IT Security

STUDENTS HACK INTO SCHOOL SYSTEM, CHANGE GRADES

GOLDEN – All is not golden at Colorado’s oldest school. Administrators are investigating reports that hackers got into Golden High School’s computer system and changed grades.

Students say it’s causing lots of confusion and frustration at the end of the first semester.

â

SECURING AUTORUN AND AUTOPLAY IN WINDOWS

Way back when, Microsoft opted for convenience over security and Windows users have been sitting ducks ever since. I’m speaking of autorun/autoplay, a feature in Windows that lets programs run automatically when a CD or USB flash drive is inserted into a PC. For years now bad guys have been exploiting this to automatically infect PCs with malicious software.

BEWARE OF SCAM EMAILS (IT SECURITY)

Friend Stranded in Foreign Country Scam Emails

Summary:
Email supposedly from a person known to you claims that he or she is stranded without money or papers in a foreign land because of a robbery and asks that you send funds urgently via a wire transfer to help the person return home.

CHANGE YOUR ROUTER’S DEFAULT PASSWORD, USERNAME AND IP ADDRESS (IT SECURITY)

Always  try  to change  the default  PASSWORD, USERNAME and IP Address of your ADSL Modem. You should know the default PASSWORD, USERNAME and IP Address  of your ADSL Modem, here is a list of some well  known ADSL Modem’s PASSWORD, USERNAME and IP Address.

SCAMMERS SCRAPE RAM FOR BANK FOR BANK CARD DATA (IT SECURITY)

Forget keyloggers and packet sniffers. In the wake of industry rules requiring credit card data to be encrypted, malware that siphons clear-text information from computer memory is all the rage among scammers, security researchers say.

So-called RAM scrapers scour the random access memory of POS, or point-of-sale, terminals, where

AV-TEST.ORG’S MALWARE COUNT EXCEEDS 22 MILLION (IT SECURITY)

The folks at the independent anti-virus testing body AV-Test.org have been in touch with some interesting statistics.

They are finding more than one million unique malware samples a month, and presently the total amount of unique samples in their mal

TIPS FOR WIRELESS HOME NETWORK SECURITY

Many folks setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible. That’s totally understandable. It’s also quite risky as numerous security problems can result. Today’s Wi-Fi networking products don’t always help the situation as configuring their se

HOW EASY IS IT TO BREAK INTO MY COMPUTER?

Unfortunately, intruders are always discovering new vulnerabilities (informally called “holes”) to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems.

When holes are discovered, computer vendors will usually develop patches to address the problem(s). However, it is up to you, the user, to ob

THINGS YOU OUGHT TO KNOW (IT SECURITY) – II

The Internet was built on trust. Back in the mid 1960s, computers were very expensive and slow by today’s standards, but still quite useful. To share the expensive and scarce computers installed around the country, the U.S. government funded a research project to connect these computers together so that other research

THINGS YOU OUGHT TO KNOW (COMPUTER SECURITY) – I

One starting point for solving home computer security problems is being aware of how the Internet and some of its technologies work. If you know how they work, you can evaluate solutions to the problems that come up. You can also use the Internet more safely and responsibly. In this section, we’ll talk about two topics: trust and information in the clear as it crosses the Internet. This week’s

April 2024
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  
Paste your AdWords Remarketing code here