Patch Management Survey

February 17, 2011 SecurityOrb_Staff 0

A Doctoral Student in Information Assurance is conducting a survey with the goal of understanding the collective IT perception of patch management along with any associated misconceptions relative to how vendors actually handle patch releases/cycles. […]

Information Privacy Issues with People Search Websites: What can you do to protect yourself?

February 3, 2011 admin 0

At one time, when you wanted to know something about someone you would use a search engine like Google or Yahoo, but that is not the case anymore. There are hundreds of websites with your personal information listed that will provide your information to someone for a fee and some even for free. Many people always ask, “How did my information get on this site?”, and I often state, “You put it there.” Maybe not directly, but through various online activities such as Facebook and Twitter updates as well as signing up to purchase items online. All of that information is eventually collected and stored in some company’s database. […]

Feb Edition of Hackin9 – Network Security

February 2, 2011 SecurityOrb_Staff 0

Another exciting edition of Hackin9 is out and you can download it here. Information about this edition is located below:
· Wuala – Secure Online Storage

There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from LACIE may have something unique in the way their solution works. […]

Parents’ Internet Monitoring Study by NetSmartz.org

February 2, 2011 SecurityOrb_Staff 0

NetSmartz is a very informative site geared towards aiding with the awareness efforts on how to better protect our kids while online. They have an excellent collection of data pertaining to how bad the situation is on the gap between parents understanding what their teens are doing online below: […]

Cyber-Bullying Overview and Information

February 1, 2011 admin 0

Cyber-bullying uses the new forms of digital communication technologies to repeatedly harass others. A cyber-bully is someone who uses technology to harass, embarrass, intimidate, or stalk someone else.

The methods used can include emails, instant messaging, text-messages, digital photos and all other means of electronic communications. […]