60-Seconds 304: Moaning about government surveillance? Seriously?

I have to write this rant once about ever couple of years or so. I preached it in the late 1980s, I preached it in the mid-1990s, then again in the 2000s and I guess it's time again. January 10, 2014

Blacklisting, Whitelisting and the Way Forward: Comments on the Schneier-Ranum Face-Off

In this 60-Second Window, I step aside for George Tubin, Trusteer's Senior Security Strategist on the matter of how we face the looming storm of cyber security and the coming spector of cyber war. Nobody wants it, but there seems to be an ever increasing debate over how to avoid it. These figures figure heavily into the debate, and the future of our digital infrastructure. March 27, 2013

Fear of governments snooping deters companies from using the cloud

Almost half of IT experts are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, according to a new survey from Lieberman Software which was released in February. February 14, 2013

Can you afford to have your Macbook Pro or AirBook stolen?

Laptops are being stolen more frequently than ever before -- 38,000 stolen this year according to Mckeay, the security company. There are theft-rings and crime cartels that thrive on moving car-loads of laptops from city to city. Many times you have no chance at saving the device -- but if there is a chance, you'll make the most of it with anti-theft software running. December 28, 2012

nCircle predicts exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year -- and beyond -- he predicts, will be a time of highly adaptive security threats, with four main strands - cyber-criminals, cyber-terrorists, political hacktivists and rogue employees -- conspiring to create severe headaches for IT security professionals in all classes of public and private sector industries. December 22, 2012

Who would block the Spam Cop ???

I recently was surprised by what I thought was professional web company who are quite popular and offer quite a bit of information. They offer industry marketing reports, and when signing my email address to download the report they said "Spamcop Addresses are blocked" Hmmmmm, what do you think about that ??? December 21, 2012

Novus Scan, a Plagiarism Scanner For Mac OS X

Novus Scan, an offline plagiarism checker, enables users to build a database of documents and then scan the database, searching for copied text. Users can import documents into its database using drag-and-drop or a file open dialog, import text that they'd like to scan, and Novus Scan compares the text to its document database using a two-step, word-by-word scanning algorithm. September 18, 2012

Managing your digital assets

As a digital photographer or videographer, you product massive amounts of data in the creative process. Protecting and preserving those assets is paramount. IT professional Ben Greisler has some insight and advice on successful digital lifecycle management. March 21, 2012

Tangling with CraigsList scam artists

'twas the night before Christmas and all through the house, someone is getting seriously ripped off by an online scammer on Craig's List. Some experts have estimated that millions of dollars will be lost this holiday season because victims didn't immediately recognize they were being scammed. Read along as I have a little fun with this one -- and illustrate how to avoid getting trapped yourself! December 16, 2011

Passware Proves Mac OS Lion Insecure

Revealing Login Passwords in Minutes -- Password extraction is possible even if the computer is locked or put to sleep - after a user logs in, password remains in memory October 21, 2011