Among all the problems that occur due to excessive involvement with social media, cyber-bullying is undoubtedly the most common one. Using mobile devices, "tweens" and teens stay connected to their peers all day long and often this communication can become hurtful. Mobile devices and Cyber-bullying How can a child be humiliated using technology? What are the forms of … [Read more...]
Dell begins releasing BIOS updates to address Intel AMT Security Advisory
Dell has started releasing BIOS updates to computers affected by the disclosed vulnerability in the Intel AMT framework. Intel's Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology all have the vulnerability and Dell is working to mitigate the problem with BIOS firmware updates. Dell issued a client statement on the topic (PDF). … [Read more...]
There is no welfare when you are below the information security poverty line
The term 'security poverty line' was coined back in 2011 by Wendy Nather. It describes organizations who are under-spending on IT security in terms of maintaining an effective level of security or even reaching compliance with regulations. For many organizations, more money spent on IT staff, consulting, or hardware means fewer resources actually going towards their purpose … [Read more...]
AllRecipes.com announces potential breach
AllRecipes.com is a website for sharing recipes and learning about food. Yesterday, the company emailed out that accounts created before June 2013 may have been intercepted during registration. This would lead to email addresses and passwords being exposed to third parties. It is recommended to change your password if you have not done so since 2013. The breach was … [Read more...]
Configure a View in Outlook to help prevent falling for phishing
Phishing messages to your work email can be costly if the wrong person replies with confidential information. If you use Outlook for your email client, it can help identify those messages from outside senders to make sure they stand out. Having some context before opening a message will help prevent falling for the phishing scheme when you know it is coming from an outside … [Read more...]