Advanced Persistent Threats
Cybercrime has taken a dangerous turn heralding the emergence of a new generation of attacks focused on corporate and government espionage. These attacks are targeted and persistent leading to leakage of vital state secrets and critical corporate data. These threats have been labeled as Advanced Persistent Threats (APT). A number of recent high profile attacks Continue Reading →
Best Buy
Beleaguered electronics retailer Best Buy is taking a tentative step to turn its fortunes around by cribbing from Apple’s playbook. The Wall Street Journal reports that the chain is testing a prototype store near its Minnesota-based headquarters that mimics signature Apple features such as its Genius Bar. Best Buy’s “Solution Central” will be manned by Continue Reading →
Hacker
Big security vendors have been pushing the same technology for over 25 years. Yet every day these technologies are proven to be ineffective and easily breached. If you’re in charge of security at your company and you’re using anti-virus and tokens and you think you’re safe, this is your wake-up call. Week after week of Continue Reading →
Spy Planes
Apple and Google are using military-grade spy planes to map your backyard. That’s the sensationalist headline. I like it. It’s really scary and it’s perfect for Fud-mongering. (FUD is an abbreviation for fear, uncertainty and doubt.) Similar headlines have everyone from privacy advocates to private citizens up in arms. After all, the 17th century proverb, Continue Reading →
Resume
Originally posted at Meng Online. This is the final post of a MENG Blend trilogy presenting easy changes that you can quickly make to improve your resume.  Most were presented in the MENGinar “How to Improve Your Resume in 60 Minutes,” available free to MENG members.  The first two posts in the trilogy were:  “Seven Continue Reading →
Super Cyber War
hile we are busy worrying about Kim Kardashian, sound bite politics and banning 64 oz cups of sugary soft drinks, the first super-cyber weapon has been quietly spying on and attacking things it doesn’t like.  Huge stealthy computer viruses with capabilities that sound like the stuff of science fiction have been hard a work, collecting Continue Reading →
Microsoft
Microsoft did request for Google to remove over half a million links from its search index in April this year alone, according to the most recent figures released by the search engine giant. Google’s data showed that most of these links will send folks who click on them over to websites that sell pirated Microsoft Continue Reading →