Building Better Security Through Cloud Computing Best Practices
The Cloud Security Alliance (CSA) issued the second version of its "Guidance for Critical Areas of Focus in Cloud Computing", now available on the Cloud Security Alliance website.
Adding More Security To Your Wordpress Sites
It is no huge secret that I have had this WordPress blog hacked twice this year but some consolation is that I am not alone. Helpful resources. Alex recently launched a DVD course on WordPress security that is available for FREE + shipping.
Network Security: Protect Your Life
If someone asked you how safe your computer network is, would you be able to answer without being anxious if it really is? Network security is a potential concern for everybody. May it be for your business or home computer, not having the appropriate level of security can permit your personal and private information to be viewed by unauthorized users.
Hijackers Expose Serious Security Risk To Enterprise Facebook Users
Control your info has taken administrative rights to hundreds of groups on Facebook this morning - which is going to prompt a stampede of fear across the Facebook landscape. Looking at the security of social networking - this is going to be a bad day for many groups on Facebook.
How To Enact Data Privacy Within Your Enterprise
We all have a vested interest in how data and data privacy is enacted by companies, regardless of the environment, cloud, mobile (laptop, cell phones), private Data Center, or anything else that is a combination of the above.
Protecting Yourself From Email Phishing Attacks
A phishing attack is targeting thousands of web-based email users, according to the BBC and Read Write Web. Tens of thousands of users of each site have already been victimized, with the usernames and passwords available on lists.
SEO And Wordpress Security
In recent weeks wordpress security, or more correctly the lack of wordpress security has been getting a lot of attention. While most people consider this a site maintenance issue, it has implications that affect your SEO efforts, in this post I'll explain why, and look at some things you can do to protect yourself, and reduce the damage.
Adding Needed Security To SMS And PayPal
I bought my early-bird ticket for Reading Twestival this morning, paying for it via PayPal. The simple purchase transaction I completed in a couple of minutes reminded me how much I place trust in PayPal, partly because of its neat one-time code by SMS message security procedure - what it calls its SMS Security Key - that I find reassuring.
Addressing Security Concerns In Real Time Can Achieve Business Success
Karen Mazurkewich suggests that Rapid Response is the key to online success. Unfortunately a factor that weighs against online ecommerce is that Canadians are more wary about online security.
Huge Security Flaw Within Tag Based Systems
Louis Gray pointed out a new reading system yesterday called Lazyfeed, and overall I am pretty happy with it, but like all tag based reading systems, spammers and other miscreants have so corrupted the general tag base to get their message in front of people that tag based systems need something else to make sure they are delivering good valid content for the search strings provided..
Increase Data Security By Keeping A Local Backup Of Your Cloud
Over an early-morning cup of coffee, I read an op-ed piece in the the New York Times by Jonathan Zittrain, author of The Future of the Internet and How to Stop It (a book I read last year). Zittrain's op-ed is thought-provoking as it discusses a range of issues that are very much in the news at the moment, from the theft of Twitter documents from their locations in...
Cli.gs Hacked For Ranking Links
Cli.gs, (Cligs) a URL shortening/forwarding service has been hacked where several users have been reporting their older created forwarders were all going to 1 single location. Below is a screenshot within the Cligs user interface displaying some older saved forwarded URLs in my own Cligs account.
Reliable Expertise to Support Your Application
There are other hosting providers out there that talk nonstop about SaaS. But only Rackspace delivers the infrastructure, nonstop support,
uptime, services and SaaS expertise that you and your customers rely on day in and day out. And that's why thousands of businesses rely on
us to make on-demand application delivery flexible, reliable and easy.
T-Mobile May Have Been Hacked
A message to the full disclosure list showed up today claiming to have access to the entire back end infrastructure of T-Mobile. The message to Full Disclosure today from Pwnmobile claims to have hacked into and own the majority of the data on the T-Mobile phone systems today.
Ensuring Your Enterprise Has Security On The Internet
A plan to ensure the security of the organization's internet computing assets. ContentsOrganization and Administration· Responsibilities. An indication of how security is to be administered. It identifies the organizations and individuals responsible for maintaining, monitoring and approving the Internet Security Plan.
Facebook Tests Volatility Of Malware And Phishing From Swine Flu
Early news reports indicate that a new phishing attack is happening at Facebook right now, so be very careful what e-mails you click on. With all the attention that phishing and malware is getting between the swine flu and other events happening right now, this is a good time to remind folks, be careful of what e-mails you click on.).
Tool Developed To Hide Malware Within .NET
Most windows based modern computers come with the .NET Framework installed, so a security flaw in it could be a very dangerous threat - think to Conficker (and, by the way: take a look here and check if you are infected, then move to Linux or buy a Mac).
Spammer Growth Rate Highest Ever
Spammers are stepping up their efforts as the "industry" recovers from the loss of McColo, a web hosting company whose clients generated some 75% of the spam e-mail we get to enjoy on a daily basis. It seems that these folks are back up to their old levels again according to a report from Postini, which provides the security for the approximately 15 million users of Google's enterprise e-mail offering.
Setting Up A Security Plan For Your Enterpirse
IA plan to ensure the security of the organization's assets. Contents Organization and Administration Security Procedures Include such things as references to the security policy, the procedures for each organizational area, the access procedures, emergency procedures and contacts.
Implementing Cost Cutting Without Under-Utilizing Security
In these uncertain economic times, businesses are being forced to implement crucial cost-cutting measures to expel any and all unnecessary spending. But in the process of trying to improve cost efficiency, businesses can inadvertently under-utilize, or even expel altogether, valuable initiatives that are strategically viable to the longevity of that business.
Recovering Your Sites After A Major Attack
So your website has been hacked. All your pages are gone and you can't log into anything to make changes. What do you do and how do you fix it? I've been hacked twice in the past 16 months, and the first time it happened, I was extremely scared, nervous and pissed all at the same time.
Use Acunetix Blind SQL To Identify Web Vulnerabilities
Cool presentation on YouTube on how to use the Acunetix Blind SQL Injection Tool for data mining systems. In all honesty, this is a great video to watch. The Acunetix Blind SQL Injection Tool works on web sites, and allows security engineers to learn what vulnerabilities rest on the web application.
Two Security Sites Close Amid Economic Pressure
The poor economy hits two more security web sites, making news and sharing of information security information that much harder to find. Castle Cops and Technocrat went dark last month showing that the poor economy and trying to make money by advertising is still very difficult for a startup.