Article Query: What is Information Security
October 5, 2011

Not long ago, the phrase portable secure storage did not mean a great deal to the average business traveler. Today, however, carrying large amounts of data, including application files, digital photos, and music, is a reality for most tech-savvy travelers. Whether you are on the go for business or personal reasons, you likely carry a large quantity [...]

September 5, 2011

It is no secret that cyber attacks are growing in complexity and severity.  In August of this year, a malware-powered cyber-reconnaissance attack, dubbed Operation Shady RAT, was reported by McAfee.  The cyber attack had been ongoing since 2006, and claimed victims across a wide spectrum of Internet connected organizations, including government agencies in the United [...]

August 15, 2011

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads.  The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was [...]

June 21, 2011

The recent announcement of a 13-year old security flaw found in an Open Source security library has renewed the debate between open source and closed source software.  The library, crypt_blowfish, allows for fast two-way password encryption.  The flaw introduces the potential for passwords to be easily compromised and affects PHP and a number of Linux distributions that [...]

June 12, 2011

According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches.  As more hospitals and patient care providers move to store patient data electronically–primarily as a cost savings effort–the risk and exposure of our private medical information increases [...]

February 23, 2009

U.S. Republican politicians on Thursday introduced a bill that would require Internet service providers and network operators to track the use of and maintain records for their publicly accessible wired and wireless networks. Two bills have been introduced — S.436 in the Senate and H.R.1076 in the House. Each of the bills carries the title [...]

January 27, 2009

January 27th, 2009 On January 23rd, 2009 it was disclosed on the Monster.com website that a security incident occurred resulting in the unauthorized access of user data. The personally identifiable information of Monster.com customers was accessed and obtained by an unknown third party using an undisclosed method of access. This is the second such breach [...]

January 26, 2009

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised. According to Monster.com: “As is the case with many companies that [...]

January 24, 2009

If current predictions are correct, 2009 will be a tougher year than 2008 in terms of the economy. In tough economic times such as these it becomes increasingly important for us to follow recommended safety practices when going online. As the numbers of Internet-related fraud and financial scams continue to increase we should expect the [...]