M-06-16, Protection of Sensitive Agency Information, June 23, 2006 (10 pages, PDF) AP: Recent Government Security Breaches Postings on ID Theft Continue Reading
M-06-16, Protection of Sensitive Agency Information, June 23, 2006 (10 pages, PDF) AP: Recent Government Security Breaches Postings on ID Theft Continue Reading
The 2006 Technology, Media and Telecommunications Security Survey (16 pages, PDF), Deloitte Touche Tohmatsu: “Security has long been neglected in the Technology, Media & Telecommunications (TMT) industry and the problem continues today. The frequency and sophistication of the attacks are growing, yet many surveyed companies tend to treat security as a relatively minor issue. So… Continue Reading
Yet another report today about the theft of a laptop from the home of a government employee, this time involving info on D.C. government personnel. The issue of why so many institutions have not implemented proper security measures, such as encryption on digital media removed from the office, remains baffling. Continue Reading
Researchers Find Technique to Quickly Erase Hard Drives: “Scientists at the Georgia Institute of Technology (Atlanta), working with L-3 Communications Corp. (New York), said they have developed a technique for quickly erasing hard-disk drives…The researchers concluded that permanent magnets are the best solution.” [Slashdot] Continue Reading
Microsoft Security Response Center Blog Continue Reading
Hearing, Cyber Security Challenges at the Department of Energy, June 9, 2006. [note: links to member statements and witness testimony not yet available – after an open session, there was a closed session to discuss security issues related to a previously unreported data breach.] AP: DOE Computers Hacked; Info on 1,500 Taken Continue Reading
“Active Security Monitor is a software program that helps you determine how vulnerable your PC is to computer viruses, spyware and other dangers and learn what steps you can take to improve your protection. And if you have more than one PC in your home network, you can use Active Security Monitor to check the… Continue Reading
Outbound Email and Content Security in Today’s Enterprise, 2006 (free reg. reg’d): “Enterprises are becoming increasingly concerned about creating, managing and enforcing outbound email policies that ensure that messages leaving the organization comply with both internal rules as well as external regulations.” Continue Reading
Press release: “A new cyber security study released today highlights the difference between perception and reality of consumers’ awareness of online scams and their actual online behavior. While 87 percent of consumers polled said they were confident they could recognize fraudulent e-mails, 61 percent failed to identify a legitimate e-mail. Most respondents categorized all e-mails… Continue Reading
Press release: “Wireless Internet access can free you from the confines of cords, but not from the need for security. Without taking the proper precautions, it’s easy for others to use your wireless network connection to access the Internet, or even to access the information on your own computer. The Federal Trade Commission is introducing… Continue Reading
The Safety of Internet Search Engines (Google, Yahoo, MSN, AOL, Ask), May 12, 2006, by Ben Edelman and Hannah Rosenbaum. “Abstract: We compare safety of leading search engines, using SiteAdvisor’s automated Web site ratings. We find most leading search engines similar in the safety of the sites they link to, though MSN is the safest… Continue Reading
“The Committee on Energy and Commerce, to whom was referred the bill (H.R. 4127) to protect consumers by requiring reasonable security policies and procedures to protect computerized data containing personal information, and to provide for nationwide notice in the event of a security breach, having considered the same, report favorably thereon with an amendment and… Continue Reading