Security Information |
|
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement: "A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it." I'm not making this up. Is this funny to anyone else? They do this everymonth and they are still the most popular web browser in the world! Don't get mewrong, the browser is good, as long as you don't mind "attackers"gaining control over it once in awhile. Who are these attackers? Is it acyber-geek with coke bottle glasses and an evil glint in his magnified eye?Could I tell if I saw one on the street? Would he have a lot of pens in the toppocket of his gangsta leather jacket? Does he have pentagrams sewn intohis polyester leisure suit? I know only one hacker, but he swears he's a"Light-Side" hacker. He hacks only for good. And what if we received these kinds of letters from othermanufacturers? "A security issue has been identified that could allowa pirate to board all pleasure boats running an outboard Mercury 150 and joyride it to Mexico for Cinco de Mayo. Install this jack screw on your rudder immediately." So let's review with an analogy because this is "critical". If you had a steel combination safe (your computer) in which you stored precious belongings,(your data) and you towed this safe around in a wagon throughmany of the world's most dangerous cities (surfing the internet), Microsoftannounced that there are 8 easy ways, and 4 just "so so" ways for thieves tobreak in and take everything you've got. But let's stay positive, the good news is,you can patch it all right up with a click. What could be easier? Maybethat's why we forgive them so often. Wouldn't it be great to get an email fromGM saying your vehicle will soon be stolen but click here and it will bealright. It's nice that theyannounce the holes and the patches together, that way I'm not so worried thewhole time before, while I browsed Internet Explorer around care free down themean streets of the internet completely innocent. I could have been E-jacked byI-marauders, demanding that I hand over every E & I in my wallet. The truth is, the good guys are winning the security battle online,why? Because they are rich and can hire the best light-side hackers moneycan buy. Even hackers known for evil all wind up working for large corporations.A headline of one going to jail for 18 months is a resume item on the lap ofevery CEO in the world with computers to protect. Now they're a cyber securityexpert, with all the dark secrets for sale! The speaking engagements startpouring in, "Come meet the man (or woman) who sent a KaGillion emails froma billion computers to Microsoft during lunch break. He did his time at ClubFed, and now works for the Department of Defense. So cyber villains may come and critical updates may go, I just click and fixmy way along the information highway and say a little prayer that the world's"attackers" never know I exist until they're on the payroll of the good guys somewhere. Rick David writes a humor column called,"Don't Laugh It Could Happen To You" forhttp://sandiego.merchantamerica.com
MORE RESOURCES: Homeland Security Department to Release New A.I. Guidance The New York Times Officials detail increased D.C. security for certification, inauguration The Washington Post U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back - Los Angeles Times Opinion | Trump’s national security wrecking crew The Washington Post ‘Never trust, always verify’: The zero trust approach to network security United States Army Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati The Fastest Airport Security Line You Don’t Know About The Wall Street Journal The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Do Titans QB, Coach Have Job Security? Sports Illustrated Tuskegee president releases security updates following shooting WIAT - CBS42.com Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider The UN cybercrime convention threatens security research. The US should do something about it CyberScoop Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Endpoint Security from BlackBerry BlackBerry Tuskegee University Shifts Security, Facilities Leadership Tuskegee University 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal Ambridge Area School District makes security changes CBS Pittsburgh France-Israel Soccer Match is Overshadowed by Amsterdam Attack The New York Times Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch ‘We’re just a target’: Pickleball players call for more security Camas Washougal Post Record Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times Trump’s National Security Team Keeps Getting More Extreme The New Republic South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner Silverfort Buys Rezonate to Fortify Identity Security Muscle BankInfoSecurity.com Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times New infosec products of the week: November 15, 2024 Help Net Security Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason NIST report on hardware security risks reveals 98 failure scenarios Help Net Security Lamar CISD invests in safety, security amid rapid growth Community Impact Trump Picks Kristi Noem for Homeland Security Secretary The New York Times ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch 11/14/24 National Security and Korean News and Commentary smallwarsjournal Mexico’s ‘hugs, not bullets’ security strategy has failed, says US Ambassador Ken Salazar Mexico News Daily Microsoft Patch Tuesday, November 2024 Edition Krebs on Security Security guard turned gunman: Christopher Farrell's fatal rampage in downtown San Diego - CBS News 8 Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times Federal officials warn Boston churches to increase security after wave of arson attacks CatholicVote org ASIS, International Protective Security Board Sign Memorandum of Understanding Security Sales & Integration Arizona governor pledges work with Trump to secure the border Arizona's Family |
RELATED ARTICLES
I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. |
home | site map |
© 2006 |