Archives: March, 2015

Doug Bedell — March 30, 2015, 10:45 am

Tweeting Away on Security Matters

In case you might not be aware of it, homeland security is a significant presence on Twitter. Not only does the U.S. Department of Homeland Security have a Twitter feed, there’s a separate one by DHS’ Science and Technology Directorate. And the hashtag #homelandsecurity will take you to a continuing stream of tweets on security […]

Doug Bedell — March 27, 2015, 10:27 am

Brian Krebs Checks Out a Web Fraudster

Who’s behind scams and fraud on the Internet? Lots of folks, no doubt, but Brian Krebs has gone to the trouble seeking to identify one such “author,” the knave behind Antidetect, “a commercial tool designed to help thieves evade fraud detection schemes employed by many e-commerce companies.” There are, Kreds notes, actually web “crime forums” […]

Doug Bedell — March 25, 2015, 9:31 am

Power Grid Security Includes Fences and Vehicle Barriers

USA Today has it right in a story about vulnerabilities in the nation’s electric power grid. “About once every four days,” its report states, “part of the nation’s power grid…is struck by a cyber or physical attack.” Could one of them be a precursor to a devastating regional attack? There aren’t many security priorities higher […]

Doug Bedell — March 23, 2015, 11:32 am

Watch For Online Fraudsters, a Risk in Social Media

An example of why it’s worth paying attention to the doings on social media in security terms: Until the vendor is caught, at least, it may be possible to purchase stolen Social Security numbers and personal information online. That’s the take-away from a Naked Security post on a fraudster who made a taunting Twitter post. […]

Doug Bedell — March 20, 2015, 1:35 pm

Information Security Threats Foreseeable Through 2017

The technology security horizon is clouded and uncertain, advises the Information Security Forum. To document its concerns, the ISF lists the “9 Biggest Information Security Threats for the Next Two Years” – through 2017. “A lot of the threats we see now are enabled or created by technology,” says Steve Durbin, the ISF’s managing director. […]

Doug Bedell — March 18, 2015, 3:07 pm

Despite Their Fences, Perimeters Are Security Risks, Too

Vehicle barriers can protect access roads and entryways. But in between, a lot of times, is fencing. Give attention to fencing, as well, in your perimeter security planning. For example, Slate’s Crime blog, notes that in Belgium “the other day” thieves made off with approximately $50 million in diamonds by driving through a hole they […]

Doug Bedell — March 16, 2015, 10:23 am

For Computer Security, Install the Latest Op System Version

Which computer operating system is the most secure? Forget about Apple’s reputation for invulnerability – that was before its machines became as popular as they are today. Safe & Savvy says the most secure system is the one that’s patched regularly. So check faithfully on your software downloads – Windows or Mac – to insure […]

Doug Bedell — March 13, 2015, 9:28 am

Shopping Centers Need Continuing Security Attention

Security at shopping malls has been “ramped up” since 9/11, says Government Security News. But that needs to continue. “Most people shop within 15 minutes of home a couple of times a week on average and are familiar with their surroundings and stores,” GSN notes. “If you see someone acting strangely…you should alert law enforcement […]

Doug Bedell — March 11, 2015, 4:28 pm

Keep DHS Intact, Says Homeland Security Watch

Homeland Security Watch states the case against breaking up the Department of Homeland Security. Such a move evidently isn’t being seriously considered by Congress, but it evidently is favored by a Cato Institute writer. Dismantling DHS’, says HSW, would place the department’s coordinating role against terrorism and in disaster response at risk. “We’d be better […]

Doug Bedell — March 9, 2015, 11:30 am

Assigning Blame For Hacking

Bruce Schneier discusses the difficulty that arises when an organization’s computers are hacked and it’s trying to decide who did the molesting. “We’re living in a world,” Schneier writes, “where we can’t easily tell the difference between a couple of guys in a basement apartment and the North Korean government with an estimated $10 billion […]