness of a given system, service, or network.  All aspects of security strength and weakness are evaluated and weighed against both potential and known threats in an effort to gauge the current level of protection.  This same process can be used [...]

July 4, 2011

33% of people use the same password for every web site they access.  62% do not use complex passwords or change their password frequently.  Of the nearly 75 million scam emails sent every day, 2000 claim a victim.  73% of Americans were the victim of some form of cybercrime.  25% of all cybercrime remains unsolved.  The [...]

July 3, 2011

As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online.  As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not [...]

June 30, 2011

The U.S. District Court has ruled that a law suit filed against Google can proceed, paving the way for a  potential class-action lawsuit against the search engine giant for the illegal interception of open residential wireless access point transmissions. Judge James Ware rejected Google’s argument that a dismissal of the case was warranted because the wireless [...]

June 18, 2011

Microsoft announced on Thursday the findings of a survey which revealed that over 7000 Windows home and business customers in several countries–including the United States, United Kingdom, Ireland, and Canada–have been targeted by a phone phishing scam.  According to Microsoft, “the scam works by criminals posing as computer security engineers and calling people at home [...]

June 17, 2011

For many of us in the technology field the preventative measures we take to keep ourselves and our systems safe online can become second nature.  We become comfortable with the drill, so comfortable, in fact, we sometimes forget that not everyone may have the resources and technical information that we have at our disposal.  Keeping this in [...]

June 12, 2011

According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches.  As more hospitals and patient care providers move to store patient data electronically–primarily as a cost savings effort–the risk and exposure of our private medical information increases [...]

January 27, 2009

January 27th, 2009 On January 23rd, 2009 it was disclosed on the Monster.com website that a security incident occurred resulting in the unauthorized access of user data. The personally identifiable information of Monster.com customers was accessed and obtained by an unknown third party using an undisclosed method of access. This is the second such breach [...]

January 26, 2009

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised. According to Monster.com: “As is the case with many companies that [...]