Tech Zone

Page 2

Saying Goodbye – and Other Social Networking Private Messaging Etiquette Dilemmas

Saying goodbye to someone you like is always difficult – but on social media, it sometimes seems to border on impossible. Maybe that explains the addictive nature of such sites. As with a good book, it seems you can never find a stopping place.

Continue reading

Managing your online persona(s)

Many of us lead busy lives and managing your online person(s) might sound like just another chore that you don’t need. However, in today’s business and social environments, the time invested can save you a great deal of grief – or even help you land that dream job or meet Mr. or Mrs. Right.

Continue reading

Is it time for device vendors to stop “gifting” us with unwanted, risky software?

A few days ago, Yahoo! Tech reported that Lenovo has been selling laptops that come pre-installed with malware created by a company called Superfish, which is designed to inject advertisements in the web browser but also compromises the certificate-based security protocols that enable computers to detect imposter web sites and can make the computers vulnerable to HTTPS man-in-the-middle (MITM) attacks.

Continue reading

Security 101: Authentication (Part 2)

Welcome to part two of our three-part series on authentication. In this post we will review some of those that are used in networks.

Continue reading

Most vulnerable operating systems and applications in 2014

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

Continue reading

23 ways to be the IT department’s MacGyver

Here is a list of things you may want to keep nearby so that you too can pull off a “MacGyver”.

Continue reading

The Secret Question Threat

At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.

Continue reading

61 network security twitter feeds to follow

Information security pros abound on Twitter. While not all of their tweets may be 100% focused on InfoSec, we’ve picked 61 network security Twitter feeds we think are worth following.

Continue reading

Software vulnerabilities: Only half the story

Intermediary devices such as routers and WAPs can be targeted by attackers. The latest example is an exploit that takes aim at a security vulnerability in routers made by a number of popular vendors, including D-Link, ZTE and TP-Link.

Continue reading

Security 101: Authentication (Part 1)

In this post, we’re going to look at the first of the three As: Authentication. We’re going to focus on authentication as confirming a user.

Continue reading

Find us on Facebook

Follow us on Twitter