Skip to main content

Home/ SASSIT/ Group items tagged security

Rss Feed Group items tagged

Peter Ruwoldt

How to Secure Your Wireless Network - 0 views

  •  
    If you don't take steps to secure your wireless network, anyone within range of your router can easily connect to your network. With the latest high performance equipment, your Wi-Fi signal could reach clear down the block. In fact, a hacker could intercept your Wi-Fi signal as far as ten miles away, using a Wi-Fi antenna created with a Pringles can.
Peter Ruwoldt

Sectera Edge: A BlackBerry Secure Enough For Obama? - PC World - 0 views

  •  
    President Barack Obama may be getting a souped-up, super secure version of the BlackBerry called the Sectera Edge, recent speculation suggests. The NSA-certified device could allow Obama to fulfill his wish of staying connected, some suspect, while also addressing the numerous security concerns that come with the territory.
Peter Ruwoldt

SSL Search : Features - Web Search Help - 0 views

  •  
    With Google search over SSL, you can have an end-to-end encrypted search solution between your computer and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party. This provides you with a more secure and private search experience.
Peter Ruwoldt

Antivirus Inventor: Security Departments Are Wasting Their Time - Desktop Security News... - 0 views

  •  
    the inventor of the program that became Norton AntiVirus -- said that about one third of today's security practices are based on outmoded or outdated concepts that don't apply to today's computing environments.
Peter Ruwoldt

Security in the information age - 0 views

  •  
    Has article that looks at the major security risks posed to organisations by ICT. Most of these are framed in terms of risks to private businesses
Peter Ruwoldt

Australian-Records - Background Check, People Search, Court Records, Mugshots,Public Re... - 0 views

  •  
    This information includes address history, phone numbers, possible aliases, neighbors, a criminal and civil records check, marriage records and much more! You can start your background checks with a name, maiden name, address or Social Security number. We search billions of current utility company records, court records, county records, change of address records, property records, business records and a variety of other public records and publicly-available records to find information for each background check.
Peter Ruwoldt

TSA loses hard drive with personal info - Yahoo! News - 0 views

  •  
    WASHINGTON - The Transportation Security Administration has lost a computer hard drive containing Social Security numbers, bank data and payroll information for about 100,000 employees.
Peter Ruwoldt

Honda Acura Database Hacked - 0 views

  •  
    The Japanese motor company, Honda, today issued an alert to U.S. customers concerning a security breach resulting from a hacked database. The database that was managed by a third-party marketing group contained confidential information, including names of car owners, personal e-mail addresses, and even Vehicle Identification Numbers (VIN).
Peter Ruwoldt

Microsoft Hotmail accounts hacked into and posted online | Mail Online - 0 views

  •  
    Hotmail security breach spreads as 30,000 Gmail and Yahoo! passwords are posted online
  •  
    Hotmail security breach spreads as 30,000 Gmail and Yahoo! passwords are posted online
Peter Ruwoldt

iPhone keeps record of everywhere you go | Technology | guardian.co.uk - 0 views

  •  
    "Security researchers have discovered that Apple's iPhone keeps track ofwhere you go - and saves every detail of it to a secret file on the devicewhich is then copied to the owner's computer when the two are synchronised." "Apple can legitimately claim that it has permission to collect the data:near the end of the 15,200-word terms and conditions for its iTunes program,used to synchronise with iPhones, iPods and iPads, is an 86-word paragraphabout "location-based services""
Peter Ruwoldt

Business & Technology | UW team researches a future filled with RFID chips | Seattle Ti... - 0 views

  • The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely. "What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
  • Our objective is to create a future world where RFID is everywhere and figure out problems we'll run into before we get there,
  • For more than a year, a dozen researchers have carried around RFID tags equipped with tiny computer chips that store an identification number unique to each tag. Researchers installed about 200 antennas throughout the computer-science building that pick up any tag near them every second.
  • ...12 more annotations...
  • The system can show when people leave the office, when they return, how often they take breaks, where they go and who's meeting with whom,
  • if people don't see the tags, it's easy to forget they are giving out information whenever they come within range of a reader.
  • how to make the technology useful while protecting privacy
  • The system is transparent, so each can tell if the other has checked his whereabouts.
  • Users can search the calendar to jog their memories about when they last saw someone or how, where and with whom they spent their time.
    • Peter Ruwoldt
       
      I can see these things being useful. Like the idea of transparency
  • have been designed to divulge more information than necessary, opening the door to security and privacy problems
  • There's no reason to have remotely readable technology in a driver's license," Borriello said. He recommends a system that requires contact with the surface of a reader, so the license-holder knows when information on his license is being read.
    • Peter Ruwoldt
       
      Ethical issues to choose the right technology for the problem. Good point
  • data from radio tags can be pieced together to offer a detailed profile of a person's habits without his or her knowledge.
  • People don't understand the implications of information they're giving out," Borriello said. "They can be linked together to paint a picture, one you didn't think you were painting."
    • Peter Ruwoldt
       
      Critical for people to be street smart. Important role for schools
  • Last year, the number of police requests for information from London's RFID-based transit card rose from four per month to 100
  • It's important to understand what the technology can do and we, collectively, have to decide what we're going to use it for
  • As soon as it becomes widely used, then it's more attractive and people start attacking it," showing its vulnerabilities, Borriello said. The trouble is "by that time, it's hard to change.
    • Peter Ruwoldt
       
      Good that someone is being proactive about this.
  •  
    The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely. "What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
Peter Ruwoldt

Customs chief quits over 'big data loss' - ZDNet UK - 0 views

  •  
    UK data loss scandal
Peter Ruwoldt

Hackers clone passports in drive-by RFID heist - Security - iTnews Australia - 0 views

  •  
    A British hacker has shown how easy it is to clone US passport cards that use RFID by conducting a drive-by test on the streets of San Francisco.
Peter Ruwoldt

New Phishing Attack Targets Online Banking Sessions With Phony Popups - DarkReading - 0 views

  •  
    The so-called "in-session phishing" attack prompts the victim to retype his username and password for the banking site because the online banking session "has expired," for instance, via a popup that purports to be from the victim's bank site, according to researchers at Trusteer, which today published an advisory (PDF) on their findings about the potential for such a phishing attack.
Peter Ruwoldt

Keep your financial identity secure - 0 views

  •  
    A pdf produced by the Australian Bankers Society outlining methods for individuals to reduce the risk of identity theft
Peter Ruwoldt

Privacy and Security Fanatic: Lawsuit Claims Microsoft, McDonald's, Mazda & CBS Used Ad... - 0 views

  •  
    Microsoft, along with McDonald's, Mazda and CBS have been named in a class action suit filed in Federal Court for working in concert with behavioral advertising specialist Interclick. The companies allegedly used their ads as a "cover for data-mining, to identify the websites people visit, invading people's privacy, misappropriating their personal information and interfering with the operations of their computers."
Peter Ruwoldt

Cisco Explains the 7 Deadly Weaknesses of Social Network Users and More in Security Report - 0 views

  •  
    Cisco warns of the "seven deadly weaknesses" exploited by social engineers: Sex Appeal Greed Vanity Trust Sloth Compassion Urgency
1 - 20 of 58 Next › Last »
Showing 20 items per page