Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Question

    What are the main security risks of Bluetooth?

    Posted May 24, 2013 - 4:38 pm

    Bluetooth is nearly ubiquitous these days, but it is one potential attack vector that I haven't put much though into. What are the main things to worry about when it comes to Bluetooth security? I would think they would be limited due to the inherent short range of the signal.
  • Question

    How do you prevent default script attacks?

    Posted May 8, 2013 - 2:44 pm

    What steps should be taken to make websites secure against default script attacks?
  • Question

    How can I tell if someone has been logging into my gmail account?

    Posted April 26, 2013 - 2:46 pm

    Is there a way to see log-in history for your gmail account? I suspect that someone I know has, and I've already changed the password, but I'm not sure and I don't want to mention it if they aren't guilty.
  • Question

    How to avoid malware on Android devices?

    Posted April 17, 2013 - 4:46 pm

    Like any other operating system that becomes popular, Android is a target of individuals that want to install malware on devices. Earlier this week, Google removed thousands of apps from Google Play, although many of them were junk apps, and not specifically malware.
  • Question

    What could cause a pop-up warning that says "files being copied...."?

    Posted April 8, 2013 - 1:48 pm

    I was on my laptop, and a command prompt box popped up with "files being copied........". I closed my browser, disconnected from WiFi, and ran a fresh virus scan after making sure my anti-virus (AVG) was up to date. I couldn't find any problems, and nothing came up on my scans. Any ideas what caused this?
  • Question

    Fake article posted on Facebook - Can it cause a virus?

    Posted April 7, 2013 - 2:38 am

    I clicked on a supposed article my friend posted on Facebook via my IPhone 4s, and realized that it was not legit. I have then received failure Demon notifications in my yahoo mail account. I'm guessing it's a virus?? How do I remove this? I only ever access my email through my iPhone. I'm a bit worried that security gas been compromised.
  • Question

    How to prevent SQL injection attacks?

    Posted April 4, 2013 - 12:12 pm

    What do you to prevent SQL injection attacks beyond simply not allowing raw SQL to be passed to your database?
  • Question

    How can a DDoS attack on a single company slow down the entire internet?

    Posted March 27, 2013 - 4:20 pm

    The news wires have been reporting the largest DDoS attack in history is taking place today against a company called Spamhaus. I haven't noticed much of an impact, but the news reports suggest that the effect is being felt by companies including Netflix. How can a single attack have such a wide impact?
  • Question

    Are criminal penalties for hacking excessive?

    Posted March 19, 2013 - 1:00 pm

    This week Andrew Auernheimer was sentence to 41 months (!) in prison for exposing an AT&T security flaw.
  • Question

    what is the best free antivirus for 2013 ???

    Posted March 19, 2013 - 9:27 am

    Recently I had some problems with my pc. My keyboard stopped working properly. pc started doing things on it's own and it is slower than it should be.I have windows 7.
  • Question

    How to use Google 2-step verification with an older smartphone?

    Posted March 18, 2013 - 12:18 pm

    I've finally started practicing what I preach and using 2 step verification to log into my Google account since so much of my online life is so deeply integrated with Google - email, voice, wallet, play, et al. One of my Android phones is an old Motorola running 2.2 Froyo.
  • Question

    Could wearable authentication tokens replace passwords?

    Posted March 12, 2013 - 1:17 pm

    I saw that Google is testing a ring that acts as an authentication token. Obviously, a fair number of businesses use physical authentication tokens, but as far as I know they haven't been adopted for individual private use. Ok, I'm sure there are a few people out there using them, but I've never met them.
  • Question

    What are "hashed and salted" passwords?

    Posted March 4, 2013 - 4:20 pm

    I was one of the millions of Evernote users who had to reset their Evernote password this morning due to a security breach, but it seemed like most of the articles I saw about it downplayed the risk because passwords were "hashed and salted." While it sounds like a great breakfast order for WaffleHouse, what does hashed and salted mean regarding
  • Question

    What's the best way to check for keyloggers?

    Posted February 21, 2013 - 2:28 pm

    I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.
  • Question

    What is pwning?

    Posted February 20, 2013 - 10:35 am

  • Question

    How often should you conduct penetration testing?

    Posted February 13, 2013 - 4:56 pm

    What is a good rule of thumb to follow for penetration testing for IT security? How often is sufficient vs. being a waste of resources?
  • Question

    How reliable is VeriFace facial recognition software?

    Posted February 6, 2013 - 12:11 pm

    I use VeriFace to log onto my Lenovo laptop by default. It is quick and logs me in easily, but I have to wonder how secure it really is. Would some other brown haired, blue-eyed guy in his 30s fool the software on my laptop, for example? I'm a big fan of making things easier for myself, but I do need a modicum of security too.
  • Question

    Why are there so many issues with Java?

    Posted January 22, 2013 - 1:24 pm

    It seems that whenever there is a zero day vulnerability, there is a better than even chance that it will have something to do with Java. What is it about Java that makes it so prone to security threats? Oracle isn't exactly some start-up operating out of a garage, you would think they would have this Java thing figured out by now.
  • Question

    Any risk from Java if you use a Mac?

    Posted January 16, 2013 - 1:54 pm

    Is there a risk to Mac users from Java 7, or does it only apply to Windows PCs?
  • Question

    How to disable Java in Firefox

    Posted January 14, 2013 - 8:53 pm

    Help?
  • Question

    Should Android users worry about Java?

    Posted January 14, 2013 - 2:18 pm

    The US Government's security warning about Java on computers has been widely reported at this point, but I can seem to find what that means for Android users. After all, doesn't Android inherently use Java? Does the security vulnerability warned about apply to Android devices, and if so, what do you do about it?
  • Question

    How do you set up a VPN on Windows 8?

    Posted January 10, 2013 - 4:59 pm

    Anyone set up a VPN on Windows 8 yet?
  • Question

    How can I keep up to date on security issues?

    Posted December 28, 2012 - 12:32 pm

    It seems as if every day bring a new security threat, and I find it hard to keep up sometimes. Are there any sources/websites that are can help me keep up with security issues without draining all of my time?
  • Question

    Sites that are known to drop malware

    Posted December 20, 2012 - 12:02 pm

    Does anyone publish (or know about) a list of web sites that are known to drop malware when you browse to them?
  • Question

    How secure is FileVault?

    Posted December 19, 2012 - 1:21 pm

    I'm pretty new to the world of Mac, having used mostly Windows PCs for more years than I like to admit. I've never used FileVault before, but I just turned on FileVault on my work issued MacBook. Is this really a secure encryption method, or is it just a weak "consumer use" security blanket?
Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

Join today!

See more content
Ask a Question