How do email clients work?Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server. For example, let’s assume that your email address is…
Email attachments are a common tool for attackers because forwarding email is so simple. Users often open attachments that appear to come from someone they know or an organization they do business with. Almost any type of file can be attached to an email message, so attackers have more freedom with…
WARNING: beware of email that claims to be from Facebook.The subject line usually reads like this:Facebook Password Reset Confirmation! Your Support.The body of the email reads:Dear user of facebook,Because of the measures taken to provide safety to our clients, your password has been changed.You…
GameSec 2010 – Conference on Decision and Game Theory for Security 22-23 November 2010, Berlin, Germanywww.gamesec-conf.orgIndustry Gold Sponsor: Deutsche Telekom LaboratoriesIndustry Silver Sponsor: Frauenhofer Heinrich Hertz InstituteTechnical co-sponsors: IEEE Control System Society,…
Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information. How do wireless networks work?As the name suggests, wireless networks, sometimes called WiFi,…
1.If you find a USB token in the wild, don’t plug it into your USB port as it could autoinstall software if your system is set to autoplay CDROMs.2.Though many organizations’ standards call for disabling autoplay of CDROMs, you should check and set yours. To disable autoplay follow these…
A California man has been arrested for interfering with computers at the California Independent System Operator (Cal-ISO) agency, which controls the state’s power transmission lines and runs its energy trading markets. Even though Lonnie C. Denison’s security access had been suspended at the…
Use a password in only one place.Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure…
HARRISBURG – Pennsylvania, along with 34 other states, has reached a $12 million settlement with LifeLock Inc, an Arizona-based company accused of making confusing or misleading statements in the advertisement and promotion of its identity theft protection services.“Identity theft is a major…
Terminate Computer Access Before You End a Contract or Tell People They Are FiredShortly before a labor union strike in August 2006, two Los Angeles transportation engineers allegedly disconnected traffic signals at four busy intersections. Subsequently, these disgruntled employees were accused of…
Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or family members. Try to verify the information before following any instructions or passing the message along. Why are chain letters a problem?The most serious problem is from…
US-CERT asks users to be vigilant during the U.S. Census Bureau’s 2010 Census campaign and to watch for potential census scams.According to the U.S. Census 2010 website, they began delivery of the printed census forms to every resident in the United States on March 1, 2010. The only way to…
Unsolicited commercial email may be a privacy and/or security violation under the Federal Trade Commission of the United States of America. SPAM should be forwarded to uce@ftc.gov.