09/21/2007 - Most bank robbers wear a mask or otherwise attempt to disguise themselves when they carry out their robberies. Likewise, online miscreants are eager to put on another persona when they launch attacks or send spam.
09/21/2007 - Software that’s built into the drive provides encryption, an e-wallet function for storing credit card numbers, and single sign-on to applications and Web sites. Data is encrypted using 256-bit AES encryption. A 4-to-40-character password is optional.
09/21/2007 - Unlike the bricks-and-mortar world, where you can lower your risk of becoming a victim of crime by staying out of dangerous neighborhoods, digital threats are fairly equally dispersed. Crimeware can—and probably does—arrive several times a day into your e-mail’s inbox, and an unpatched computer can pick up a “drive-by” infection simply by visiting an infected site. If you want to learn more about online fraud and crimeware, visit a new Web site from Symantec that offers detailed explanations of well-known as well as nascent threats. It also includes prevention tips and advice about what to do if you are victimized. There are even some demonstrations of phishing, pharming, and Trojan horses, as well as some quizzes that will let you test your knowledge of the online threatscape. The rich resources and explanations make it A Site to See.
09/21/2007 - RFID tags are becoming increasingly popular, and a debate is underway over the privacy implications of this technology. Editor's Note: The discussion of a DHS report on RFID in the section entitled "Homeland Security" includes a correction from the print edition. The error was introduced by the editor, not the author.