| |

Mobile Apps: How to Use Them Safely

The use of mobile applications (apps) is increasing in parallel with the increased use in mobile devices. According to Gartner, “Worldwide mobile application store revenue is projected to surpass $15.1 billion in 2011… and by 2014 over 185 billion applications will have been downloaded from mobile app stores.” The continued growth of mobile apps requires…

| | |

Staying Safe On Social Networking Sites

From the Desk of Chad M. Barr, CISSP, CISA The popularity of social networking sites — such as MySpace, Facebook, Twitter and others — has expanded tremendously in recent years, with nearly two-thirds of Americans using these sites regularly. The number of adult Internet users having a social networking profile has more than quadrupled in…

| | | |

Cyber Security Emerging Trends and Threats for 2012

During 2011, cyber security incidents included theft of intellectual property and government data, hacktivism, malware targeting mobile devices and a resurgence of the Zeus Trojan, which targets financial information. Protecting against these attacks was a key challenge for organizations of all sizes in both the public and private sectors. What is in store for 2012?…

|

Tips for Secure Shopping Online During the Holiday Season

As the holiday season draws near, an increasing number of people will be doing their shopping in cyber space. Last year, online shopping expenditures in the U.S. reached a record $32.6 billion for the November-December period marking a 12% jump from 2009. In fact, an estimated $1 billion was spent online in a single day–Cyber…

|

Disaster Preparedness for Personal Information Assets

From the Desk of Chad M. Barr, CISSP, CISA September is “Disaster Preparedness Month.” It’s important to consider how we safeguard our information in the event of a natural disaster, man-made event, or even a system failure. This newsletter will discuss some steps you can take to secure your critical information and some best practices…

| | |

Anonymisation service uses botnet as proxies

Anonymization service AWM Proxy rents computers infected with the TDL4 bot for use as proxies, according to a report by a security expert. Starting at $3 per day, users can have their data traffic directed through the bot network to surf the Internet anonymously with other people’s IPs. The researcher said the provider has been…

|

Microsoft and Adobe preview September Patch Tuesday

Patch Tuesday. When it releases its monthly patches September 13, Microsoft will publish five bulletins categorized as “important” to close 15 holes. Most of the bulletins fix vulnerabilities in Microsoft Office, which attackers can use to inject malicious code and escalate rights. Arbitrary code can also be executed in the Mac edition of Office, and…

| |

Phishing Alerts — Fake Traffic Tickets & False Credit Union Messages

From the Desk of Chad M. Barr, CISSP, CISA, PCI QSA There have been a number of recent “phishing” campaigns, which are attempts by individuals or groups to solicit personal information from unsuspecting users by employing social engineering techniques. This month’s newsletter will focus on some of recent campaigns and provide guidance for protecting yourself…