As if it matters to the bad guys, but tampering with Internet resources like commercial or government websites is, indeed, a crime. That means that if you or your company are victimized by such activity, the perpetrator(s) can be sought by authorities throughout the world, arrested, and brought to justice. There are seven types of …
Security firm to Facebook: Clean up your act – CSO Online – Security and Risk: I’ve said this before, but its about time! @transxfer ‘via Blog this’
Have LinkedIn Missed A Trick With The Relaunch Of CardMunch?: ‘via Blog this’
GAO makes 105 recommendations to patch IRS information security holes – FierceGovernmentIT. We can’t expect perfection when it comes to privacy, even with our Federal information systems.
Google to Allow Users to Opt Out of WiFi Location Mapping System | threatpost: Lest you thought only your neighbors were watching your WiFi access point – protected or unprotected. ‘via Blog this’
The Secret to Doing Cloud Scalability Right | Cloud Computing Journal: ‘via Blog this’
Open-source toolkit tracks down Duqu malware | Security – InfoWorld: Thanks. ‘via Blog this’