Be careful before you resell or give away your handheld devices like Palms. The new owner can uncover data. At a minimum, figure out how to reset it to the factory standard. Refer to your manual or call the manufacturer. For more information on deleting data:…
WASHINGTON, DC — NASA will host a summit about open source software development on March 29-30 at the agency’s Ames Research Center in Moffett Field, Calif. The event runs from 9 a.m. to 5 p.m. PDT on both days. NASA’s first Open Source Summit will bring together engineers, policy makers and…
ALERT! The following email is being circulated and should be avoided. It is fraudulent and contains malware. Do NOT open. Subject: Important information for depositors of Federal Deposit Insurance Corporation #76522 Attachment Converted: “c:\email\attachments\document.zip”
If you receive an email notification claiming to be from FedEx DO NOT OPEN THE ATTACHMENT. The zip file is a Trojan and and should be avoided. From: “FedEx notification robot” To: “
The following email that is being circulated is fraudulent: From: “Federal Bureau of Investigation” Subject: Federal Bureau of Investigation (FBI) Federal Bureau of Investigation (FBI) Anti-Terrorist And Monitory Crime Division. Federal Bureau Of Investigation. J.Edgar.Hoover Building Washington…
E-mail is insecure because it is more like a postcard, not a sealed envelope.A number of people are under the misconception that when they draft and send e-mail, two things occur. Their message gets sealed in an envelope (that’s why you have to open e-mail right?) and that it goes directly to the…
How do email clients work?Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server. For example, let’s assume that your email address is…
Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information. How do wireless networks work?As the name suggests, wireless networks, sometimes called WiFi,…
1.If you find a USB token in the wild, don’t plug it into your USB port as it could autoinstall software if your system is set to autoplay CDROMs.2.Though many organizations’ standards call for disabling autoplay of CDROMs, you should check and set yours. To disable autoplay follow these…
HARRISBURG – Pennsylvania, along with 34 other states, has reached a $12 million settlement with LifeLock Inc, an Arizona-based company accused of making confusing or misleading statements in the advertisement and promotion of its identity theft protection services.“Identity theft is a major…
Unsolicited commercial email may be a privacy and/or security violation under the Federal Trade Commission of the United States of America. SPAM should be forwarded to uce@ftc.gov.