Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Question

    cloud printing to a standard printer connected to XP pc

    Posted April 8, 2014 - 5:43 pm

    To print from google cloud print to a standard (non-cloud) printer the printer must be connected to a computer with a wifi connection that runs google chrome. My printer is connected to a pc with the XP OS which became unsupported today.
  • Question

    What to do if you are not going to be able to replace Windows XP by May 13, 2014?

    Posted April 1, 2014 - 7:48 pm

    I think we will have all of the PCs in our office upgraded from Windows XP by the time support ends on May 13, but then again, maybe not. What should be done to minimize risks if you can’t get everything upgraded in time?
  • Question

    Where does “Atom feed” Google account activity originate?

    Posted March 26, 2014 - 4:38 pm

    I checked my Google account activity using the link at the bottom right of Gmail (saw this on an ITworld question last week, incidentally), and under “access type” there are a number of times that “Atom feed” accessed my account. I was freaked out for a second, but then I noticed the IP address for Atom feed was the same as mine.
  • Question

    How does Google determine that the apps on Google Play are safe?

    Posted March 24, 2014 - 10:50 pm

    One of the standard pieces of advice that is given about improving security and avoiding malicious apps on Android devices is to only download applications from a trusted source, which means Google Play, and to a lesser extent Amazon’s app store. But how does Google ensure that the apps on Play are safe?
  • Question

    How can Microsoft legally read a blogger’s hotmail emails to find the source of a leak?

    Posted March 21, 2014 - 12:55 am

    Microsoft apparently went through the hotmail account of the blogger who posted leaked Windows code to find the source of the leak. Can they just do this? Is it legal for them to just go through and read peoples' emails whenever they have what they think is a good reason to do so?
  • Question

    How safe is it to deposit checks using smartphones?

    Posted March 12, 2014 - 3:15 am

    In my bank statement this month, there was an insert about depositing checks to my account using either an Android phone or iPhone. It looks pretty much all you do is take a photograph of the check, confirm that the amount is correct, and Bob’s your uncle. I’m a little skittish about this though; is it really secure?
  • Question

    What type of activities should be avoided when using public Wi-Fi?

    Posted March 12, 2014 - 2:23 am

    When using my laptop or tablet with public WiFi, say at a coffee shop, what types of things should be avoided? I don’t do any banking, for example, but am I just being paranoid? How can I safely use public WiFi?
  • Question

    How to remove Genieo from MacBook?

    Posted March 7, 2014 - 9:22 pm

    I let my mother used my MacBook, and now it has Genieo toolbar adware installed on it. Thanks, Mom. It’s made a mess of my Mac, and I certainly don’t want to use their retched search engine. How can I get rid of this?
  • Question

    How secure is Office 365? Is it HIPAA complaint?

    Posted March 5, 2014 - 7:52 pm

    I’m attracted to Office 365 instead of continuing to use traditional software based Office. The overall cost should be lower, and it is quicker and easier to scale a cloud based service than it is to purchase and physically install additional software.
  • Question

    How to check software on PC to make sure it is patched/updated?

    Posted March 5, 2014 - 12:02 am

    Is there an effective way to make sure that all of the software on a Windows 7 PC is up to date?
  • Question

    How can a SMB establish an effective cyber-security plan?

    Posted February 28, 2014 - 2:02 pm

    I don’t work at a huge company with lots of resources at the moment. There are only a few of us here, and we all wear a lot of different hats. There isn’t a dedicated IT department, there are just a handful of people trying to make a small business successful.
  • Question

    How to encrypt SD card contents on Android?

    Posted February 28, 2014 - 1:49 pm

    I’m not too worried about the contents on my Android phone - I use a strong lock pattern, and have it setup so I can remotely wipe it using Google Android Account manager. But what about the SD card? Is there a way to remote wide it or encrypt the SD card contents so they are not exposed if my device is lost or stolen?
  • Question

    How to continue using OS X 10.6 Snow Leopard safely?

