Tag Archives | Security

Disaster Is Just a Click Away: Computer Scientist, Psychologist Look at Developing Visual System to Warn Internet Users of Safety Risks

A Kansas State University computer scientist and psychologist are developing improved security warning messages that prompt users to go with their gut when it comes to making a decision online. Eugene Vasserman, assistant professor of computing and information sciences, and Gary Brase, associate professor of psychology, are researching how to help computer users who have [...]

Read full story Comments { 0 }

Quantum Cryptography Theory Has a Demonstrated Security Defect

Researchers at Tamagawa University announced August 10 that they had demonstrated the incompleteness and limit of the security theory in quantum key distribution. The present theory cannot guarantee unconditional security. Details will be given at the SPIE conference on Quantum Communication and Quantum Imaging on August 15, 2012. Many papers claim that the trace distance, [...]

Read full story Comments { 0 }
How 1 Person’s iPad Sync Brought Down Our Exchange Server

How 1 Person’s iPad Sync Brought Down Our Exchange Server

At Coyote Creek, we’ve deployed iPads here to all employees. We all love our iPads, including the convenience of being able to use them for sending and receiving emails, calendar items, etc. However, we’ve recently experienced a pretty serious problem that we wanted to warn you about. Best as we can tell, this problem is [...]

Read full story Comments { 0 } Download Whitepaper
Selection Criteria for Choosing Mobile Device Management Software

Selection Criteria for Choosing Mobile Device Management Software

Thanks to the “bring your own device” movement, many organizations now have the need for mobile device management solutions that can manage the employee-owned devices that are accessing their corporate networks. The good news is there are numerous providers in the mobile device management solution arena, many options to choose from, and a known set [...]

Read full story Comments { 0 } Download Whitepaper
Password Security update for the week of 5/29

Password Security update for the week of 5/29

Passwords are used for virtually everything we do online. Passwords protect our identities on websites, discussion groups, e-mail accounts and more. From family computers to your system at work – many users have multiple user accounts and passwords. Passwords are also used for bank transactions and making secure purchases. With all of this sensitive data [...]

Read full story Comments { 0 }
Internet Crime Complaint Center’s (IC3) Scam Alerts 4/20/2012

Internet Crime Complaint Center’s (IC3) Scam Alerts 4/20/2012

This report, which is based upon information from law enforcement and complaints submitted to the IC3, details recent cyber crime trends, new twists to previously-existing cyber scams, and announcements. Investment Scam The IC3 continues to receive complaints involving subjects who have obtained the names and social security numbers of individuals for illegal purposes. Subjects use [...]

Read full story Comments { 0 }
Bring Your Own Device – is it for you?

Bring Your Own Device – is it for you?

Bring Your Own Device (BYOD) describes the recent trend of employees bringing personally-owned mobile devices to their place of work, and using those devices to access privileged company resources such as email, file servers, and databases.                 It’s a hot topic these days, with both small and large [...]

Read full story Comments { 0 }

Network Security update for the week of 4/23

Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.             Networks can be private, such as within a company, and others which might be open to public access. Network security is [...]

Read full story Comments { 0 }
Mobile Update for the week of 4/9

Mobile Update for the week of 4/9

Cell phones are fetching an integral part of our daily lives. It is no surprise that a revolutionary study just released says mobile technology has everlastingly changed the way we love, live and work. The cell phone has made long distance interactions easy. GSM phones that place calls worldwide have turned this world into a [...]

Read full story Comments { 0 }
No Privacy, please!

No Privacy, please!

We are in a world were our communication, information , search, entertainment, creation, and content are done with some form of digital device with access to the internet. This dynamic intricately tied to our personal and professional lives : privacy both online and offline is being transformed.  Some of this is within our control and [...]

Read full story Comments { 0 }