INFORMATION

Site Map - Cybersecurity

A Site to See

- The next time you see Microsoft Windows’ “blue screen of death” or a “fatal error” message flash across your monitor, don’t get angry; reboot and then point your browser toward the DistroWatch Web site

Laws to Aid Breach Victims

- A Chronology of Data Breaches Reported Since the ChoicePoint Incident outlines many of 2005’s breaches and their causes, from 250 individuals who were put at risk when computers at East Carolina University were hacked to the millions at risk from breaches at CardSystems.

Quick Bytes: Trojans bearing gifts

- Trojan horse programs—those pieces of malware designed to infiltrate a computer and then steal information to be sent back to an attacker—accounted for more of the malicious code in 2005 than worms. This indicates, according to researchers at antivirus firm Sophos, that criminals may be moving away from large-scale bombardments in favor of targeted attacks that could yield passwords, credit card information, and bank login credentials. @ The Sophos Security Threat Management Report is at SM Online

Quick Bytes: Consumers demand security

- There is a growing business case for greater security: A survey of more than 8,000 individuals revealed that consumers are concerned enough about identity fraud that they are willing to pay more for security or change banks.

Quick Bytes: Risky e-mail

- he survey, which received responses from 1,042 workers in the U.S., was conducted by Harris Interactive for managed e-mail archiving company Fortiva

Worth a Look: A Web Camera for Surveillance

- Now, setting up a surveillance network—including motion-activation sensors—is as simple as plugging a Web camera into a computer’s USB port.

Web Sites Provide Rich Harvest for Spammers

-

The Betamax Dilemma

-

Behind the Numbers

-

Quick Bytes: Weak Passwords

- Do you use the same password for all the different sites you visit that require one? If you do, you’re in the majority, according to a poll of 100 people conducted by UPEK, a manufacturer of biometric products. Half of those who use the same password say that it is based on the name of their spouse, pet, hometown, or favorite baseball team—and it is never changed.  @ More from the UPEK survey, which also considers the public’s acceptance of using biometrics instead of passwords, is at SM Online.

Quick Bytes: Antifraud Measures

- Credit card fraudsters are costing the economy billions of dollars each year. Merchants can minimize those losses by taking preventive measures, such as comparing IP addresses to ascertain the distance between the person ordering the goods and the billing address of the online buyer, noting whether a free e-mail address was used, and checking for the use of anonymous proxy servers. A paper from FraudLabs, which offers antifraud services for online merchants, outlines more measures.  @ 10 Measures to Reduce Credit Card Fraud for Internet Merchants is at SM Online.

Quick Bytes: Security’s lingua franca

- Aligning IT with business goals was the number one challenge facing the majority of CIOs in the public and private sectors, according to a Government Accountability Office report. According to the report, “This challenge requires the CIOs to develop IT plans to support their companies’ business objectives. In many cases this entails cross-organizational coordination and collaboration,” echoing the results from the ASIS study on convergence (see “The Growing Trend Toward Convergence,” page 48). @ Chief Information Officers: Responsibilities and Information Technology Governance at Leading Private Sector Companies is at SM Online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.