Share


Share

Share it !



share/bookmark
Jul
31

ST06-005: Dealing with Cyberbullies

Bullies are taking advantage of technology to intimidate and harass their victims. Dealing with cyberbullying can be difficult, but there are steps you can take. Cyberbullying refers to practice of using technology to harass, or bully, someone else. Bullies used to be restricted to methods such as physical intimidation, postal mail, or the telephone. Now, developments in electronic media offer forums such as email, ...
Jul
31

Cyber Security Hard to Remove

Cyber Security is a relatively new misleading application that shows fake scan results in an effort to trick and scare the user into purchasing the program. These types of bogus applications are referred to as Smitfraud in the virus and spy-ware removal world.This rogue client is a direct clone from Total Security Center. Once installed on your computer it can do many different things. Often times it will block other programs like anti-virus clients running and may also block security websites so you cannot download or install updates to remove this threat.As you can see without being able to use any real security program this threat can be very hard to delete. Often times the computer ...
Jul
31

Federal Cyber Security: Are We Winning or Losing?

At the recent Security Innovation Network (SINET) event held in Washington D.C recently a sober assessment of our nation's capacity to maintain an adequate cyber defense emerged.The state of our cyber defense was summarized by Michael Chertoff, former Secretary of the Department of Homeland Security when he concluded that it may take "a digital 9-11" to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing.Echoing this theme, Mr. Vivek Wadhwa, a respected cyber security analyst, argues, "Government simply can't innovate fast enough to keep pace with the threats and dynamics ...