What the Google/China Hack Means to You
Trusting Google does not just mean “trusting that Google won’t do anything evil with my data.” It also means “trusting Google will never make a mistake which accidentally opens my data up to anyone else.”
Trusting Google does not just mean “trusting that Google won’t do anything evil with my data.” It also means “trusting Google will never make a mistake which accidentally opens my data up to anyone else.”
Twitter recently published a list of 369 banned passwords which it will no longer accept on Twitter accounts. Regardless of whether or not you use Twitter, it is worth a minute or two to skim this list and see if you are using one of these passwords, on any system, or something similar, which could […]
I just read I’m on Facebook–Now What???: How to Get Personal, Business, and Professional Value from Facebook. While the majority of this 100 page book was review for me, I would recommend it to anyone who is brand new to Facebook or social networking in general.
While Internet Explorer 6 on Windows XP will be supported until July 2010, the writing on the wall is fairly clear, and Microsoft is encouraging users to upgrade to IE 7 or IE 8.
After a long period of apparent stagnation, Mozilla Messaging, a wholly owned subsidiary of the Mozilla Foundation, has released the long-awaited Thunderbird 3. In short, if you do not require connectivity to a Microsoft Exchange server (for calendar, contacts, and other non-email data) I recommend you try Thunderbird 3.
Yesterday, Google announced its latest service: Google Public DNS. This service appears to be similar to the also-free OpenDNS.
60 Minutes illustrates the security threats facing every Internet-connected computer.
In a previous post, I wrote how small businesses are being scammed by European cyber-hackers. In a related story, Computerworld reports how Pacto Construction Co. in Portland, ME is suing Ocean Bank of Delaware because the company lost hundreds of thousands of dollars due to allegedly weak security on the part of Ocean’s online banking […]
This week’s Data Security Podcast had two items that really piqued my interest. The first was an article about an Ohio hospital which suffered data loss due to a malware infection. The malware was sent by the boyfriend of a hospital worker. Apparently he intended to follow his girlfriend’s movements on the Internet on her […]
The Astaro Security Gateway is a product we have been using for a few years with various clients as a UTM (Unified Threat Management) device. It offers a number of features that they require, including network security, email security, and web surfing security.