Skip to main content

Home/ Information Security/ Group items tagged risk

Rss Feed Group items tagged

John Li

SOMAP.org - Security Officers Management and Analysis Project - 0 views

    • John Li
       
      Open Source IT Risk Management
  •  
    Open Source IT Risk Management
Skeptical Debunker

Web Posts May Make You Vulnerable To Crime : NPR - 0 views

  •  
    It's fun to brag when you're at a great bar or going off on vacation. Social networking sites and location-based apps have made it easy to broadcast that kind of information to your friends. The problem is that you may not just be making your friends jealous, but supplying criminals with useful information as well. A new Web site called PleaseRobMe.com has drawn attention to the issue by repurposing posts from foursquare, a social networking site that lets people share the latest about their whereabouts. PleaseRobMe demonstrates that it's easy for anyone to find out you're not at home - and therefore, are presenting an "opportunity" for burglary. "There are physical and economic safety risks when you're publicizing to the world where you are," says Kevin Bankston, a senior staff attorney with the Electronic Frontier Foundation. "It's obviously a treasure trove of information for criminals. PleaseRobMe is a good demonstration of how easy it is."
Skeptical Debunker

Browser history hijack + social networks = lost anonymity - 0 views

  •  
    Simply joining a few groups at social networking sites may reveal enough information for hackers to personally identify you, according to some recent computer science research. In a paper that will be presented at a security conference later this year, an international team of academics describes how they were able to build membership sets using information that social networking sites make available to the public, and then leverage an existing attack on browsing history to check for personal identity. That information, they argue, can then be combined with other data to create further security risks, such as a personalized phishing attack.
valuementor

ADHICS Compliance Service & Assessment | UAE | ValueMentor - 0 views

  •  
    ValueMentor is a leading Risk & Compliance service provider in UAE helping companies achieve ADHICS Compliance.
Rich Hintz

What a Botnet Looks Like - CSO Online - Security and Risk - 0 views

  • What a Botnet Looks Like
  •  
    Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
Rich Hintz

Cross often? Make it simple, use NEXUS - 0 views

  • NEXUS is designed to expedite the border clearance process for low risk, pre-approved travellers into Canada and the United States.
anonymous

Bruce Schneier: More on the Broad View of Security - CSO Online - Security and Risk - 0 views

  •  
    Bruce Schneier's comments on the first Workshop in Security and Human Behavior. Examples of the New School of Information Security.
Skeptical Debunker

FTC warns firms, organizations of widespread data breach - 0 views

  • The FTC declined to identify the companies or organizations involved, but said they were both "private and public entities, including schools and local governments." The companies and organizations ranged in size from "businesses with as few as eight employees to publicly held corporations employing tens of thousands," the FTC said in a statement. It said sensitive data about customers and employees had been shared from the computer networks of the companies and organizations and made available on Internet peer-to-peer (P2P) file-sharing networks. The information was accessible to "any users of those networks, who could use it to commit identity theft or fraud," the FTC said. "Unfortunately, companies and institutions of all sizes are vulnerable to serious P2P-related breaches, placing consumers' sensitive information at risk," FTC chairman Jon Leibowitz said. "For example, we found health-related information, financial records, and drivers' license and social security numbers -- the kind of information that could lead to identity theft," Leibowitz said.
  •  
    The US Federal Trade Commission (FTC) said Monday it has notified nearly 100 companies and organizations of data breaches involving personal information about customers or employees.
Skeptical Debunker

Does promiscuity prevent extinction? - 0 views

  • Known as 'polyandry' among scientists, the phenomenon of females having multiple mates is shared across most animal species, from insects to mammals. This study suggests that polyandry reduces the risk of populations becoming extinct because of all-female broods being born. This can sometimes occur as a result of a sex-ratio distortion (SR) chromosome, which results in all of the Y chromosome 'male' sperm being killed before fertilisation. The all-female offspring will carry the SR chromosome, which will be passed on to their sons in turn resulting in more all-female broods. Eventually there will be no males and the population will die out. For this study, the scientists worked with the fruitfly Drosophila pseudoobscura. They gave some populations the opportunity to mate naturally, meaning that the females had multiple partners. The others were restricted to having one mate each. They bred several generations of these populations, so they could see how each fared over time. Over fifteen generations, five of the twelve populations that had been monogamous became extinct as a result of males dying out. The SR chromosome was far less prevalent in the populations in which females had the opportunity to have multiple mates and none of these populations became extinct. The study shows how having multiple mates can suppress the spread of the SR chromosome, making all-female broods a rarity. This is because males that carry the SR chromosome produce only half as many sperm as normal males. When a female mates with multiple males, their sperm will compete to fertilise her eggs. The few sperm produced by males carrying the SR chromosome are out-competed by the sperm from normal males, and the SR chromosome cannot spread.
  •  
    Promiscuous females may be the key to a species' survival, according to new research by the Universities of Exeter and Liverpool. Published today (25 February) in Current Biology, the study could solve the mystery of why females of most species have multiple mates, despite this being more risky for the individual.
1 - 11 of 11
Showing 20 items per page