Friday, June 12, 2009

5 Tips for Businesses Entering Web 2.0

Remember the good old days, when all you needed was a phone number and maybe a street address to get in touch with someone? Slowly, new fields were added to our contacts lists: fax numbers, cell phone numbers, e-mail addresses, instant messaging IDs, URLs. And on top of all that we've added LinkedIn and Facebook accounts and connections through Twitter, Tumblr and more.
Communication and the tools to do it are forever evolving, and at an alarming rate. While it may feel overwhelming at times, all these ways to connect represent a tremendous opportunity for building communities to help us find and share information faster and more easily. In fact, tapping into social media to manage projects is a very efficient and forward-thinking way to keep everyone in the loop and come up with the best ideas for reaching goals.

Thursday, May 28, 2009

Running a Computer Without a Virus Scanner

From within your operating system, there are tools you can use to help ward off evil software, too. All browsers today, for instance, provide some security tools, including anti-phishing filters or lists of Web sites that are known carriers of harmful software. Use these features -- they won't slow you down. Common sense is your biggest defense. Read more about this on Enterprise - security -Today.

Source: http://www.enterprise-security-today.com/story.xhtml?story_id=130000AW5U4E

Wednesday, May 27, 2009

The 10 Most Dangerous Things Users Do Online


End users -- god bless ‘em. You can’t live with ‘em -- but without them, you wouldn’t have a job. They’re the reason you have an IT infrastructure; they’re also the single greatest threat to the security of that infrastructure. Because, in the end, most users have no idea how dangerous their online behavior is. No matter how many times they train them, no matter how many classes they hold, most IT professionals still watch helplessly as end users introduce new malware because they "just couldn’t resist looking at the attachment." Security pros cringe as their users download software for personal use, turn off firewalls to speed up a connection, or leave their passwords stuck to their laptops. Wouldn’t it be nice if you could give end users a list of the most dangerous things they do online every day, and then tell them why those activities are particularly risky?

"The Ten Most Dangerous Things Users Do Online," along with some explanation of the risks -- and solutions -- associated with each. This list was generated directly from input Drak Reading received from IT people like you, and is arranged in descending order of danger, based on votes received from the experts and analysts who make up Dark Reading’s editorial advisory board.
Click on the below link to read 'The ten most dangerous things users do online' Published at Dark reading.

http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208808175

Tuesday, May 26, 2009

NYC Officials Break Up International ID Theft Scam

Legitimate cards meant for Citibank, Chase and Capital One customers were somehow diverted into the hands of thieves who used them to withdraw thousands in cash. They would also use personal identification information, including mother's maiden name and Social Security numbers from real customers, to loot accounts.

Source: http://www.enterprise-security-today.com/story.xhtml?story_id=12200DOFXR4O

Monday, May 4, 2009

Facebook Boosts Security After Dual Phishing Attacks


Facebook has begun using MarkMonitor's antifraud services after two phishing attacks on Facebook users. Attacks on the site urged users to visit fbstar.com and fbaction.net. Victims of the attacks were critical of Facebook for not having anti-phishing security in place. MarkMonitor said Facebook's success makes it a natural target for attacks.
Facebook has brought in some soldiers to fight the war against malware and phishing scams on the social-networking site. After two different malware attacks this week, Facebook announced it would begin using San Francisco-based MarkMonitor's antifraud services as an additional layer of protection against attacks.

Monday, April 27, 2009

China Denies It Hacked into U.S. Jet Program

An official confirmed that hackers nearly two years ago breached a high-tech F-35 jet fighter program developed for the Pentagon by Lockheed Martin, but said it was unclear who did it and that classified information was not compromised. It was unclear whether the attack was an attempt at corporate thievery or a hacker trying to harm the program.

Source: http://www.enterprise-security-today.com/story.xhtml?story_id=12300DSH7OAR

Hackers Created 1.6 Million Security Threats Last Year

Hackers were responsible for creating 1.6 million new security threats last year, says Symantec.

According to the security vendor's Internet Security Threat Report, the web was the primary source of infection, with hackers relying on methods to embed malicious code into websites.

"As malicious code continues to grow at a record pace we're also seeing that attackers have shifted away from mass distribution of a few threats to micro-distribution of millions of distinct threats," said Stephen Trilling, vice president at Symantec Security Technology and Response.

The report also revealed that 90 percent of attacks were designed to steal personal information such as names, addresses and credit card details.

"The unfortunate reality is that innocent web surfers can visit a compromised website and unknowingly place their personal and financial information at risk," added Marc Fossi, executive editor of the report.

Source: http://www.pcadvisor.co.uk/news/index.cfm?NewsID=114252