Blog

Your passwords don’t suck, it’s your policies

By John Fontana  Summary: A developer has created a password analysis tool that examines patterns to determine password strength and concludes password-creation policies are the real enemy of solid passwords. Passwords stink because policies for creating them typically focus only on composition and can’t measure strength, according to developer Cameron Morris. The time it takes to crack […]

Your passwords don’t suck, it’s your policies Read More »

Forrester outlines 5 rising, 5 declining security technologies

By Ellen Messmer <a href=”http://ad.doubleclick.net/jump/idge.cso.identity_access/access_control;kw=anonymous,fbi,forresterresearch,security,accesscontrolandauthentication,nac,ddos,next-generationfirewalls;tile=8;pos=sidecar;sz=60×55;cid=706489;author=ellen_messmer;type=article” target=”_blank” style=”border:none”><img src=”http://ad.doubleclick.net/ad/idge.cso.identity_access/access_control;kw=anonymous,fbi,forresterresearch,security,accesscontrolandauthentication,nac,ddos,next-generationfirewalls;tile=8;pos=sidecar;sz=60×55;cid=706489;author=ellen_messmer;type=article” border=”0″ height=”55″ width=”60″ /></a> May 15, 2012— Network World— Security technologies rise and fall in popularity, and Forrester Research in its TechRadar report puts its bets on five it thinks are in a growth mode and five it thinks are dying away. Do you agree or disagree?

Forrester outlines 5 rising, 5 declining security technologies Read More »

Why the New ‘.Secure’ Domain Idea is a Dud

A proposed new “.secure” Internet domain designed to secure websites and ease Web surfers’ security concerns is a novel idea, but your online security is ultimately your own responsibility, according to CIO.com blogger Constantine von Hoffman. An Internet startup wants to create a new “.secure” domain so people won’t have to worry about security on .secure

Why the New ‘.Secure’ Domain Idea is a Dud Read More »

Thwarted by security at enterprises, cyber criminals target SMBs

SMBs should focus on ‘a risk-based approach to threat management,’ says researcherBig business — at least a significant percentage of it — has apparently heeded the decades-long mantra from information security experts, and invested enough in security to make it difficult, expensive and risky for cyber criminals to attack them. By Taylor Armerding So criminals are

Thwarted by security at enterprises, cyber criminals target SMBs Read More »

A Secure BYOD Policy at MasterCard? Priceless

MasterCard Worldwide is a year into its BYOD policy and the program is growing strong while the company keeps a watchful eye on security. By Kim S. Nash CIO — More than a year into its bring-your-own-device program, MasterCard Worldwide continuously assesses the security technology and policies that allow 30 percent of its employees worldwide to use their

A Secure BYOD Policy at MasterCard? Priceless Read More »

Cybersecurity Roundup: Hackers Target Gas Firms; Twitter-Spammer Logins Leaked; and More

This week’s cybersecurity news roundup features a US ICS-CERT warning about a “spear phishing” campaign aimed at natural-gas pipeline companies; Twitter spammers’ logins exposed; a University of North Carolina data breach; and more. CERT: Gas-Pipeline Companies are Phishing Targets: The U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) says an active “spear phishing” campaign

Cybersecurity Roundup: Hackers Target Gas Firms; Twitter-Spammer Logins Leaked; and More Read More »

Nikto 2.1.4 available!

by sullo We’re happy to announce the immediate availability of Nikto 2.1.4!Nikto is an open source web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers.This release contains a number

Nikto 2.1.4 available! Read More »

Wikipedia: Ads Appear Only If Your Computer Is Infected with Malware

By Eduard Kovacs Wikipedia representatives warn users that if they see advertisements on the site, their computers are most likely infected with a piece of malware. “We never run ads on Wikipedia. Wikipedia is funded by more than a million donors, who give an average donation of less than 30 dollars,” Philippe Beaudette, director of

Wikipedia: Ads Appear Only If Your Computer Is Infected with Malware Read More »

Train Yourself to Properly Judge Risk by Tracking Estimates Like a Gambler

Humans are terrible at evaluating and judging risk. We overestimate our chances of winning contests while underestimating the chance of something bad happening. Compensating for this natural tendency isn’t easy, but the Wall Street Journal suggests one way to train your brain might be to track your skills like a gambler.The first step to compensating

Train Yourself to Properly Judge Risk by Tracking Estimates Like a Gambler Read More »