There is growing talk of cyberwar, as opposed to run-of-the-mill cybercrime. There are also terms that lies somewhere in the middle called cyber espionage, and cyber hacktivism--which is sort of like cyber terrorism for good guys. At the heart of the debate is an attempt to define the scope of an appropriate response to each type of threat.
Tony Bradley |
21 Feb |
Read more
Next Tuesday is a big deal. Yes, <a href="http://www.pcworld.com/businesscenter/article/249664/hackers_ask_will_you_be_my_valentine.html">it is Valentine’s Day</a>, but that’s not what I’m talking about. It is also the second Tuesday in the month of February which makes it Patch Tuesday. Microsoft revealed today that there are <a href="http://technet.microsoft.com/en-us/security/bulletin/ms12-feb">nine new security bulletins</a> slated for next Tuesday -- Happy Valentine’s Day?
Tony Bradley |
10 Feb |
Read more
There are only five days to Valentine's Day. Those of you who are shocked by that revelation are prime targets for Valentine's Day related spam and phishing attacks as hackers hope to catch you with your guard down for this day of romance.
Tony Bradley |
10 Feb |
Read more
Yesterday I talked about my concerns about <a href="http://www.pcworld.com/businesscenter/article/247226/the_cloud_day_20_what_about_security.html">the security of my data</a> if I store it in the cloud. It seems like an awful lot of faith to put in a third-party to expect it to protect my data. However, there is a flip side to that coin that suggests that maybe my data is better off in their hands than mine.
Tony Bradley |
06 Jan |
Read more
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of</a>.
Tony Bradley |
07 Dec |
Read more
It is an accepted axiom of computer and network security that the human being is the weakest link. Researchers at the University of Maryland are applying traditional criminology concepts to demonstrate that human beings may be the weakest link for the attackers as well. The insights learned may help improve computer defenses and <a href="http://www.pcworld.com/businesscenter/article/223483/mcafee_corporate_espionage_is_the_currency_of_cybercrime.html">thwart potential attacks</a>.
Tony Bradley |
30 Nov |
Read more
Next Tuesday is the second Tuesday in October, and that means it is <a href="http://www.pcworld.com/businesscenter/article/239954/microsoft_adobe_unleash_flood_of_security_updates.html">Microsoft Patch Tuesday</a>. Overall, it is a moderate month in terms of patch volume, but the couple that are rated as Critical should be addressed quickly to prevent exploits.
Tony Bradley |
07 Oct |
Read more
Computer and data security is becoming a much more complex issue to manage for many businesses and consumers. Webroot hopes to simplify it, and make sure you are protected no matter what device or platform you might be using with the <a href="http://www.webroot.com/En_US/consumer-products.html">launch of SecureAnywhere</a>.
Tony Bradley |
05 Oct |
Read more
Adobe issued a critical update today for its Flash Player software. The patch fixes six security vulnerabilities, at least one of which is a zero-day vulnerability being actively exploited in the wild.
Tony Bradley |
23 Sep |
Read more
Just when you were starting to get ahead of the curve when it comes to locking down the network and protecting PCs, everything went mobile. Not just laptops--but tablets, and smartphones that run unique operating systems and applications on completely different hardware. To help you combat the dramatic <a href="http://www.pcworld.com/businesscenter/article/229145/malware_spikes_spam_plummets_says_report.html">rise in mobile security threats</a>, McAfee has developed <a href="http://www.mcafee.com/us/products/enterprise-mobility-management.aspx">Enterprise Mobility Management</a>.
Tony Bradley |
21 Sep |
Read more
It is hard not to be the center of controversy when you're a site like WikiLeaks that <a href="http://www.pcworld.com/businesscenter/article/239196/wikileaks_cable_apple_slow_to_counter_chinese_fakes.html">specializes in exposing information</a> that was never intended for the general public. The whistleblowing, freedom of the press advocate is in hot water again as it is the victim itself of a breach that exposed US State Department communications that had been leaked to it.
Tony Bradley |
03 Sep |
Read more
Facebook recently rolled out a number of changes to the social networking site. One of the changes eliminates the <a href="http://www.pcworld.com/article/238708/facebook_revamps_locationsharing_feature_in_places.html">concept of Facebook Places</a>, but instead incorporates location-aware updates at virtually every level of Facebook. You might want to think twice, though, before <a href="http://www.pcworld.com/businesscenter/article/209709/facebook_deals_bring_customers_to_your_facebook_place.html">broadcasting your location</a> to the anonymous masses online.
Tony Bradley |
30 Aug |
Read more
Amazon introduced a new cloud service aimed specifically at the United States government this week. Although the <a href="http://www.pcworld.com/businesscenter/article/238276/amazon_boosts_web_services_security_for_government_agencies.html">Amazon Web Services (AWS) GovCloud</a> is targeted at government agencies, there are also some valuable lessons for private sector businesses and IT admins to learn about cloud servers and data storage.
Tony Bradley |
18 Aug |
Read more
The rise of smartphones and tablets brings unprecedented mobility, but with the convenience of being able to carry and access information from virtually anywhere comes <a href="http://www.pcworld.com/businesscenter/article/237839/mobile_apps_fail_big_time_at_security_study_says.html">an increased threat</a> that attackers can also steal or access your information from virtually anywhere. AT&T announced today that it is taking proactive steps to strengthen mobile security by <a href="http://www.att.com/gen/press-room?pid=20619&cdvn=news&newsarticleid=32381&mapcode=enterprise|mk-enterprise-security">investing in a new mobile security platform</a>.
Tony Bradley |
12 Aug |
Read more
At the <a href="http://defcon.org/">Defcon conference</a> in Las Vegas last week, kids aged 8 to 16 were <a href="http://www.pcworld.com/article/231228/you_can_bring_your_kids_to_defcon.html">exposed to the world of hacking</a>. Some may fear indoctrinating a new generation of <a href="http://www.pcworld.com/businesscenter/article/230485/we_owe_lulzsec_a_thank_you.html">Anonymous and LulzSec members</a>, but young minds can expand the horizons of technology and computer security to effectively combat hacking collectives such as these.
Tony Bradley |
09 Aug |
Read more