Pwned Passwords
On February 22, 2018, Troy Hunt released the V2 update to Pwned Passwords. Pwned Passwords is a service that checks to see if any of your passwords have been leaked in any ...
Retrieving a Stolen iPhone in Under 72 Hours
Steve | | Apple, Apple ID, ATT, Google Voice, ICloud, iPhone, Lost iPhone, police, PropertyShark, Stolen iPhone, Tracking iPhone, Tracking Stolen iPhone
Image via streamingmedia.com Within 53 hours I was able to get a stolen iPhone safely into police custody. Here's a rough timeline of the steps I went took to get the phone ...
America the Vulnerable
Image by formalfallacy @ Dublin (Victor) via Flickr During my commute to and from work I recently began listening to the audiobook, "America the Vulnerable: New Technology and the Next Threat to ...
Free Security Awareness Training – Part 5 of 5
Steve | | Booby trap, Consultants, Food and Drug Administration, Food Security, Information Security, security, technology, training
Image via Wikipedia Today's post concludes the series of five posts whereby I wanted to give you links to 25 security awareness courses and videos that are publicly available. I strongly believe ...
Free Security Awareness Training – Part 4 of 5
Steve | | Consultants, Emergency Management, Information Security, Pandemic, security, technology, United States
Image via Wikipedia This week I'm sharing with you links to 25 security awareness training sites. The training links are being broken up into groups of five, published within five separate postings ...
Free Security Awareness Training – Part 3 of 5
Steve | | Emergency Management, homeland security, Hurricane Irene, Janet Napolitano, online training, security, United States, United States Department of Homeland Security, Web Design and Development
Image via Wikipedia This week I'm passing on to you links to 25 free security awareness training sites. Why is security awareness training important? Fundamentally, security is about people. Having worked within ...
Cyber Intelligence Sharing and Protection Act of 2011 (HR 3523)
Steve | | Business, Computer security, Cyberwarfare, Dutch Ruppersberger, Privately held company, United States, United States House Permanent Select Committee on Intelligence
Image via Wikipedia The House Intelligence Committee held a closed-door markup of a bill (HR 3523) with the intention to improve cybersecurity through enabling the federal government to share classified cyber threat ...
Free Security Awareness Training – Part 1 of 5
Steve | | Christmas and holiday season, Computer security, Consultants, Information Security, Phishing, security, Security Awareness, training
Image via Wikipedia As a security profesional I believe it's essential that we maintain security awareness and an understanding of the threats we face. Education often isn't cheap and the reality is ...
FCC Small Biz Cyber Planner
Steve | | Computer security, fcc, Federal Communications Commission, mcafee, small business, sophos, Symantec, United States Chamber of Commerce, United States Department of Homeland Security
Image via Wikipedia The FCC has launched a Small Biz Cyber Planner, an online resource to help small businesses create customized cybersecurity plans in conjunction with DHS, NCSA, NIST, The U.S. Chamber ...
Protecting Kids Online
Steve | | Child Safety, Common Sense Media, Cyber Bullying, facebook, Federal Trade Commission, Internet Safety, mobile phone, security, sexting, social network, text messaging, Virtual world, Web 2.0
Image via Wikipedia One of the issues I’ve been struggling with over the past ten or so years is how to protect kids online. The Internet offers a world of opportunities. People ...