1. No Warranty

    U.S. eyes high-tech security boost at Canadian border

    The U.S. Senate homeland security committee is holding a field hearing in Montana today to examine the challenges of the northern border. Democrat Sen. Jon Tester says installing sensor technology could be a low cost measure to monitor who and what is crossing the international line. More...
  2. No Warranty

    [Guide:] How to avoid many common internet security mistakes

    Here is a list of common Internet security mistakes that people make. I hope that by posting this it will help others to avoid them. Source: Digit ? Thinkdigit Technology Guides | Technology News Reviews |Free Downloads | Video | Tech Support Forums Online in India
  3. the doctor

    NKorea nuclear envoy to visit US on heels of deal (AP)

    AP - In another sign of warming relations between two wartime foes, a senior North Korean nuclear negotiator will attend a security conference in the United States, a person with knowledge of the negotiations between Washington and Pyongyang told The Associated Press on Thursday. More...
  4. No Warranty

    Old Age Security change would hurt seniors, Bob Rae says

    Interim Liberal Leader Bob Rae says any change to Old Age Security would affect the Guaranteed Income Supplement and provincial social programs for seniors. More...
  5. No Warranty

    ID thieves masquerading as Facebook security team

    The latest bit of skullduggery involves using ascii characters to impersonate Facebook’s security team and steal credit card data from users of the social network. What are your thoughts? Click here to view the original post.
  6. the doctor

    Santorum: Trim Social Security now even if painful (AP)

    AP - Republican presidential candidate Rick Santorum called Friday for immediate cuts to Social Security benefits, risking the wrath of older voters and countless others who balk at changes to the entitlement program. More...
  7. the doctor

    Police release security video in LA car fires case (AP)

    AP - Los Angeles detectives want to talk to a man caught on grainy surveillance video at a parking garage that was the scene of one of dozens of suspicious car fires in the city. More...
  8. the doctor

    Pressure mounts as Syria misses observer deadline (AP)

    AP - The Syrian military vowed Friday to "cut every evil hand that targets Syrian blood," saying recent attacks on elite security forces marked a dangerous escalation in the country's 8-month-old crisis. More...
  9. the doctor

    Triple bombings in south Iraq kill 19, injure 64 (AP)

    AP - A string of bombings in a southern oil city killed 19 people Thursday evening and injured dozens more, a grim sign of the security challenges Iraq will face after American troops go home. More...
  10. FTA Hacker

    TSA officer charged with sexual assault

    Washington (CNN) -- A federal airport screener has been charged with sexual assault after he allegedly assaulted a woman near his home in Manassas, Virginia, police said Tuesday. Police said Harold Glenn Rodman, 52, was wearing a uniform and displayed a badge at the time of the attack. Rodman is...
  11. the doctor

    John Ramsey: Old Security Passwords

    So they ask me, 'Would you like to answer your secret security password question?' I think, 'Oh yeah, surely I can answer a question posed by slightly younger me.'
  12. No Warranty

    Social Security agency leaks thousands of SSNs every year, report says

    The Social Security Administration (SSA) puts thousands of Americans at risk of identity theft each year by accidentally leaking their Social Security Numbers, names and dates of birth, according to an investigative report by the Scripps Howard New Service. What are your thoughts? Click here to...
  13. FTA Hacker

    Motorola's 3LM launches mobile security platform

    3LM, the company founded by former Android developers and since acquired by Motorola, is making its enterprise security platform for Android phones available this week. More...
  14. FTA Hacker

    4 valuable additions to your cloud security toolkit

    If you ask IT execs why they're hesitant about moving to the public cloud, security comes up at the top of the list. But security vendors are responding to these concerns with a raft of new products. Here are four interesting cloud security tools that we tested. More...
  15. FTA Hacker

    Experts explain greatest threats to cloud security

    Cloud security threats come in all shapes and sizes, so we asked eight experts to weigh in on what they see as the top threat to cloud security. The answers run the gamut, but in all cases, our cloud security panelists believe that these threats can be addressed. More...
  16. FTA Hacker

    5 cloud security companies to watch

    Security is one of the major impediments to enterprises moving their resources into the cloud. So, it's not surprising that numerous cloud security companies are springing up, attempting to address specific cloud security issues, like protecting virtual machines or encrypting data in motion...
  17. FTA Hacker

    Public cloud security remains MISSION IMPOSSIBLE

    Someday, cloud security vendors and cloud services providers will convince enterprise IT that it's safe to move sensitive data and mission critical apps from the private cloud to the public cloud. More...
  18. FTA Hacker

    Security upgrades needed with growing cyberwar threats

    Countries need to take steps to upgrade critical infrastructure for protection from attacks by cybercombatants or rival countries conducting cyberwarfare, security experts said at a panel discussion this week. More...
  19. FTA Hacker

    US lawmakers question cloud security

    A rush by President Barack Obama's administration to move U.S. government agencies to cloud computing services may lead to unintended security problems and other headaches, some lawmakers said Thursday. More...
  20. FTA Hacker

    Laggard to leader: What it takes to get there

    How do organizations move from lagging in their IT security program to leading? They must put an effective strategy in place, consistently meet that strategy, and have good visibility into the security events in their infrastructure. Looks good on paper, but how do you get there? CISOs say it...