    Posted February 27, 2014 - 7:19 pm

    Apple has apparently stopped updating Snow Leopard. Is there any way to continue to use it safely, or is the only safe option an update to a newer version of OS X?
  • Question

    What is a “privileged network position?”

    Posted February 25, 2014 - 11:45 pm

    Apple's Gotofail security flaw has apparently been patched on both iOS and OS X. That’s great, although I’m concerned about the time between when I learned about it and when the flaw was introduced.
  • Question

    How to avoid questionable Android apps?

    Posted February 21, 2014 - 6:11 pm

    What are some good practices to avoid installing Android apps that aren’t malware, but play fast and loose with your privacy and information?
  • Question

    How to avoid Android E-Z-2 Use exploit?

    Posted February 19, 2014 - 10:51 pm

    This exploit has been around for over a year, but I just became aware of it. It uses a WebView vulnerability to inject JavaScript in the Android browser and potentially gain access to SD card files, contacts, the file system, camera and more.
  • Question

    What is the difference between CAPTCHA and reCAPTCHA?

    Posted February 17, 2014 - 7:07 pm

    I know that reCAPTCHA is later version of CAPTCHA, and both serve up challenges that, hopefully, humans will pass but bots will not. Is there an advantage for users (by users I mean the website using them) of one versus the other?
  • Question

    How to update Linksys router firmware?

    Posted February 14, 2014 - 6:16 am

    With news of the recent exploit of Linksys routers, I thought it might be a good idea to update my router's firmware. How do I go about doing this?
  • Question

    How does CAPTCHA help defend against DDoS attacks?

    Posted February 12, 2014 - 6:39 pm

    As I understand it, one of the goals of CAPTCHA is to mitigate the effects of DDoS attacks. How is this effective? Assuming that an attack is flooding the server with repeated log-in attempts either with or without CAPTCHA, what difference does it make?
  • Question

    Why are network time protocol amplification attacks more disruptive that other DDoS attacks?

    Posted February 11, 2014 - 11:19 pm

    Earlier this week, there was a DDoS attack on a Cloudflare customer that reached 400 gigabits per second and actually slowed network traffic across Europe. Apparently, it was a network time protocol amplification attack. What makes this type of attack so much more disruptive than other types of DDoS attacks?
  • Question

    Online banking security measures

    Posted February 8, 2014 - 1:49 am

    I'd like to have a better understanding of the security measures in place for online banking and remote access to online bank accounts. How hackable of these?
  • Question

    How to fix Windows 7 error, “Security Center service can’t be started?”

    Posted February 5, 2014 - 4:35 pm

    After getting a Windows Security Alert, I went into control panel>system and security>action panel, where it shows that “Windows Security Center service is turned off.” When I try to turn it on by clicking the “turn on now” box, I get a pop-up window that says “Security Center can’t be started.” Any ideas how I can fix this?
  • Question

    What steps should be taken to ensure data security for copiers?

    Posted February 5, 2014 - 12:13 am

    I did not realize until a week or so ago that many copy machines have an on-board hard drive that stores copies of the documents that are, er, copied. Frankly, I had never considered the potential security threat posed by a mere copy machine. What policies should be in place to help ensure data security with respect to copiers?
  • Question

    How to make sure Snapchat account info wasn’t stolen?

    Posted January 29, 2014 - 5:38 pm

    Is there a way to check to see if my Snapchat details were compromised in the recent breach? It’s getting hard to keep track of all the data breaches, there have been so many lately.
  • Question

    How does Windows Malicious Software Removal Tool work?

    Posted January 27, 2014 - 5:43 pm

    This is one of this things that is always updated on “Patch Tuesday” but as far as I know I have never used it, nor has it removed anything. How does the Malicious Software Removal Tool work? Does it just run in the background without any required input from me, or do I need to do something that I am not currently doing?

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question