|
The easiest way to take advantage of the new security sandbox technology is to upgrade your hardware and software. Not everyone can afford to do that. What other options are there if you want a security sandbox? Sandboxing is closely related to virtualization. Virtual computing is a good way to get some of the benefits […]
There’s a lot of routine activity on Facebook that I bet people would think twice about if they considered it from a security perspective:
How many times have you seen posts like, “I’m out at Starbucks getting my morning coffee and reading the paper…” Great! All a burglar (or the NSA) needs to know is […]
Ever been interested in a certain product, and done some Google research about it? Then, for days afterwards, whenever you go to a website, you see ads for that very same thing? What a coincidence! Well, actually, it is not a coincidence. It is called Targeted Advertising. Whenever you browse to a certain site, the […]
Indulge me in a little test. Create a text file on your PC. Copy and paste this into it:
<html>
<body>
<br>My secret plans to become the next billionaire.
<br>My secret recipe for killer scones to sell to Starbucks.
<br>My password to all my websites.
[…]
A while ago, there was something called the Trusted Computing initiative. Here is its marketing message. Sounds great, right? I think the truth is probably closer to these Trusted Computing FAQs. Just to make matters more confusing, there is also a Trustworthy Computing initiative. According to Wikipedia, “More recently, Microsoft has adopted the term Trustworthy […]
Data Marketers have lots of data about you. Acxiom’s latest ploy is for them to show you what data they already have on you. I checked at https://aboutthedata.com/portal. It really wasn’t that interesting, and much of it was wrong. The Acxiom website allows you to correct the information that is wrong. You can do that, […]
There is no such thing as free. “Free” software, music, video, and toolbar downloads are some of the the most common culprits for malware infection.
If you want to run software on your computer, you have to trust the software vendor not to do anything stupid, malicious, or sneaky on your computer. Most software […]
Suppose you run Quicken. You enter your checkbook balance, and some checks that haven’t cleared the bank. Then, you enter the password for your online account at the bank, and download your checking account history and/or your credit card history.
Now that you have synchronized your computer with your bank, Intuit (the makers of Quicken) […]
If you download software from the Internet, it is possible that the downloads have been tampered with by someone malicious. Very unlikely, but it is possible. Every once in a while, I hear a news report about some site being hacked, and the software on the site is now suspected of being tampered with.
Well, […]
You probably need an Internet Security Suite. Both Windows and Mac users need it. I don’t know of a good Internet Security Suites for Linux. But, if you’re running Linux, you are probably already fairly computer savvy. An Internet Security Suite usually has a number of components to protect you against different dangers from hackers:
[…]
|
|
Recent Comments