A recent CNet.com article reports that “At its I/O conference, two of Google’s top-level security experts, the director of security for Google Apps, and the head of Chrome security; say the company is intensely focused on the issue, but passwords remain a thorny problem.” The “company”, Google, being intensely focused on security; in my opinion, remains to be seen. However, they stated “Unfortunately the human is often the weakest link in security.”
What a smoke screen! Instead of owning up to royally missing the boat on Google apps for the Android available through Google Play store, they talk about Continue reading
scribd logo (Photo credit: cjaffepickett)
According to a recent CSO.com.au article: Hackers broke into the network of popular document sharing service Scribd earlier this week and may have compromised “less than 1 percent” of its users’ passwords, according to the company. That amounted to almost 1 million passwords compromised.
The interesting thing about this Internet application Continue reading
Target: Mobile Devices is the second installment of the series of “Target” articles, discussing the various areas the cybercrime organizations are attacking. Unfortunately for computer users, our Internet environment is, as the military would say, “a target rich environment”. See Target: Social Networking Sites, the first article, to get some background on the tactics and strategies of cyber crime organizations.
Mobile devices include smartphones, tablets, PDAs, or any small, handheld computing device that can access the Internet. Continue reading
Online banking comes in a couple of flavors; wired and wireless. The wired method involves using a financial institution’s Internet webpage accessed with a computer that is connected to the Internet via a cable or other provider through a receptacle in your home. The wireless method is similar, but the access to the bank’s Internet webpage is through the use of cell phone technology.
The wired method is much safer than the wireless method for several reasons. Continue reading
Google has announced that there are 500 million Android devices (Internet capable smartphones, etc. with an Android operating system) activated globally. And that there are 1.3 million activated each day. That being the case, it’s no wonder why Android is the target of choice of cybercriminals the world over. Continue reading
Java is one of the top five ways cyber crooks infect your computer with malware. A quick and easy way to avoid this threat is to disable Java from your computer’s Internet browser. Many Internet websites use Java in their website design, and those sites depend on Java being enabled on your computer. However, it’s been my experience that most sites, at least the ones I visit (many) operate okay without Java enabled. However, if the ones you visit often don’t operate well without it, then enable it temporarily only when it’s necessary. Here’s a great article on Java’s use on your computer. Continue reading