Security Information |
|
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement: "A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it." I'm not making this up. Is this funny to anyone else? They do this everymonth and they are still the most popular web browser in the world! Don't get mewrong, the browser is good, as long as you don't mind "attackers"gaining control over it once in awhile. Who are these attackers? Is it acyber-geek with coke bottle glasses and an evil glint in his magnified eye?Could I tell if I saw one on the street? Would he have a lot of pens in the toppocket of his gangsta leather jacket? Does he have pentagrams sewn intohis polyester leisure suit? I know only one hacker, but he swears he's a"Light-Side" hacker. He hacks only for good. And what if we received these kinds of letters from othermanufacturers? "A security issue has been identified that could allowa pirate to board all pleasure boats running an outboard Mercury 150 and joyride it to Mexico for Cinco de Mayo. Install this jack screw on your rudder immediately." So let's review with an analogy because this is "critical". If you had a steel combination safe (your computer) in which you stored precious belongings,(your data) and you towed this safe around in a wagon throughmany of the world's most dangerous cities (surfing the internet), Microsoftannounced that there are 8 easy ways, and 4 just "so so" ways for thieves tobreak in and take everything you've got. But let's stay positive, the good news is,you can patch it all right up with a click. What could be easier? Maybethat's why we forgive them so often. Wouldn't it be great to get an email fromGM saying your vehicle will soon be stolen but click here and it will bealright. It's nice that theyannounce the holes and the patches together, that way I'm not so worried thewhole time before, while I browsed Internet Explorer around care free down themean streets of the internet completely innocent. I could have been E-jacked byI-marauders, demanding that I hand over every E & I in my wallet. The truth is, the good guys are winning the security battle online,why? Because they are rich and can hire the best light-side hackers moneycan buy. Even hackers known for evil all wind up working for large corporations.A headline of one going to jail for 18 months is a resume item on the lap ofevery CEO in the world with computers to protect. Now they're a cyber securityexpert, with all the dark secrets for sale! The speaking engagements startpouring in, "Come meet the man (or woman) who sent a KaGillion emails froma billion computers to Microsoft during lunch break. He did his time at ClubFed, and now works for the Department of Defense. So cyber villains may come and critical updates may go, I just click and fixmy way along the information highway and say a little prayer that the world's"attackers" never know I exist until they're on the payroll of the good guys somewhere. Rick David writes a humor column called,"Don't Laugh It Could Happen To You" forhttp://sandiego.merchantamerica.com
MORE RESOURCES: Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal He’s a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic People’s Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security – In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve ‘security through obscurity’ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Biden’s ‘security’ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee Who is Acronis’ New Chief Information Security Officer? Cyber Magazine UN aviation agency confirms recruitment database security breach BleepingComputer Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Update on former Vigo County Security Annex demolition MyWabashValley.com Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Alois Brunner, the Nazi ‘butcher’ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News – Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com Security and Sanctions in Post-Assad Syria The National Interest Online Eric Trager tapped for Mideast slot on Trump’s National Security Council The Times of Israel 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News |
RELATED ARTICLES
I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. |
home | site map |
© 2006 |