Google Online Security Blog: “Approximately 12-14 million Google Search queries per day show our warning to caution users from going to sites that are currently compromised. Once a site has been cleaned up, the warning is lifted.” Continue Reading
Google Online Security Blog: “Approximately 12-14 million Google Search queries per day show our warning to caution users from going to sites that are currently compromised. Once a site has been cleaned up, the warning is lifted.” Continue Reading
Follow up to June 6, 2012 posting, LinkedIn Member Passwords Compromised, this update via the LinkedIn Blog: An Update On Taking Steps To Protect Our Members, June 9, 2012: “…In this post, we want to address questions weve been receiving and share what weve learned so far about the incident, how weve responded, and what… Continue Reading
Vicente Silveira, June 6, 2012: “We want to provide you with an update on this mornings reports of stolen passwords. We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. We are continuing to investigate this situation and here is what we are pursuing as far as next steps for… Continue Reading
Industry Botnet Group Principles for Voluntary Efforts to Reduce the Impact of Botnets in Cyberspace “The proliferation of botnets and malware in cyberspace threatens to undermine the efficiencies, innovation, and economic growth of the Internet and diminishes the trust and confidence of online users. Every participant has a role in helping to reduce the impact… Continue Reading
Cybersecurity: Authoritative Reports and – Resources, Rita Tehan Information Research Specialist, April 26, 2012 “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or… Continue Reading
Computer World: “Ninety percent of the Internet’s top 200,000 HTTPS-enabled websites are vulnerable to known types of SSL (Secure Sockets Layer) attack, according to a report released Thursday by the Trustworthy Internet Movement (TIM), a nonprofit organization dedicated to solving Internet security, privacy and reliability problems. The report is based on data from a new… Continue Reading
News release: “The Information Commissioners Office (ICO) is urging consumers to take better care of their data, following an investigation into the trade in used hard drives. The ICO has published new guidance to help individuals securely delete personal information from their old devices. An investigation by the ICO found that one in ten second-hand… Continue Reading
“The Consumer Federation of America (CFA) released Best Practices for Identity Theft Services: How Are Services Measuring Up?, which analyzes how well identity theft services are providing key information to prospective customers. The study is based on CFAs Best Practices for Identity Theft Services, voluntary guidelines that CFA developed with the help of identity theft… Continue Reading
“Federal Trade Commission Chairman Jon Leibowitz released the agencys 2012 Annual Highlights today at the spring meeting of the American Bar Associations Section of Antitrust Law in Washington, DC, recognizing the agencys continued efforts to protect consumers and promote competition. The Highlights, published in an online format for the first time this year, focus on… Continue Reading
Active Authentication: “The current standard method for validating a users identity for authentication on an information system requires humans to do something that is inherently unnatural: create, remember, and manage long, complex passwords. Moreover, as long as the session remains active, typical systems incorporate no mechanisms to verify that the user originally authenticated is the… Continue Reading
News release: “The Securities and Exchange Commission today announced a rule proposal to help protect investors from identity theft by ensuring that broker-dealers, mutual funds, and other SEC-regulated entities create programs to detect and respond appropriately to red flags. The SEC issued the proposal jointly with the Commodity Futures Trading Commission (CFTC). Section 1088 of… Continue Reading
FBI Fact Sheet on Internet Fraud: Includes information on: Avoiding Internet Auction Fraud, Avoiding Non-Delivery of Merchandise, Avoiding Credit Card Fraud, Avoiding Investment Fraud, Avoiding Business Fraud, Avoiding the Nigerian Letter or 419 Fraud, Common Fraud Scams, Investment-Related Scams, Internet Scams, and Fraud Target: Senior Citizens. Continue Reading