Pwned Passwords
On February 22, 2018, Troy Hunt released the V2 update to Pwned Passwords. Pwned Passwords is a service that checks to see if any of your passwords have been leaked in any third-party security breaches. Troy also provided a new API that allows you to lookup a password by using ... Read More
Retrieving a Stolen iPhone in Under 72 Hours
Image via streamingmedia.com Within 53 hours I was able to get a stolen iPhone safely into police custody. Here's a rough timeline of the steps I went took to get the phone back to the rightful owner: Saturday, 2/4/2012 @ 8:45 AM -- iPhone was "lost" (i.e., stolen). Called stolen ... Read More
America the Vulnerable
Image by formalfallacy @ Dublin (Victor) via Flickr During my commute to and from work I recently began listening to the audiobook, "America the Vulnerable: New Technology and the Next Threat to National Security" by Joel Brenner, narrated by Lloyd James. The audiobook was downloaded from Audible.com. I’m currently half-way ... Read More
Free Security Awareness Training – Part 5 of 5
Image via Wikipedia Today's post concludes the series of five posts whereby I wanted to give you links to 25 security awareness courses and videos that are publicly available. I strongly believe that security awareness training is an essential component to good security. Throwing money and technology at the security ... Read More
Free Security Awareness Training – Part 4 of 5
Image via Wikipedia This week I'm sharing with you links to 25 security awareness training sites. The training links are being broken up into groups of five, published within five separate postings. Today we reach the forth set of training links for an accumulative total of 20. The 2008 information security survey ... Read More
Free Security Awareness Training – Part 3 of 5
Image via Wikipedia This week I'm passing on to you links to 25 free security awareness training sites. Why is security awareness training important? Fundamentally, security is about people. Having worked within the information security world for the past 15 years, it's become very clear that the best defense to ... Read More
Cyber Intelligence Sharing and Protection Act of 2011 (HR 3523)
Image via Wikipedia The House Intelligence Committee held a closed-door markup of a bill (HR 3523) with the intention to improve cybersecurity through enabling the federal government to share classified cyber threat information with businesses. To quote two of the primary proponents: "There is an economic cyber war going on ... Read More
Free Security Awareness Training – Part 1 of 5
Image via Wikipedia As a security profesional I believe it's essential that we maintain security awareness and an understanding of the threats we face. Education often isn't cheap and the reality is that for many employers funding for training and education is very limited. Fortunately, we're entering into the holiday ... Read More
FCC Small Biz Cyber Planner
Image via Wikipedia The FCC has launched a Small Biz Cyber Planner, an online resource to help small businesses create customized cybersecurity plans in conjunction with DHS, NCSA, NIST, The U.S. Chamber of Commerce, The Chertoff Group, Symantec, Sophos, Visa, Microsoft, HP, McAfee, The Identity Theft Council, ADP and others. The ... Read More
Protecting Kids Online
Image via Wikipedia One of the issues I’ve been struggling with over the past ten or so years is how to protect kids online. The Internet offers a world of opportunities. People of all ages share photos and videos, build online profiles, text each other and create alter egos in ... Read More