INFORMATION

Site Map - IT

Social Networking Sites Assist Investigations

- As more investigators use social media, they need to be aware of the legal issues and tread carefully.

Morning Security Brief: Data Breach Notification, IPv6 Launches Worldwide, Arson Mystery at WSU, and More

- Consumers are unhappy with data breach notifications. IPv6 launches. Washington State University sees it fourth arson in two weeks. And more.

EHarmony User Passwords Exposed

- The Web site eHarmony acknowledged yesterday that a small percentage of its users’ passwords may have been exposed in an online forum used by hackers.

This Is How Easy It Is To Get Your Password Stolen Online

- Hackers are expected to increase LinkedIn phishing attacks and a web builder creates a site to find out if your password was among those hacked.

EU Parliament Committees Reject ACTA Treaty

- Four European parliament committees have voted against a major international treaty that aims to protect against online piracy and the trade of counterfeit goods.

Newly Discovered Malware Considered Especially Sophisticated

- A newly discovered malicious software program is one of the most comprehensive and sophisticated attack kits yet discovered, according to the software firm Kaspersky Lab.

Electronic Devices

- The Symantec Honey Stick Project lost smartphones on purpose to see what people did when they found them. The finders searched personal and business data on the phones.

Hiring IT Experts

- This Government Accountability Office report describes how some government agencies could improve the way they hire and retain cybersecurity professionals.

FTC Names Internet Privacy Expert as Policy Advisor

- The Federal Trade Commission has hired privacy expert Paul Ohm as a senior policy advisor for consumer protection and competition issues affecting the Internet and mobile markets.

Developing a Cybersecurity Staff

- The federal government can improve its cybersecurity capabilities through more targeted hiring and training of a cybersecurity work force, but that’s easier said than done.

Consolidating Authorization

- Helping companies consolidate the network access and authentication process.

Social Networking Sites Assist Investigations

- As more investigators use social media, they need to be aware of the legal issues and tread carefully.

CHART: Types of Data Breaches

- Criminals target strikingly different types of data in large and small organizations.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.