278 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
Hello world!
Tue, Sep 22nd 2015 7
Backyard SSO Hero
Mon, Oct 20th 2014 6
How to Make an Authentication Cocktail
Fri, Oct 17th 2014 3
Breach Fatigue: Don’t Be a Victim
Tue, Oct 7th 2014 9
UPS Hacked!
Wed, Sep 17th 2014 4
The IT Professional vs. The Deadly Data Breach
Mon, Sep 15th 2014 5
You Have a Case of Identity Theft!
Mon, Aug 25th 2014 4
Top 10
Breach Fatigue: Don’t Be a Victim
Tue, Oct 7th 2014 9
Price vs Cost: One Man’s Opinion
Mon, Mar 3rd 2014 7
Honesty is the Best Policy: Passwords, IT Security Professionals, and Llamas!
Tue, Jun 3rd 2014 7
Hello world!
Tue, Sep 22nd 2015 7
Ransomed Beauty: Is Your Identity Being Held for Ransom?
Thu, Mar 27th 2014 6
Young Hacker Infiltrates High School Database
Wed, Jul 2nd 2014 6
Backyard SSO Hero
Mon, Oct 20th 2014 6
Government Surveillance, Time to Reform?
Mon, Feb 17th 2014 5
Are You Only a Hacktivists Away from Chaos?
Wed, Apr 2nd 2014 5
Alarmingly Low Rate of Employees Receive Security Awareness Training
Wed, Apr 23rd 2014 5




Recent Blog Posts
7
Hello world!
Tue, Sep 22nd 2015 8:25p   admin
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
3
Internet Explorer Exploit
Wed, Oct 23rd 2013 5:18p   admin
“Attack code that exploits an unpatched vulnerability found in all supported versions of Internet Explorer has been released into the wild. This means that cyberattacks could now surge and affect Internet Explorer users.”1 Freelance Journalist, Dara Kerr, has reported through CNET that Rapid7’s latest Metasploit penetration testing tool makes the details of the IE exploit called “CVE-2013-3893” available to the world, especially cybercriminals. It is thought that this exploit has been
2
Malware + ATM = Free Cash
Tue, Oct 22nd 2013 2:51p   admin
Recently, there have been malware attacks on ATM’s in Mexico. These attacks are not the typical card reader scams, rather they are a piece of malware that can dispense cash on demand. “Plotus” is the name of malware program which currently has to be manually installed on the machine via a CD-ROM drive. That means these money hungry hackers have to physically break into the machines to install the software. Safensoft, a Russian security firm, made the discovery late last month. Stanislav Sh
0
We’ve been VerAfied! Part Two
Wed, Oct 16th 2013 3:10p   admin
If you have not read part one of this post, read it here. Veracode’s Risk Adjusted Verification Methodology The ‘VerAfied’ standards-based mark of security quality is one established by Veracode to provide a pragmatic approach to measure and compare risk levels related to application security, and is wholly designed with industry standards in mind.  Its basis is the “Security Quality Score”, which is an aggregate of all the security flaws uncovered by the above scans, categorized by
2
We’ve been VerAfied! Part One
Tue, Oct 15th 2013 4:14p   admin
If you have visited our PortalGuard.com homepage recently, you might have noticed that the PortalGuard product has been officially awarded the ‘VerAfied’ status by Veracode, a leading company in Application Risk Management and analysis.  What this means, is that throughout the scrutiny of Veracode’s series of formal application assessments, the PortalGuard software had either met or exceeded the criteria outlined in their Risk Adjusted Verification Methodology for mission critical applica
3
Facebook Removes Privacy Feature
Mon, Oct 14th 2013 12:35p   admin
Facebook is undoubtedly one of the largest social networks in the world and is seen as an industry leader.  Last week they announced that they will be removing a feature that, although used by a small percentage of users, allows you to block being searched directly via their search bar. It is important to note that the option to use this feature has been inactive for users that were not using it since last year. Many of their privacy features are still intact and do not look like they will be
2
Private Sector to Help with Homeland Security
Fri, Oct 11th 2013 11:27a   admin
“The ability for the private sector to invest, co-develop and integrate innovative technologies into the cybersecurity marketplace will significantly impact progress in threat deterrence and mitigation.” The above quote is from an article written by Charles Brooks of SecurityInfoWatch.com that reports an interesting program has been put in place at the Department of Homeland Security (DHS) Science & Technology (S&T) Directorate.  The program is called the Transition to Practice Pr
1
Everyday Cyber Crime
Wed, Oct 9th 2013 12:27p   admin
On our blog we have often discus malware and passwords, but how much information do you actually put into action in your life and workplace? If you have not yet watched the TED Talk by James Lyne: “Everyday cybercrime — and what you can do about it,” you should. Lyne breaks down the threat of your computer being attack to a level that all of us can relate to. He reminds us that even if we are taking all of the necessary precautions, our family members and co-workers could be exposing
2
Firefox App On Android Has Vulnerability
Thu, Oct 3rd 2013 11:00a   admin
“He responsibly disclosed the details to Mozilla that allows hackers to access both the contents of the SD card and the browser’s private data”.1 Mohit Kumar, from The Hacker News, discusses a topic that is worth your time if you have an Android mobile phone and use the Firefox app on it. “Mobile Browsers are complicated applications and locking them down against threats is extremely difficult. According to a Mobile Security Researcher, Sebastián Guerrero from ‘viaForensics
0
National Cyber Security Awareness Month
Wed, Oct 2nd 2013 4:05p   admin
“October is National Cyber Security Awareness month. This laudable public awareness initiative was launched 10 years ago by the U.S. Department of Homeland Security and the National Cyber Security Alliance.”[1] The topic for the first week of the month is general online security. Recently, our blog has discussed the problems we often come across when it comes to our family in the digital age. It is important to not only discuss the importance of passwords with children, spouse, or co-worker




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition