INFORMATION

Site Map - Cybersecurity

Laws to Aid Breach Victims

- A data breach at ChoicePoint in February 2005 was “a watershed event in terms of disclosure to the affected individuals,” according to a paper from the Privacy Rights Clearinghouse.

Web Sites Provide Rich Harvest for Spammers

- If your e-mail address is posted on a Web site, the chances of it being “harvested” by a spammer are much greater than if the address appears on a blog, on a message board, or in a chat room. That’s one finding from a study conducted by the Federal Trade Commission (FTC), whose investigators created 150 e-mail accounts—50 with an Internet service provider (ISP) that does not use antispam filtering, and 50 each at two other ISPs that do filter for spam—to learn more about how to reduce spam. @ E-mail Address Harvesting and the Effectiveness of Anti-SpamFfilters, a report by the federal trade commission’s division of marketing practices, is at SM Online.

Behind the Numbers

-

Numbers

-

New in Plaintext

- Dan Sullivan, an author and security expert, has penned a comprehensive text that will help readers better understand how these losses occur and how to prevent them. The Definitive Guide to Information Theft Prevention is an eight-chapter e-book available for free (the e-book is sponsored by Permeo Technologies, a provider of secure remote-access solutions)

A Site to See

- The next time you see Microsoft Windows’ “blue screen of death” or a “fatal error” message flash across your monitor, don’t get angry; reboot and then point your browser toward the DistroWatch Web site

Laws to Aid Breach Victims

- A Chronology of Data Breaches Reported Since the ChoicePoint Incident outlines many of 2005’s breaches and their causes, from 250 individuals who were put at risk when computers at East Carolina University were hacked to the millions at risk from breaches at CardSystems.

Quick Bytes: Trojans bearing gifts

- Trojan horse programs—those pieces of malware designed to infiltrate a computer and then steal information to be sent back to an attacker—accounted for more of the malicious code in 2005 than worms. This indicates, according to researchers at antivirus firm Sophos, that criminals may be moving away from large-scale bombardments in favor of targeted attacks that could yield passwords, credit card information, and bank login credentials. @ The Sophos Security Threat Management Report is at SM Online

Quick Bytes: Consumers demand security

- There is a growing business case for greater security: A survey of more than 8,000 individuals revealed that consumers are concerned enough about identity fraud that they are willing to pay more for security or change banks.

Quick Bytes: Risky e-mail

- he survey, which received responses from 1,042 workers in the U.S., was conducted by Harris Interactive for managed e-mail archiving company Fortiva

Worth a Look: A Web Camera for Surveillance

- Now, setting up a surveillance network—including motion-activation sensors—is as simple as plugging a Web camera into a computer’s USB port.

Web Sites Provide Rich Harvest for Spammers

-
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.