Archive for the ‘Safety rules’ Category

Shrturl: link shortened with fake web pages

Many users on social network use the short link services which comes to reduce the URL of the shared link. this helps on certain website such as twitter where you are allowed to post only 140 characters per post. on the other hand and from the security prospective this may involve negative points such as [...]

Share
cybermonday2

Moms: Protect Yourselves on Cyber Monday

Shopping with your kids on a normal day is a hassle. That hassle becomes a lot worse on Black Friday, when there’s a risk of losing your kids in the crowd, or worse, having them kidnapped, as Forbes cautions. Luckily for moms everywhere, there’s Cyber Monday, a day of online deals. Cyber Monday’s been growing [...]

Share

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it is stated the increase of highly sophisticated malwares that are targeting different operating and industrial [...]

Share

The Cloud Security Rules Book

The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO of a well-known brand – this book brings you relevant knowledge about security in the [...]

Share

10 Ways a Computer Virus is Like the Flu

I was noticing, a while back, that my computer and I have some things in common. In particular, we are seriously similar in how we act when we get sick. Here are 10 ways that a computer virus is like the flu, or, if you like, 10 ways my computer with a virus is like [...]

Share

NSA Presents “Best Practices for Keeping Your Home Network Secure”

‘Best Practices for Keeping Your Home Network Secure’ is a new document published by the National Security Agency, this document comes to help and provide simple users a path for keeping their system secure and protected. Home users are faced by many security troubles, applying all required security measures are complicated due to the fast [...]

Share

WikiLeaks: An experiment in failures?

By Rick Lawhorn CISSP, CISA, CHP, CHSS After the recent announcements concerning WikiLeaks, I began to question the whistleblower website on its motives and the perceived value of disclosure. In fits of brief clarity I find myself, like many others, asking if this latest disclosure was a failure in information security or simply visible failures [...]

Share