It’s Not OK to Click “OK”

If you are a user of Microsoft’s Windows operating system, you no doubt are very familiar with the popup dialogue boxes that are so frequently displayed on your screen.  These popup windows were designed to inform you when an event occurs that requires your attention or input. ...

A Lesson From the Sarah Palin Email Hack

Much has been written recently about the Sarah Palin email hack.  This hack was not the result of some exotic new virus or an uber-hacker with a secret toolkit for compromising webmail accounts.  No, this was nothing more than a curious youngster doing some basic Internet searches and...

A Business Guide to North Carolina’s Identity Theft Protection Act

Like many other states, North Carolina has enacted a data breach notification law in an effort to help protect its citizens from identity theft due to the disclosure of personally identifiable by private enterprises.  Passed in 2005, the Identity Theft Protection Act (ITPA) sets out...

V is for Vishing

First, a little background on the term vishing.  Vishing is a type of attack that combines voice (i.e. phone services) with traditional phishing techniques.  If you are unfamiliar with phishing attacks, please see my earlier article on this topic for a refresher.  Vishing has become...

Internet Explorer 8 Security Features Lacking

I became excited when I read the press release for Microsoft’s Internet Explorer 8 Beta 2 browser software.  IE has traditionally lagged behind Firefox when it comes to security so I thought I would investigate.  According to Microsoft, IE8 incorporates many new and in some cases...