![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement: "A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it." I'm not making this up. Is this funny to anyone else? They do this everymonth and they are still the most popular web browser in the world! Don't get mewrong, the browser is good, as long as you don't mind "attackers"gaining control over it once in awhile. Who are these attackers? Is it acyber-geek with coke bottle glasses and an evil glint in his magnified eye?Could I tell if I saw one on the street? Would he have a lot of pens in the toppocket of his gangsta leather jacket? Does he have pentagrams sewn intohis polyester leisure suit? I know only one hacker, but he swears he's a"Light-Side" hacker. He hacks only for good. And what if we received these kinds of letters from othermanufacturers? "A security issue has been identified that could allowa pirate to board all pleasure boats running an outboard Mercury 150 and joyride it to Mexico for Cinco de Mayo. Install this jack screw on your rudder immediately." So let's review with an analogy because this is "critical". If you had a steel combination safe (your computer) in which you stored precious belongings,(your data) and you towed this safe around in a wagon throughmany of the world's most dangerous cities (surfing the internet), Microsoftannounced that there are 8 easy ways, and 4 just "so so" ways for thieves tobreak in and take everything you've got. But let's stay positive, the good news is,you can patch it all right up with a click. What could be easier? Maybethat's why we forgive them so often. Wouldn't it be great to get an email fromGM saying your vehicle will soon be stolen but click here and it will bealright. It's nice that theyannounce the holes and the patches together, that way I'm not so worried thewhole time before, while I browsed Internet Explorer around care free down themean streets of the internet completely innocent. I could have been E-jacked byI-marauders, demanding that I hand over every E & I in my wallet. The truth is, the good guys are winning the security battle online,why? Because they are rich and can hire the best light-side hackers moneycan buy. Even hackers known for evil all wind up working for large corporations.A headline of one going to jail for 18 months is a resume item on the lap ofevery CEO in the world with computers to protect. Now they're a cyber securityexpert, with all the dark secrets for sale! The speaking engagements startpouring in, "Come meet the man (or woman) who sent a KaGillion emails froma billion computers to Microsoft during lunch break. He did his time at ClubFed, and now works for the Department of Defense. So cyber villains may come and critical updates may go, I just click and fixmy way along the information highway and say a little prayer that the world's"attackers" never know I exist until they're on the payroll of the good guys somewhere. Rick David writes a humor column called,"Don't Laugh It Could Happen To You" forhttp://sandiego.merchantamerica.com
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com Inside the Fiasco at the National Security Council The Atlantic Britain Lifts Sanctions on Syrian Security Agencies The New York Times Summit on the Future of Energy Security IEA – International Energy Agency Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) He was an undercover cop and Dennis Rodman’s security guard. Now, he keeps the Phillies safe Police1 RSAC highlights security markets in transition SiliconANGLE Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine Kristi Noem’s Stolen Purse at a Burger Joint Is Still a Washington Mystery The New York Times California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Punxsutawney native begins serving as special assistant in Department of Homeland Security The Courier Express Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Get to know new security leaders at OSU-CHS Oklahoma State University Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Mobile Applications: A Cesspool of Security Issues Dark Reading Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com Anton’s Security Blog Quarterly Q1 2025 Security Boulevard D51 security officials discuss increased assault, weapon incidents in schools The Grand Junction Daily Sentinel Fiesta goers can expect increased security at main events Texas Public Radio UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine Rome Health to install new security systems Rome Sentinel How To Build A Data Center Security Strategy For 2025 And Beyond CybersecurityNews National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Linux 'io_uring' security blindspot allows stealthy rootkit attacks BleepingComputer ATA Transportation Security Council Recognizes Fleets American Trucking Associations Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico Local Advocates, Officials and Faith Leaders Speak Out Against Homeland Security Letter Falsely Telling Thousands They Must Leave US River Journal Online King County Security Tips – “Google” yourself kcemployees.com Palestinian supporters confront far-right Israeli security minister as he leaves an event near Yale CNN Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire Two state officials follow Noem to Homeland Security; Rhoden names new tribal relations head South Dakota Searchlight Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Security guard takedown exposes questions over $11 million contract with Metro Transit 5 EYEWITNESS NEWS Our National Debt is a Security Threat HubCitySPOKES US Donates Decommissioned Cutters to Tunisia to Bolster Regional Security The Maritime Executive Temple University stepping up security after several students assaulted near campus last week CBS News Climate and National Security: Bridging the Divide in Energy Policy Columbia Business School Exploding Cargo. Hacked GPS Devices. Spoofed Coordinates. Inside New Security Threats in the Skies. Vanity Fair |
![]() |
![]() |
![]() |
RELATED ARTICLES
I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. ![]() |
home | site map |
© 2006 |