- Welcome Guest
- Sign In
What makes e-mail trustworthy? There are at least two factors at play here: e-mail authentication, as described in a recent article, ensures that outbound e-mail really comes from the purported sending domain. That doesn't tell you whether the sender is a highly-reputable institution or a spammer, ...
Is identity theft on the rise, or is it a problem that has been vastly overhyped? Recent incidents of lost or stolen laptops have focused public attention on the huge amount of personal information that can very easily make its way outside the control of corporate IT. However, in spite of so many in...
Brian DeWolfe, senior property manager at Lincoln Property, has a big challenge. The high-end properties he manages in the fast-growing south Florida region require security; indeed, it's one of the biggest line items in the budget, as well as a big draw for potential tenants. Physical security cost...
Identity theft and strong opinions go hand in hand. ID theft is rampant and is causing millions of dollars of damage every year -- or, it really isn't such a big problem, and few people are really hurt financially by it. Why such wide disparity? More importantly, what can a business owner, an IT ma...
Bob Graham doesn't wait for a threat to become a pandemic. Several years ago, when one of his employees decided to start using a Treo handheld for phone and e-mail, he purchased and installed Symantec anti-virus software on the device -- even though there had never been a documented case of a virus ...
Darknets, Greynets. Dark traffic. The words are frightening. The reality behind them is even more frightening. Increasingly clever hackers, thieves and scoundrels are using the Internet, peer-to-peer products, instant messaging and e-mail to wreak havoc, in ways and for purposes never before seen. ...
The past several weeks have seen an onslaught of articles regarding privacy, identity and security. Most of them bemoan the fact that we all have too many passwords, they are difficult and costly to manage, and that "there must be a better way!" Suggestions have ranged from password-reset and passw...
President Bush let it be known on April 14 of this year that he does not send e-mail -- not even to his twin daughters -- because he fears his "personal stuff" may be made public. His remarks were made during a discussion of whether his administration is being responsive to requests made under the F...
President Bush let it be known on April 14 of this year that he does not send e-mail -- not even to his twin daughters -- because he fears his "personal stuff" may be made public. His remarks were made during a discussion of whether his administration is being responsive to requests made under the F...
Consumers around the world are becoming increasingly concerned about the trustworthiness of e-commerce. They may have good reason: Cases of identity theft appear in the daily headlines, and we are only now starting to understand exactly how difficult it can be to restore one's name and credit rating...
Mobile security. It's an idea whose time has finally come, judging by the amount of interest at the recent RSA security conference in San Francisco. The show floor was abuzz with talk about securing both mobile devices and the increasingly mobile enterprise. But if you asked ten people to define mob...
Imagine you're the CEO of a major bank. Now, imagine paying more and more for security guards, only to find that the risk is increasing, not decreasing, due to threats that can't be countered by security guards. That's the situation facing today's CIOs and software managers, who continue to increase...
During his daily commute into Manhattan from Long Island, George Miller's notebook computer can connect to dozens of networks without his even realizing it. Indeed, as Miller's train weaves and winds its way into the city, his notebook computer discovers dozens of unsecured wireless networks emittin...
You spent the time and money to balance productivity and security. You installed antivirus software at the firewall, at the e-mail gateway, and on all your endpoint devices -- workstations, PCs and laptops. And your new headquarters' wireless LAN is protected with encryption keys, providing a secure...
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/02/linux-penguins-300x162.jpg
https://www.linuxinsider.com/story/feuding-developers-dueling-distros-make-linux-lineage-revival-legendary-176620.html
Feuding Developers, Dueling Distros Make Linux Lineage Revival Legendary
Linux Spreads, Nvidia Now Part Open-Source, Backup Tool Gets More Time
New Linux Laptop Line Advances HP, System76 Open-Source Collaboration
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/06/virtual-event-300x156.jpg
https://www.linuxinsider.com/story/open-source-technologies-issues-on-display-at-linux-foundation-summit-176584.html
Open-Source Technologies, Issues on Display at Linux Foundation Summit
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/06/digital-identity-300x156.jpg
https://www.linuxinsider.com/story/cognitive-skills-for-engineering-success-176867.html
Cognitive Skills for Engineering Success
Lax Cyber Skills, Dev Blind Spots Behind Organizations’ AppSec Breakdowns
Open-Source Code a Marginal Problem, Managing It the Key Challenge: Report
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/02/canonical-ubuntu-300x156.jpg
https://www.linuxinsider.com/story/ubuntu-core-22-release-addresses-challenges-of-iot-edge-computing-176583.html
Ubuntu Core 22 Release Addresses Challenges of IoT, Edge Computing
Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022
Distro Delights, New Release Mania, Forking KDE, Windows in a Bottle
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/04/mobile-app-development-300x156.jpg
https://www.linuxinsider.com/story/appdome-ceo-on-mobile-app-security-no-developer-no-code-no-problem-176637.html
Appdome CEO on Mobile App Security: No Developer, No Code, No Problem
Nasuni Founder Andres Rodriguez: Object Storage Offers More Cloud Benefits, Lower Cost
Remote Work Transformation Calls for Prioritizing Employee Tech Choices
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/06/exec-smartphone-300x156.jpg
https://www.linuxinsider.com/story/digital-devices-of-corporate-brass-ripe-for-hacker-attacks-176860.html
Digital Devices of Corporate Brass Ripe for Hacker Attacks
InnoView’s 15.6″ 4K Portable Panel Could Be the Ultimate Touchscreen Accessory
InnoView 15.8″ Portable Display: More Screen Space for Small Devices
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/02/linux-review-tux-300x156.jpg
https://www.linuxinsider.com/story/new-makululinux-brings-shifting-innovations-to-desktop-design-176634.html
New MakuluLinux Brings ‘Shifting’ Innovations to Desktop Design
KYY 15.6″ Portable Monitor Packs Value With a Healthy Feature Set
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/06/password-hacker-300x156.jpg
https://www.linuxinsider.com/story/security-pros-lured-to-bug-bounties-by-big-pay-days-176875.html
Security Pros Lured to Bug Bounties by Big Pay Days
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/05/code-tux-300x156.jpg
https://www.linuxinsider.com/story/start-here-when-things-go-wrong-on-your-linux-system-176520.html
Start Here When Things Go Wrong on Your Linux System
Canonical Lets Loose Ubuntu 22.04 LTS ‘Jammy Jellyfish’
Platform Plans To Plunder Poor Tools, Free Forensic Forays To Forestall Breaches
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/07/college-students-300x156.jpg
https://www.linuxinsider.com/story/sensible-tech-advice-for-back-to-school-176947.html
Sensible Tech Advice for Back to School
Reality Check on the Virtual Universe: Metaverse or Metamess?
Intel’s Mega-Site Fab Is Critical to the US Tackling International Conflicts