Archives: December, 2017

Doug Bedell — December 11, 2017, 10:56 am

Meet the ‘Good Guys’: White-Hat Hackers

Steve Zurier on the DarkReading blog fills us in on who the “good guys” are in seeking to keep the Internet reasonable free of hackers. “Most knowledge-seekers,” Steve explains, “have been involved in the bug bounty scene for less than two years and want to learn more. Bugcrowd reports that 63% say they invest their […]

Doug Bedell — December 8, 2017, 1:40 pm

Perimeter Security Involves Length, Sizes and Values

You may think that securing a perimeter is simply a matter of putting up a fence and letting it be. Not so, notes the Advanced Perimeter Systems blog. It depends on the perimeter in question and what’s inside it. Here, for example, are three perimeter settings – an international airport, the Great Pyramids of Giza […]

Doug Bedell — December 6, 2017, 4:00 pm

‘Phishers’ and ‘Spear Phishers’ Explained

Phishing and spear-phishing – the difference between these two forms of cyber security attacks is explained in a TechCrunch post. “Spear-phishing, like phishing, involves emailing a malicious link or file. Whereas phishers send mass emails in hopes of stealing credit card information, Social Security numbers and login credentials from as many people as possible,” Tom […]

Doug Bedell — December 4, 2017, 1:18 pm

A Security Tale: Truant With a Plastic Bag

Here’s an off-the-beaten path piece from Naked Security about the efficacy of almost anything an employer might issue to track his or her employees during business hours. The employer of an electrician in Australia issued a GPS-enabled personal digital assistant (PDA) to an employee who, sad to say, placed it in an electrically conductive “cheese […]