Microsoft Office 365 – New cloud based version launched

Uncategorized Comments Off on Microsoft Office 365 – New cloud based version launched

Office 365 is a cloud based implementation of Microsoft’s functional and collaborative Office Suite. It is designed to also interact with mobile devices as well as providing “thin client” capabilities for business PCs.   Below are some key resources:  Office 365 – Home Page http://www.office365.com/ http://www.microsoft.com/en-us/office365/online-software.aspx Office 365 – Press release http://www.microsoft.com/Presspass/press/2011/jun11/06-28MSOffice365PR.mspx Office 365 – Overview […]

Symantec – Mobile Security Research Report

Uncategorized Comments Off on Symantec – Mobile Security Research Report

This 22 page in-depth report evaluates two popular mobile security solutions: http://blogs.pcmag.com/securitywatch/2011/06/symantec_paper_explores_mobile.php A Window Into Mobile Device Security (Examining the security approaches employed in Apple’s iOS and Google’s Android) http://www.symantec.com/content/en/us/about/media/pdfs/symc_mobile_device_security_june2011.pdf QUOTE: The mass-adoption of both consumer and managed mobile devices in the enterprise has increased employee productivity but has also exposed the enterprise to new […]

Android – Malware turns phone into a proxy relay device

Uncategorized Comments Off on Android – Malware turns phone into a proxy relay device

Trend Labs documents a new Android based malware attack where the phone can pass text messages in a stealth like manner from unauthorized users as if it were a “man in the middle”.  Infected users could incur higher future bills for these hidden text messages passing through their phone systems.  Android – Malware turns phone into […]

Facebook – Dangers of posting Vacation plans in advance

Uncategorized Comments Off on Facebook – Dangers of posting Vacation plans in advance

It is preferrable to share vacation information and photos once you return from vacation, rather than sharing plans in advance.  If you want to share with your closest friends, use email or the phone instead.  While one might feel comfortable in sharing with friends, accounts may not be locked down to prevent access by the […]

AllFaceBook.com – Best Practices and Security Information about Facebook

Uncategorized Comments Off on AllFaceBook.com – Best Practices and Security Information about Facebook

In researching Facebook security issues, I discovered this new resource which shares new developments, best practices and security information AllFaceBook.com – Best Practices and Security Information about Facebook http://www.allfacebook.com/ QUOTE: AllFacebook.com launched in 2007. AllFacebook.com aims to cover all issues pertaining to Facebook including new applications, general news, and analysis about the future of social […]

Facebook – Applications creating SPAM shutdown

Uncategorized Comments Off on Facebook – Applications creating SPAM shutdown

Facebook has implemented a new enforcement system to shutdown spam posting broadcasts from applications. A number of Facebook applications have been disabled which manipulate member accounts and broadcast to all contacts. Facebook Shuts A Large Number Of Applications For Spamming http://blogs.pcmag.com/securitywatch/2011/06/facebook_shuts_a_large_number.php QUOTE:  Many Facebook application developers had their applications terminated by Facebook this week without […]

Zone Alarm evaluates security for 8 Social Networking sites

Uncategorized Comments Off on Zone Alarm evaluates security for 8 Social Networking sites

Facebook and MySpace were rated as having good security.  However highly locked down settings are required to achieve this.  Users must alter settings beyond original defaults and exercise best practices while connected.   Zone Alarm evaluates security for 8 Social Networking sites http://blog.zonealarm.com/2011/06/defending-your-privacy-which-social-networking-sites-are-secure.html QUOTE: Deciding which social networking sites to avoid or use can be a challenge. Discovering […]

Web Development – The need to re-engineer insecure content on secure websites

Uncategorized Comments Off on Web Development – The need to re-engineer insecure content on secure websites

Webmasters should ensure that secure web pages (https) avoid offering mixed content, as standard pages (http) could comprise security.  Browsers are strengthening controls in the newer releases with beneficial warning messages.  IE9 blocks these types of pages by default and the user must then decide whether to override this. Web Development – The need to […]

Best Practices – Corporate Termination Policies

Uncategorized Comments Off on Best Practices – Corporate Termination Policies

Effective policies and standard conventions are always beneficial for an organization.  They are especially required for difficult tasks like employee terminations where emotions may supercede good judgment.  Companies should protect themselves defensively in these situations. In doing so, they also protect the employee from potential liability.  Best Practices – Corporate Termination Policies http://isc.sans.org/diary/How+Good+is+your+Employee+Termination+Policy+/11086 QUOTE: It […]

Apple Security Update – June 2011

Uncategorized Comments Off on Apple Security Update – June 2011

Please update any of the products noted below to ensure proper protection: http://isc.sans.org/diary/Apple+Security+Updates+2011-004/11092 http://support.apple.com/kb/HT1222 QUOTE: Apple has released Mac OS X v10.6.8 and Security Update 2011-004 addressing a total of 39 vulnerabilities in OS X 10.5.x and 10.6.x. Note that if OS X 10.7 Lion is released soon Products Affected Mac OS X Server 10.6, […]


© 2019 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in