INFORMATION

Site Map - Cybersecurity

Exterminating Online Pests

- Threats to your computer can range from gnatlike annoyances such as pop-up ads to the pointed hooks of pernicious phishers. PC Pest Patrol: Protect Your Computers from Malicious Internet Invaders, a new book from Preston Gralla, shows how to trap these invaders in a protective web that keeps your computer running smoothly and your personal information safe. The book is available at the O'Reilly Web site for $24.95. A sample chapter from the book is available via SM Online.

Quick Bytes: Proliferating Bots

- The growth of malicious Web robots, or bots, this year will likely surpass the 413 percent growth rate seen for rootkits last year, according to a Sana Security warning.

Quick Byes: Wireless holes

- Computer vulnerabilities are well documented by Web sites such as the one hosted by The Mitre Corporation known as Common Vulnerabilities and Exposures (CVE). Vulnerabilities in wireless systems, including 802.11 and Bluetooth, now are getting similar attention.

Quick Bytes: Lost message, lost time

- If you’ve ever wasted time searching for an e-mail you know you’ve sent or received but can’t locate, you’re not alone: 59 percent of all U.S. adults have done it (the number is 6 percent higher for those who make more than $75,000 a year).

Quick Bytes: Online fraud trends

- Online retailers are hit with fraud from international orders at a rate that is twice the overall average.

NEW IN PLAINTEXT: Securing Windows XP

- More than seven out of 10 home computers run Windows XP, so locking down these computers is an essential task, because poorly protected home computers are often the source of attacks against corporate networks.

Worth a Look: Web Browsing Under Wraps

- Anonymizer Anonymous Surfing prevents Web sites from collecting data from your visits because it creates an encrypted tunnel between your computer and the Anonymizer network while you surf; then, any page you visit will see Anonymizer’s IP address, not yours. The software installs after a quick download and can be used with either Internet Explorer or Firefox browsers.

Information Security Guidelines for Banks

- The guide defines important terms used in the security guidelines and then outlines the steps companies should follow to develop and implement an information security program, such as conducting assessments of internal and external threats. It also provides methods of assessing policies and procedures.

Pinning Down Online Money Laundering

- The government report notes with some alarm the rise in popularity of online payment services that can accept funds in different ways, including cash and money orders.

Quick Bytes: Data breaches

- More than half the retailers that collect information from consumers for promotions and marketing campaigns have assigned responsibility for protecting consumer-specific data to a security-program coordinator; an even greater number have provided training to employees regarding consumer privacy and information security.

Phone forensics

- Now that cell phones have morphed into miniature computers, they contain more information than ever before. In addition to phone numbers and a record of calls made and received, phones can now contain e-mail or text messages, photos, and a host of other data that could be of value when investigating a crime.

Quick Bytes: I hear you knocking

- Automated port scans, which look for open ports that might be candidates for exploitation, are sometimes likened to a thief rattling doorknobs, looking for one that’s unlocked.

Quick Bytes: Data Breaches

- More than half the retailers that collect information from consumers for promotions and marketing campaigns have assigned responsibility for protecting consumer-specific data to a security-program coordinator
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.