The origin of the term “hacker” goes back several decades. Originally, it referred to anyone who enjoyed tinkering with electronic devices to see how they worked and how they could be improved. Today, the term hacker is most commonly associated with someone who accesses a computer or data on a computer without permission. A hacker…Read More
So, your parents have finally joined the rest of the world and gotten a computer. Here’s how you can help make their online experience enjoyable and safe: • Suggest they take an introductory computer/Internet class. (Some local community centers may offer this for free—also try the library, community college, or even a senior center.) Review…Read More
Plenty of regulatory regimes mandate that enterprises have a segregation of duties or separation of duties as a required internal control mechanism. Separation of duties divides the responsibility of a critical task among different people and provides “checks and balances” against fraud or error.
Check your online security savvy. How many of these common myths did you believe? Myth 1. Installing and using antivirus software is enough to protect my system from viruses Having antivirus software is critical to protect your system from viruses, but you need to make sure your security is up to date, and that’s a…Read More
Enterprises using Adobe in an Infrastructure as a Service (IaaS) cloud environment may find a new Adobe Flash Player vulnerability to be of interest. Trend Micro’s antivirus and Trend Micro Deep Security offerings can both protect for this latest vulnerability and counter exploits of the vulnerability. If you have a IaaS cloud server with a…Read More
Internet hoaxes have been around almost as long as the Internet because the technology provides a perfect vehicle for spreading an urban legend. All you have to do is post a “tall tale” on a website or send it in an email and it seems that in no time everyone is chattering about it. See…Read More
Adobe has issued a security advisory APSA 10-03 describing a new critical vulnerability in its products. This time, the primary target is Flash Player with multiple platforms—Windows, Mac, Linux, Solaris, and Android—all affected and is currently being exploited in the wild. Current versions of Acrobat and Reader—the target of last week’s vulnerability—are also affected by…Read More
There are hundreds of scams on the Internet today. While some are entirely plausible, others are so farfetched they make you laugh. Yet, for the, ahem—gullible, these can be costly and dangerous. Here are five classic viral scams that have tricked many people over the years: SCAM #1: A wealthy Nigerian needs your help to…Read More