Biometrics give a false sense of security. On Sept 23, 2015, Office of Personnel Management (OPM) revised the number of stolen fingerprint files to 5.6 million! Why should you care? Some security pundits believe that biometrics are far more secure than passwords. They...
87% of all business owners who seriously inquire about Power LogOn® end up buying it. Before I go into why, here are some new findings from Javelin Strategy & Research’s latest report 2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove...
USB Smart Card Readers for Network Access Authentication are Still Safe. A number of online computer news sites are abuzz about a security team’s prototype malware that hijacks USB smart card readers. It seems that a research team out of Luxembourg has issues a...
They Are Just Drawn That Way Paraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline:...
8.24 Million Passwords and User Names stolen and posted by hackers. If you use the online gaming site Gamigo, if your user name was your email address and you use the same password elsewhere then you need to be very, very concerned. Cyber criminals will now...
Cyber Crime Protection – Evaluate and Segment Data It only seemed like yesterday that when business owners were asked about network security their focus was on identity theft protection and/or compliance with the different state and federal privacy laws....
Access Smart Announces a New Password Manager for Windows Reseller in Africa Access Smart® is pleased to announce a new Power LogOn – Password Manager for Windows – reseller in Africa. Pure Access IT, LTD, located in Abuja, Nigeria, is adding...
Google is gathering your personal and corporate data. Google Inc. (GOOG) motto is, “do no harm.” But who defines what is harmful? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...