Leadership – Importance of Effective Communications

Uncategorized Comments Off on Leadership – Importance of Effective Communications

This excellent leadership article from John Maxwell shares some of his favorite quotes regarding the importance of communications http://www.johnmaxwell.com/blog/good-words-on-communication One subject where I have literally dozens of wonderful quotes is communication. It’s one of my passions, so I pay close attention to what great communicators have to say on the subject. Here are just a […]

Secretary of State EMAIL security weaknesses cited

Uncategorized Comments Off on Secretary of State EMAIL security weaknesses cited

As documented below, a few security concerns have surfaced regarding the special private email server solution.  These findings document the need for robust encryption and email server best practices that are beneficial in protecting sensitive information.  However some basic protection was in place, and so far no security breaches have been reported with this special arrangement. http://www.eweek.com/security/hillary-clintons-private-email-use-and-the-state-of-ssltls-security.html […]

Ransomware – VIRLOCK polymorphic worm has file infection capabilities

Uncategorized Comments Off on Ransomware – VIRLOCK polymorphic worm has file infection capabilities

Trend Labs documents a new Ransomware attack that is designed to spread as both a file infector and worm for an infected computer.  As documented, it can spread rapidly in a network setting.  It is noted that code stubs are present for incomplete coded routines and it is believed that future variants will be even more […]

Apple iPhone Security – IP BOX Password cracking device

Uncategorized Comments Off on Apple iPhone Security – IP BOX Password cracking device

For a few hundred dollars, a specially built device can brute force crack iPhone PIN numbers which are 4 or less characters. It even works around the “Erase all data after 10 failed attempts control”. A best practice is to use PIN codes that are longer and more complex codes to lock the device. http://blog.mdsec.co.uk/2015/03/bruteforcing-ios-screenlock.html […]

Website Security – Abandoned Subdomains create Risk

Uncategorized Comments Off on Website Security – Abandoned Subdomains create Risk

Occasionally unique subdomains are built for special business and technology needs. When alternative techniques or a discontinuation of services occur, these sites may still remain open and active at the hosted ISP site.  As a best practice, companies should also ensure they are discontinuing the subdomain at the same time special support needs change  http://www.computerworld.com/article/2838218/abandoned-subdomains-pose-a-security-risk-for-businesses.html Many […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in