Tag Archives: Security+

Almost a million fake apps are targeting your phone

Trend Micro finds hundreds of thousands of fake Android apps in trawl of online stores, forums Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to … Continue reading

Posted in Tech | Tagged , , , , , | Leave a comment

Security Manager’s Journal: Taking steps to better lock down the network

Our manager decides that, like users, resources on the network should adhere to the rule of least privilege. The resources on our network have been given too much access to the Internet, and we need to curb that. At issue: … Continue reading

Posted in Tech | Tagged , , , , , | Leave a comment

Enterprise wanted there own IT cloud fears, HP says

Hewlett-Packard wish its center on private clouds — and it’s asset of power and capital in the skill — can convince enterprise IT executives that it can provide a safe way to come into the fray. 3 years after it … Continue reading

Posted in HP | Tagged , , , , , | Leave a comment

After Heartbleed, Comodo cranks out new SSL certificates

Comodo’s chief technology officer warns it is still very early in the remediation processTens of thousands of new digital certificates have been issued by Comodo in the wake of the “Heartbleed” security flaw, which has put Internet users’ data at … Continue reading

Posted in Tech | Tagged , , , , , | Comments Off

Jokes aside, some IT managers say there’s no option other than BlackBerry for security

BlackBerry heavily promotes its sales to defense and security-conscious groups despite its being up for sale The plight of BlackBerry has gotten so bad that heavy satire has stepped in. In one example, a website recommends “how to upgrade your … Continue reading

Posted in Tech | Tagged , , , , | Comments Off

Motorola uses NFC to enable touch-to-unlock for smartphones

The next best thing to a password pill, the Motorola Skip can both bolster a smartphone’s security and make it more convenient to use. Earlier this year, Motorola’s head of advanced technologies Regina Dugan discussed an alternative to the increasingly … Continue reading

Posted in Tech | Tagged , , , , | Comments Off

Human error causes most security breaches

tudy respondents blames only 8 percent of breaches on strictly technical failures3 Human error, not technology, is the most significant cause of IT security breaches, according to a security survey released by the Computing Technology Industry Association Tuesday. The survey, … Continue reading

Posted in Tech | Tagged | Comments Off

SY0-201 Q & A / Study Guide

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com QUESTION 1 Which of the following logical access control methods would a security administrator need to modify in order to control network traffic passing through a router to a different network? … Continue reading

Posted in Comptia Security+, Tech | Tagged , , , , | Leave a comment

Comptia SY0-301 Q & A / Study Guide

  Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com   QUESTION 1 Actively monitoring data streams in search of malicious code or behavior is an example of: A. load balancing. B. an Internet proxy. C. URL filtering. D. content … Continue reading

Posted in Comptia, Comptia Security+, Tech | Tagged , , , , , , , , | Leave a comment

Security rundown for week ending Aug. 19

Debate over wisdom of firewalls, passwords and SSL — plus, Anonymous strikes again And speaking of anonymity and disruption in the more sinister sense of the words, this week didn’t go by without the shadowy hacker group Anonymous yet again … Continue reading

Posted in Security+, Tech | Tagged , , , , , , , , , , , , , | Leave a comment

After 30 years, IBM says PC going way of vacuum tube and typewriter

Post-PC era? Microsoft says no While that sounds pretty vague, Dean notes that IBM has boosted its profit margins since selling off its PC division with a strategy of exiting commodity businesses and “expanding in higher-value markets.” One example: IBM’s … Continue reading

Posted in IBM, Tech | Tagged , , , , , , , , , , , , , | Leave a comment

Microsoft IE9 RC Arrives With Improved Privacy, Security Features

Microsoft’s Internet Explorer 9 Release Candidate has a number of enhancements aimed at improving privacy and security controls. Microsoft’s Internet Explorer 9 Release Candidate arrived Feb. 10 with privacy and malware protections built in to protect users. Best comptia A+ … Continue reading

Posted in Microsoft, Tech | Tagged , , , , , , , | Leave a comment

CompTIA A+ Exam Cram

CompTIA A+ Exam Cram, Fourth Edition, is the perfect study guide to help you pass CompTIA’s newly-updated versions of the A+ exams. It provides coverage and practice questions for every exam topic. The book contains an extensive set of practice … Continue reading

Posted in Comptia, Comptia A+, Comptia Linux, Comptia Network+, Comptia Security+, Intel, Tech | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment

Upcoming Gadgets Worth Waiting For

None of these highly awaited products has a firm release date, but they have us excited for their arrival. July 30, 2011—When it comes to new technology, the old adage is true: Waiting is the hardest part. Best comptia A+ … Continue reading

Posted in Comptia A+, Comptia Linux, Comptia Network+, Comptia Security+, Hradware, Tech | Tagged , , , , , , , , , , , , , , | Leave a comment

Has Firefox 3 certificate handling become too ‘scary?

In a scenario reminiscent of the fairy tale about the fellow who cries “wolf” too often, security engineers are actively wondering whether Firefox’ “blowing of the whistle” on self-signed certificates is a) frightening, and b) fair to developers. Best comptia … Continue reading

Posted in Firefox, Tech | Tagged , , , , , , , , , , , , , | Leave a comment