Tag Archives: internet security

Check Your Computer’s Security with these 14 links

With October being Cyber Security Awareness Month, these links help you see if you are secure. http://daol.aol.com/security/computer-checkup http://www.auditmypc.com http://www.bitdefender.com/scan8/ie.html http://shop.ca.com/STContent/Resources/Resources.aspx http://www.eset.com/online-scanner http://onecare.live.com/site/en-us/default.htm?s_cid=sah http://www.kaspersky.com/virusscanner http://us.mcafee.com/root/mfs/default.asp http://www.pandasecurity.com/activescan/index/?track=1&Lang=en-US&IdPais… http://www.symantec.com/securitycheck http://housecall.trendmicro.com/housecall/start_corp.asp http://www.webroot.com/En_US/land-ss-promo-freescan.html https://browsercheck.qualys.com http://www.qualys.com/stopmalware

Posted in Computers | Tagged , , , , | 2 Comments

National Cyber Security Awareness Month 2014

Become a company or organization that helps bring Cyber Security Awareness to users. TCAT Shelbyville has been listed as a champion for years and promotes cyber security awareness to higher education and end users. List of all champions Activities you … Continue reading

Posted in Technology | Tagged , , , , | Leave a comment

Free tool repairs critical Windows configuration vulnerabilities

“”Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and servers.”” Free tool repairs critical Windows configuration vulnerabilities (By AddThis – NetSecurity.org)   This excellent tool scans your system … Continue reading

Posted in Technology | Tagged , , , , , | Leave a comment

300,000-plus wireless routers have malicious changes

ARSTechnica outlines how hackers have made malicious changes to routers….again. Researchers said they have uncovered yet another mass compromise of home and small-office wireless routers, this one being used to make malicious configuration changes to more than 300,000 devices made … Continue reading

Posted in Technology | Tagged , , , , , | Leave a comment

Solving The Security Workforce Shortage – DarkReading

According to the study, the most sought-after quality is a broad knowledge of security — more of a strategic understanding than technical know-how — followed by certifications.  Read More Opinion – While certifications are an important part of IT, the … Continue reading

Posted in Apple, Computer Security, Computers, Education, Information Technology, Linux, Mobile Computing, network, Networking, Technology, Windows | Tagged , , , | Leave a comment

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment

October is National Cyber Security Awareness Month

National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Free Security Check … Continue reading

Posted in Apple, Business, Computer Security, Computers, Education, Information Technology, Linux, Medical, network, Networking, Technology, Ubuntu, Windows | Tagged , , , , , , , , , | 1 Comment

Experts hope for another failure in next Anonymous attack

“Anonymous’ failed attack against Israeli websites last month has left security experts cautiously optimistic that the hacktivist group will be unsuccessful in its plans to disrupt U.S. government and banking sites. Anonymous plans to launch distributed denial of service (DDoS) … Continue reading

Posted in Information Technology | Tagged , , , , , | Leave a comment

Unseen, All-Out Cyber War on the U.S. has Begun

“There’s a war going on, and it’s raging here at home — not in the streets or the fields, but on the Internet. You can think of it as a war on the digital homeland. If you work for a … Continue reading

Posted in Apple, Business, Computer Security, Computers, Education, Information Technology, Internet, Linux, network, Networking, Technology, Windows | Tagged , , , , , | Leave a comment

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment

Ever wonder how much cybercrime pays?

Paul’s Internet Security Blog references a Networkworld article that gives the approximate pay for criminals who participate in cybercrime.  Go over and see just how much money is given to the lower end criminals.   The question is how much … Continue reading

Posted in Technology | Tagged , , , | Leave a comment

For midsize businesses, there is a new way to spell risk: BYOD

“Online and offline, in IT departments and across organizations, the bring your own device (BYOD) debate is raging….For midsize businesses, there is a new way to spell risk: BYOD.

Posted in Computer Security, Computers, Education, Hacking, Networking, Organizations, Technology, Windows, Wireless | Tagged , , , , , , | Leave a comment

How hackers used vendors to erase someone’s digital life

Wired recently posted and excellent article on how hackers used vendors to erase the digital life of Mat Honan. See how the hackers used pieces of accounts to piece together his online accounts to gain access to his information and … Continue reading

Posted in Computers | Tagged , , , , , , , | Leave a comment

Panetta: Chinese Cyberattacks Unabated | CIO Today

China-backed hackers’ tactics are continuing and evolving, U.S. Defense Secretary Leon Panetta says, and are expanding and focusing more intently on critical American oil, gas and other energy companies. Chinese officials have steadfastly denied the cyberattacks, saying they also are … Continue reading

Posted in Computers | Tagged , , , , , | Leave a comment

One Minute of Botnet Traffic

Credit to Bill Mullins for posting this at his blog – original post at ThreatPost

Posted in Computers | Tagged , , , , , , | Leave a comment

Attackers Turn Password Recovery Into Backdoor – Dark Reading

The assault on CloudFlare shows that companies have to pay attention to how their security services are locked down and how the credentials for those services can be recoveredAttackers Turn Password Recovery Into Backdoor – Dark Reading.

Posted in Computers | Tagged , , | Leave a comment

Making the consumer realize there is security threats is your job

Should we live in fear and distrust or should we be cautious and diligent with the protection of our data?  We worry about American companies taking away our privacy and tracking our every move.   What should we really worry … Continue reading

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Internet, network, Networking, Organizations, Technology | Tagged , , , , , , | Leave a comment

Get the most out of security and remove viruses and malware

Here’s a few links and tips on maintaining your computer and repairing your computer. Cleaning your computer and protecting your computer: Cleaning and protecting your computer CCleaner (http://www.piriform.com/promo/ccleaner-180412?gclid=COSzg877668CFQlN4AodSBXc0Q) MSConfig – only needed programs in the startup group (Run MSConfig in … Continue reading

Posted in Computers | Tagged , , , , , , , , , , , , | Leave a comment

Experts Tell Senate: Government Networks Owned, Resistance Is Futile

Network security experts from across the U.S. government told a U.S. Senate Armed Services Subcommittee Tuesday that federal networks have been thoroughly penetrated by foreign spies, and that current perimeter-based defenses that attempt to curb intrusions are outdated and futile. … Continue reading

Posted in Computer Security | Tagged , , , , | Leave a comment

Just click away – it’ll be ok…

Here’s 10 things the younger generation is doing online and how they can stop behavior that can lead to malicious theft of data and great food for thought about their online reputation. 10 things Gen Y do online.. and shouldn’t.  … Continue reading

Posted in Computers | Tagged , , , , , , , , , , , , , | Leave a comment