Photo Courtesy of Scubadive67 from Creative Commons Cookies aren’t just a delicious treat with milk. Cookies are text files that are created when users visit websites. They store information such as shopping cart contents, registration or log in credentials, and user preferences. When a user returns to a website, a cookie provides information and allows…Read More
The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.
For those who were not in attendance at congress, this four-part series will summarize some of the most popular sessions at the event.
If you’ve got an email account, you’ve had to put up with spam, or UBE (Unsolicited Bulk Email). It’s inconvenient, annoying, and can cause damage. Spam can open you up to the risk of malware, adware, and spyware. It can put your personal information at risk. Fortunately, there are steps you can take to minimize…Read More
Securing the journey to virtualization is complicated by two factors – (1) risks that are present in the physical datacenter, and (2) those that are unique to virtualized environments. As enterprises rush to embrace the benefits of virtualization, they have also rushed to implement traditionally architected security solutions in virtualized environments. Unfortunately, while this approach is familiar to enterprises, it results in undesirable consequences.
If you type in an online search for “learn to hack,” you get over 28 million results. It’s pretty obvious that there are a lot of resources out there for anyone who wants to learn about hacking. You can even learn about specialized hacking: email, Facebook, MySpace, passwords. It’s all out there. Hackers have different…Read More
You know that you need security protection for your computer, but you may not know what to look for in Internet security software. What makes one type of Internet security different or better than another? Threats to your computer and data have changed over the years. As computers and networks have become more sophisticated, so…Read More
Many of today’s Internet scams originate overseas, especially in Russia and Eastern Europe. However, they do rely on a local component, and you want to make sure that you do not end up unwittingly becoming involved in cybercrime. You’ve probably seen ads for what appear to be great job opportunities. “Work from home! No experience…Read More
Just what are hackers, zombies, and bots? And why should you care? All three of these online threats can cause serious damage, either by getting at your private information or by gaining control of your computer. Here’s a quick summary of these dangerous three: Hackers A hacker is a person who creates and modifies computer…Read More