Posts Tagged ‘phishing’

The weakest link in computer hacking?

The weakest link in computer hacking? Human error By Cliff Edwards, Olga Kharif,Michael Riley, Bloomberg News The U.S. Department of Homeland Security ran a test this year to see how hard it was for hackers to corrupt workers and gain access to computer systems. Not very, it turned out. Staff secretly dropped computer discs and […]

Comments (10)

Phishing emerges as major corporate security threat

Source: Computer World The successful use of phishing emails to breach secure organizations like Oak Ridge National Laboratory and RSA are stark reminders of the serious threat posed by what some experts have dismissed as as a low-tech method of attack. Oak Ridge, a U.S. Department of Energy-run research lab, this week disclosed it had […]

Comments (3)

China-based hackers targeted oil, energy companies in ‘Night Dragon’ cyber attacks

From the LA Times China-based hackers may have been stealing sensitive information from several international oil and energy companies for as long as four years, cyber-security firm McAfee Inc. said in a report Thursday. The company said it traced the “coordinated covert and targeted cyberattacks” back to at least November 2009 and that victims included companies in […]

Leave a Comment

8 tips for safer online shopping

Image by Matthieu Dejardins, eCommerce Activist via Flickr By Microsoft.com Online threats today come in the form of attacks on you and attacks on your computer. Here are eight (8) ways for you to have a safer online shopping experience: 1. Keep your computer software up to date. Keep all software (including your web browser) […]

Leave a Comment

Security risk assessment process and countermeasures

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments The following are the common steps that should be taken to perform a security risk assessment. These are just basic common steps which should not be followed as is but modified based on organization assessment scope and business requirements. • Identify the […]

Leave a Comment

Internet security breach found at UCSF

Image via Wikipedia By Erin Allday, SF Chronicle Hackers may have had access to personal information for about 600 UCSF patients as a result of an Internet “phishing” scam, campus officials said Tuesday. The security breach occurred in September when a faculty physician in the UCSF School of Medicine provided a user name and password […]

Comments (2)

Facebook, MySpace users hit by cyber attacks

Image by sitmonkeysupreme via Flickr NZ HERALD reported that Facebook users – already being targeted in a malware campaign – are now under threat from a phishing scam. Security specialists Symantec report that the company’s systems have picked up fake messages that appear to be sent by the social networking service. Users will receive an […]

Leave a Comment

Sophisticated phishing attack and countermeasures

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Phishing is a practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization’s logo, in an attempt to steal passwords, financial or personal information. In daily life people advise to retrace your steps when you […]

Leave a Comment

12 Phishing Threats and Identity Theft

Have you ever thought of losing something and you cannot live without it? Yes, that something can be your identity. Phishing is a practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization’s logo, in an attempt to steal passwords, financial or personal information. In daily […]

Comments (1)

Web 2.0 and more data

According to the Identity Theft Resource Center of San Diego, “the data breaches are on the rise in 2008” and with more data breaches so are the impact and amount of losses. Web 2.0 is next phase of internet creation, where huge social networks are built and citizens of the network enjoy the interactive and […]

Comments (1)


SEO Powered By SEOPressor