Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Thursday, February 21, 2013
Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST
Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST: The Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs, and approved members to edit their information as needed (mistakes on the original application cannot be corrected once the application is certified - your mistakes will need to be brought to the attention of CBP during your interview).
Sunday, February 17, 2013
Security startup Nok Nok Labs wants to rid the world of passwords — Tech News and Analysis
Security experts say it's not about getting to a level of perfect security, an impossibility. The realistic goal is to minimize risk as much as possible. People find it hard to remember and multiple passwords and user names so they get sloppy — they share and duplicate passwords — and that leads to risk. Nok Nok's tools could be one way to alleviate it.
http://gigaom.com/2013/02/11/security-startup-nok-nok-labs-wants-to-rid-the-world-of-passwords/
From My iPhone
http://gigaom.com/2013/02/11/security-startup-nok-nok-labs-wants-to-rid-the-world-of-passwords/
From My iPhone
Point-of-Sale malware attacks – crooks expand their reach, no business too small | Naked Security
http://nakedsecurity.sophos.com/2013/02/16/point-of-sale-malware-attacks-no-business-too-small/
As before, the criminals are avoiding very large businesses but in addition to the commonly attacked hospitality industry and hotel targets there are smaller victims, including a single car dealership in Australia.
Saturday, February 16, 2013
Tuesday, February 12, 2013
Trash status � WordPress Codex
Trash status � WordPress Codex: By default, posts, pages or comments in the trash will be permanently deleted after 30 days.
Monday, February 11, 2013
12 Professional CSS Buttons | Graeme Boy's Personal Website
12 Professional CSS Buttons | Graeme Boy's Personal Website:
This guy slaved away for a few hours and created nice buttons that work purely using CSS,and they are cross-browser compatible.
This guy slaved away for a few hours and created nice buttons that work purely using CSS,and they are cross-browser compatible.
Wednesday, February 6, 2013
Chinese Hackers Infiltrate New York Times Computers - NYTimes.com
Chinese Hackers Infiltrate New York Times Computers - NYTimes.com: For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.
Page 2 - 10 Cool Security Features In Mac OS X Lion
Page 2 - 10 Cool Security Features In Mac OS X Lion: "Specifically, the Address Space Layout Randomization (ASLR) security feature thwarts exploits by randomizing the arrangement position of key data areas, which make it more challenging for hackers to predict target addresses and launch attacks."
'via Blog this'
'via Blog this'
Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis
Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis: "To answer the “do we really need security tools for OS X?” question in a slightly different way than you’ve seen from many technology pundits, I’d like to turn your attention to utility called rkhunter or “rootkit hunter”"
'via Blog this'
'via Blog this'
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: With multi-factor authentication becoming widely used online, Parallels has followed suit by adding CertiVox SkyPin Multi-Factor Authentication Service across its entire cloud services enablement portfolio.
Tuesday, February 5, 2013
Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article
Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article: The breach occurred when an unencrypted laptop and unencrypted hard drive were stolen from the car of an employee. Data compromised for approximately 298,000 individuals included some or all of the following: name, gender, date and time of birth, Social Security number, drivers’ license number, email address, phone number, and type of adoption.
Common WordPress Malware Infections — Smashing WordPress
Common WordPress Malware Infections — Smashing WordPress: WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: Some web hosts, like DreamHost, support multi-factor authentication so customers can protect their accounts.
Two-factor authentication and compliance: What it is and isn't
Two-factor authentication and compliance: What it is and isn't: Let's start by explaining the standard definition of two-factor authentication and compare it with the FFIEC's view.
Gartner: What matters is risk-appropriate authentication
Gartner: What matters is risk-appropriate authentication: Are we reaching a stage where passwords need to be replaced by two- or even three-factor authentication methods and is there a future in federated identities?
Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes
Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes: Len Burman, Contributor
I’m a professor at Syracuse U. and focus on tax and budget policy.
I’m a professor at Syracuse U. and focus on tax and budget policy.
Saturday, February 2, 2013
Apple Infiltrates The Enterprise: 1/5 Of Global Info Workers Use Apple Products For Work! | Forrester Blogs
Apple Infiltrates The Enterprise: 1/5 Of Global Info Workers Use Apple Products For Work! | Forrester Blogs: Below are two portions of the graphics in our Apple Infiltrates The Enterprise report, released to clients today, and covered in a New York Times piece this morning
Subscribe to:
Posts (Atom)