Thursday, February 21, 2013

Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST

Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST: The Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs, and approved members to edit their information as needed (mistakes on the original application cannot be corrected once the application is certified - your mistakes will need to be brought to the attention of CBP during your interview).

Sunday, February 17, 2013

Security startup Nok Nok Labs wants to rid the world of passwords — Tech News and Analysis

Security experts say it's not about getting to a level of perfect security, an impossibility. The realistic goal is to minimize risk as much as possible. People find it hard to remember and multiple passwords and user names so they get sloppy — they share and duplicate passwords — and that leads to risk. Nok Nok's tools could be one way to alleviate it.

http://gigaom.com/2013/02/11/security-startup-nok-nok-labs-wants-to-rid-the-world-of-passwords/


From My iPhone

Point-of-Sale malware attacks – crooks expand their reach, no business too small | Naked Security

http://nakedsecurity.sophos.com/2013/02/16/point-of-sale-malware-attacks-no-business-too-small/

As before, the criminals are avoiding very large businesses but in addition to the commonly attacked hospitality industry and hotel targets there are smaller victims, including a single car dealership in Australia.

Tuesday, February 12, 2013

Trash status � WordPress Codex

Trash status � WordPress Codex: By default, posts, pages or comments in the trash will be permanently deleted after 30 days.

Monday, February 11, 2013

12 Professional CSS Buttons | Graeme Boy's Personal Website

12 Professional CSS Buttons | Graeme Boy's Personal Website:

This guy slaved away for a few hours and created nice buttons that work purely using CSS,and they are cross-browser compatible.

Wednesday, February 6, 2013

Chinese Hackers Infiltrate New York Times Computers - NYTimes.com

Chinese Hackers Infiltrate New York Times Computers - NYTimes.com: For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

Page 2 - 10 Cool Security Features In Mac OS X Lion

Page 2 - 10 Cool Security Features In Mac OS X Lion: "Specifically, the Address Space Layout Randomization (ASLR) security feature thwarts exploits by randomizing the arrangement position of key data areas, which make it more challenging for hackers to predict target addresses and launch attacks."

'via Blog this'

Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis

Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis: "To answer the “do we really need security tools for OS X?” question in a slightly different way than you’ve seen from many technology pundits, I’d like to turn your attention to utility called rkhunter or “rootkit hunter”"

'via Blog this'

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: With multi-factor authentication becoming widely used online, Parallels has followed suit by adding CertiVox SkyPin Multi-Factor Authentication Service across its entire cloud services enablement portfolio.

Tuesday, February 5, 2013

Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article

Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article: The breach occurred when an unencrypted laptop and unencrypted hard drive were stolen from the car of an employee. Data compromised for approximately 298,000 individuals included some or all of the following: name, gender, date and time of birth, Social Security number, drivers’ license number, email address, phone number, and type of adoption.

Common WordPress Malware Infections — Smashing WordPress

Common WordPress Malware Infections — Smashing WordPress: WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: Some web hosts, like DreamHost, support multi-factor authentication so customers can protect their accounts.

Two-factor authentication and compliance: What it is and isn't

Two-factor authentication and compliance: What it is and isn't: Let's start by explaining the standard definition of two-factor authentication and compare it with the FFIEC's view.

Gartner: What matters is risk-appropriate authentication

Gartner: What matters is risk-appropriate authentication: Are we reaching a stage where passwords need to be replaced by two- or even three-factor authentication methods and is there a future in federated identities?

Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes

Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes: Len Burman, Contributor

I’m a professor at Syracuse U. and focus on tax and budget policy.

Saturday, February 2, 2013