Archive for 'Nerd Speak'
Facebook’s core business problem Logging on to Facebook has become the digital equivalent of visiting the DMV: it’s hot, it’s crowded, everyone’s waiting around in boredom and a bunch of crazy people are shouting in the corner. Andrew Nusca’s article (and quote) is spot-on! This is exactly why I don’t go onto FB anymore… It
Give your passwords a security check-up secuniablog: robpegoraro: This week’s USAToday.com column provides some background on the Yahoo Voices password breach (yours is probably not affected) and a refresher course on setting strong but memorizable passwords (no, you don’t have to change them every 30 or 90 days). It wraps up with a tip about
Hackers of all sorts have been busy as news of different organizations and companies had their security compromised broke last week. Here is a round-up of who’s been hacked: Android Forums hacked: 1 million user credentials stolen (via +ZDNet) Stolen passwords re-used to attack Best Buy accounts (via +ZDNet) One in five Microsoft logins are in hands of hackers (via +ZDNet)
Google Apps for Nonprofits Did you know Google is making Google Apps available FREE to qualified U.S. 501(c)(3) nonprofit organizations with fewer than 3,000 users? You have to apply and be qualified for the free (or discounted) service, but once qualified, your organization can receive some pretty good perks, including: Free or discounted version of Google
Google Apps for Nonprofits Did you know Google is making Google Apps and other Google products available FREE to qualified U.S. 501(c)(3) nonprofit organizations with fewer than 3,000 users? You have to apply and be qualified for the free (or discounted) Google products and services, but once qualified, your organization can receive some pretty good
Instagram vulnerability: Anyone can add you, see your photos Instagram users, beware…
10 Basic Steps to Secure Your PC & Online Accounts By no means bulletproof, but these steps are a start (hence, “basic”)… What else do you do to protect your computer and information online?
Cross-platform Trojan attacks Windows, Mac & Linux If browsers and legit software downloaders can detect what OS you’re using and show the the appropriate page or software edition, it should be no one’s surprise that a Trojan downloader can do the same thing… I mean, why spend the time to write a piece of malware
Stolen passwords re-used to attack Best Buy accounts I had kind of a “Duh!” response to this “breaking news”… Hackers use compromised password lists to perform hacks and password lists cost $$$, of course the hackers are going to re-use the lists they have spent $$$ on… But really, this is a reminder how important
ComputerWorld: 10 crazy IT security tricks that actually work IT security threats are constantly evolving. It’s time for IT security pros to get ingenious Network and endpoint security may not strike you as the first place to scratch an experimental itch. After all, protecting the company’s systems and data should call into question any action