Archives: 'Uncategorized'

Doug Bedell — December 11, 2017, 10:56 am

Meet the ‘Good Guys’: White-Hat Hackers

Steve Zurier on the DarkReading blog fills us in on who the “good guys” are in seeking to keep the Internet reasonable free of hackers. “Most knowledge-seekers,” Steve explains, “have been involved in the bug bounty scene for less than two years and want to learn more. Bugcrowd reports that 63% say they invest their […]

Doug Bedell — December 4, 2017, 1:18 pm

A Security Tale: Truant With a Plastic Bag

Here’s an off-the-beaten path piece from Naked Security about the efficacy of almost anything an employer might issue to track his or her employees during business hours. The employer of an electrician in Australia issued a GPS-enabled personal digital assistant (PDA) to an employee who, sad to say, placed it in an electrically conductive “cheese […]

Doug Bedell — November 27, 2017, 10:52 am

Theft Risks in Providing Student Financial Aid Data

Parents of children seeking financial aid from colleges should be mindful that a great deal of information on their family finances and other personal matters becomes potentially available to computer hackers in the process. Brian Krebs of Krebs on Security lists 108 items – from the student’s driver’s license number to his or her Social […]

Doug Bedell — September 22, 2017, 12:10 pm

Computer Hacking: A Top-Ranking Security Concern

Evidence that the security of using the Internet is a growing concern comes in a Dark Reading post headed “Americans Rank Criminal Hacking as Their Number One Threat”. Criminal hacking scored above air pollution and disposal of hazardous waste in landfills as concerns of the 740 respondents in an online survey. “It’s pure speculation on […]

Doug Bedell — August 16, 2017, 2:47 pm

Good Security Takes Continuing Attention, Discernment

Good security starts with continuing attentiveness to what is being kept safe from intrusion. The attendent circumstances don’t lend themselves to trivialization or distortion, as Brian Krebs discusses in a post headed “Beware of Security by Press Release”. As Krebs explains, “It goes a bit like this: A security firm releases a report claiming to […]

Doug Bedell — August 4, 2017, 1:56 pm

You Think This Sounds Fishy? Well, It’s Not

If it’s one of the latest models, not even your fish tank may be secure. Truly. The Washington Post reports how hackers stole data from a North American casino “by using an Internet-connected fish tank”. “The fish tank had sensors connected to a PC that regulated the temperature, food and cleanliness of the tank.” “‘Somebody […]

Doug Bedell — July 28, 2017, 11:02 am

Security’s Realities, Both Physical and Digital

On the Security blog, Kevin Coleman, a security authority and visionary, identifies “the top five drivers of current approaches and strategies for security.” They are both physical and digital. For PRO Barrier, whose expertise is primarily in entrance and perimeter security, the most pertinent of Coleman’s concerns is “obsolete/inadequate physical and digital perimeter protection capabilities.” […]

Doug Bedell — July 14, 2017, 1:29 pm

Recruiting Cybersecurity Pros a Growing Challenge

Knowing how to detect and deter cybersecurity intruders is an increasingly sought-after skill. Ericka Chickowski on the DarkReading site advises that “by 2022 there will be a global shortfall of cybersecurity workers of 1.8 million people.” Ms. Chickowski adds that “A lot of the issue comes down to the fact that there aren’t enough candidates […]

Doug Bedell — June 26, 2017, 11:54 am

Hoax Bomb Threats Vex Universities, Businesses

In a persistent security concern, universities are being plagued with hoax bomb threats being sent to printers and fax machines on their campuses, Security InfoWatch reports. Citing a USA Today report, InfoWatch advises that the universities affected include Vanderbilt University, University of Southern California, University of Virginia and University of Detroit-Mercy. The report adds that […]

Doug Bedell — June 6, 2017, 8:43 am

Schools Being Protected From a Security Control Center

The public schools in Littleton, Colorado, are demonstrating how security principles can be applied to an entire school system, with the state of the electronic art monitored from a single control center. “Staff,” advises the Security Industry Association, “can watch video feeds displayed on a wall of 16 screens and view access control information for […]