![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement: "A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it." I'm not making this up. Is this funny to anyone else? They do this everymonth and they are still the most popular web browser in the world! Don't get mewrong, the browser is good, as long as you don't mind "attackers"gaining control over it once in awhile. Who are these attackers? Is it acyber-geek with coke bottle glasses and an evil glint in his magnified eye?Could I tell if I saw one on the street? Would he have a lot of pens in the toppocket of his gangsta leather jacket? Does he have pentagrams sewn intohis polyester leisure suit? I know only one hacker, but he swears he's a"Light-Side" hacker. He hacks only for good. And what if we received these kinds of letters from othermanufacturers? "A security issue has been identified that could allowa pirate to board all pleasure boats running an outboard Mercury 150 and joyride it to Mexico for Cinco de Mayo. Install this jack screw on your rudder immediately." So let's review with an analogy because this is "critical". If you had a steel combination safe (your computer) in which you stored precious belongings,(your data) and you towed this safe around in a wagon throughmany of the world's most dangerous cities (surfing the internet), Microsoftannounced that there are 8 easy ways, and 4 just "so so" ways for thieves tobreak in and take everything you've got. But let's stay positive, the good news is,you can patch it all right up with a click. What could be easier? Maybethat's why we forgive them so often. Wouldn't it be great to get an email fromGM saying your vehicle will soon be stolen but click here and it will bealright. It's nice that theyannounce the holes and the patches together, that way I'm not so worried thewhole time before, while I browsed Internet Explorer around care free down themean streets of the internet completely innocent. I could have been E-jacked byI-marauders, demanding that I hand over every E & I in my wallet. The truth is, the good guys are winning the security battle online,why? Because they are rich and can hire the best light-side hackers moneycan buy. Even hackers known for evil all wind up working for large corporations.A headline of one going to jail for 18 months is a resume item on the lap ofevery CEO in the world with computers to protect. Now they're a cyber securityexpert, with all the dark secrets for sale! The speaking engagements startpouring in, "Come meet the man (or woman) who sent a KaGillion emails froma billion computers to Microsoft during lunch break. He did his time at ClubFed, and now works for the Department of Defense. So cyber villains may come and critical updates may go, I just click and fixmy way along the information highway and say a little prayer that the world's"attackers" never know I exist until they're on the payroll of the good guys somewhere. Rick David writes a humor column called,"Don't Laugh It Could Happen To You" forhttp://sandiego.merchantamerica.com
MORE RESOURCES: Bill in Maryland Senate would establish licensing and training standards for security guards CBS Baltimore 1 in 10 people in Wake County are food insecure. An updated plan seeks to bridge the gap. Raleigh News & Observer The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine With unbridled attack on security chiefs, Netanyahu shows he's at point of no return The Times of Israel Wayfair spent $668K on personal security for CEO Niraj Shah in 2022 - Boston Business Journal The Business Journals TSA highlights IND's gold-standard security model with two-week ... Transportation Security Administration Commissioners Vote for IT Security Enhancements Brownwood News Waterfall Security Solutions launches WF-600 Unidirectional ... Help Net Security US Security Assistance to Somalia • Stimson Center Stimson Center Spring Cleaning of Letters of Credit as Lease Security Deposits ... Holland & Knight Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... United States Mission to the United Nations Remarks at a UN Security Council Arria-Formula Meeting on ... United States Mission to the United Nations Fayetteville Tech will increase security after threat on social media The Fayetteville Observer Security guard shoots man at Fells Point pizza shop, police say WBAL TV Baltimore QOMPLX Joins IBM Security App Exchange Community as part of collaborative development to stay ahead of evolving threats Yahoo Finance Guatemalan Armed Forces Committed to Citizen Security - Diálogo ... Dialogo-Americas.com TSA: Pittsburgh International Airport employee, Munhall man caught with guns at security checkpoints CBS News EPD: Man swings sword at hospital security guard 14 News WFIE Evansville An update on Ukraine—security, economic, and humanitarian conditions Brookings Institution Iraq and Iran sign deal to tighten border security Al Jazeera English China's global diplomacy undermines Josh Hawley's security strategy Washington Examiner A sustainable future and food security for all: EU countries outline ... Présidence française du Conseil de l'Union européenne 2022 Mayor Adams to outline NYC security precautions as potential ... New York Daily News Daily Authority: Pixel's 'Acropalypse' security flaw Android Authority Council to vote on parks bond, local security Meridian Star Israel's National Security Council issues Passover travel warnings The Jerusalem Post FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Gee to outline financial security plan in State of the University address The Daily Athenaeum - thedaonline Former Deputy Secretary at Department of Defense,John C. Rogers, joins HUB Security Advisory Board Yahoo Finance Department of State Announces Plans to Implement the CHIPS Act ... Department of State Ukraine to try Kharkiv ex-security chief for treason FRANCE 24 English A New Security Category Addresses Web-borne Threats The Hacker News Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration Second try at attempted murder trial for case involving security guard at Kona hotel Hawaii Tribune-Herald FACT SHEET: President Biden Signs National Security ... The White House Biden Administration Announces Additional Security Assistance for ... Department of Defense Is Ether a Security? CoinDesk Microsoft Patch Tuesday, March 2023 Edition – Krebs on Security Krebs on Security CISA Regions CISA Flight attack raises questions about security, mental health The Associated Press FACT SHEET: Biden-Harris Administration Announces National ... The White House Infinity Global Cyber Security Services Check Point Software Security Measures Amtrak Media |
![]() |
![]() |
![]() |
RELATED ARTICLES
Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Detect Spyware Online You can detect spyware online using free spyware cleaners and by installing spyware protection software on your computer. Often it's best to start with free spyware cleaners because these free programs will remove any spyware programs currently running on your computer. Protecting Your Children On The Internet If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. ![]() |
home | site map |
© 2006 |