smkinoshita - many security pro's I know get the passwords right but still share the information on the secret questions across multiple accounts. If I can get your answers from your facebook page I will just change your password...
Not only is a single signon kinda scary but it messes up a lot of personal security in my opinion. I have several kinds of passwords -- some for low-importance items that won't hurt me, to mid-level stuff that won't hurt me but is important, to high-stuff that I want to make sure is secure.
I keep hoping that at some point basic Internet security and safety will be a mandatory class in public school -- from dealing with trolls and cyberbulling to the understanding of long-term consequences of social media and sharing as well as the techniques used by cyber-scum.
I think there's a psychological barrier. People are so emotionally and physically close to their smartphones, they can't believe they're "owned" by someone else. One reason they take so little care with pins.
@phenrycissp: Is it better to attempt to be proactive or just stick to being reactive? You mention looking at logs, but log mining is a very tedious process especially if you don't know exactly what you're looking for. How do you feel about dashboards for monitoring network activity?
Victor - yes the malware comes from a "driveby malware website" but it still has to execute on your PC and that is whre white listing comes in to play - I don't care haow it is delivered if I am using whitelisting...
On white listing in the simplest of terms... only allows validated code that is explicetly permitted to run to ever execute on a given machine... it goes a long way at mitigating malware... a new day zero exploit hits your machine and your running traditional AV and your toast..... if your running a whitelisting solution it is stopped in its tracks..
The whole Amazon.reader debate is a double-stupid. It's stupid to think that there's any e-book buyer who doesn't know Amazon's URL, and it was stupider to let ICANN launch the whole free-form TLD initiative to start with.
Enterprises would like to move to cloud computing but are hesitant because they are concerned about providers’ ability to secure company data. Here are some tips that help to ensure that if breaches occur, the business is not left holding the bag.
Edmunds separates customers into segments based on the info it collects on its site and from partners, and uses that to push out custom content, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
The automotive website uses propensity modeling to target ads and customer registration forms, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?