Simple Security Questions Weaken Passwords Today it was reported that presumptive GOP Presidential candidate Mitt Romney had his personal Hotmail account hacked by someone who figured out Romney’s answer to the “Forgot Password” security...
Cloud Computing – A Poem of Warning The SPYder and the Guy By Dovell Bonnett (June 28, 2011) “Welcome to my cloud?” said the SPYder to the Guy, “‘Tis the cheapest little cloud that ever you will try; The way into my cloud is to...
Anonymous is helping IT convince management to beef up network security. Organizations like Anonymous takes great pride in breaking into corporate networks they politically disagree with. Recently the Canadian Grand Prix, U.S. Department of Justice and Alpha...
Rampant Identity Theft could undermine the right of every citizen to vote. Two separate news stories when combined may have devastating effects on our nation’s sovereignty. The first one discusses how, according to the Identity Theft Resource Center...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security...