Brian Prince

Users Must Take Stronger Role in Information Security

During the past few years, the threat of data being bought, stolen and traded on the Internet has oozed deeper into the consciousness of many Web users. But unpatched computers, out-of-date applications and poor Web surfing practices beg the question of whether users need to take more responsibility for their online safety. At a June […]

Google Moves Encrypted Web Search

Google has moved the encrypted version of its search engine to a new Web address. Though the old URL (https://www.google.com) still works, Google announced recently that it launched encrypted.google.com in a nod to school administrators who have blocked encrypted search for their students. “We recently launched a beta version of encrypted (SSL) search at https://www.google.com […]

Google Chrome Browser to Gain Plug-in Protection

Google is bolstering Chrome security with a plan to block vulnerable plug-ins from launching. “We’re working on tackling the problem of out-of-date plug-ins, starting with the two most widely used and targeted plug-ins,” a Google spokesperson told eWEEK. “Adobe Flash now ships with Chrome and is automatically kept up-to-date with Chrome’s powerful auto-update. And in […]

Sybase Enhances SQL Anywhere Mobile Database

Sybase pulled the covers off SQL Anywhere 12 June 29 and revealed what users can expect in the upcoming release of the company’s mobile database. In SQL Anywhere 12, the company has added new “support for storage and synchronization of spatial data,” Apple iPhones and a number of self-management features. The support for spatial data […]

U.S. Outlines Security Strategy for Online Identity

The White House has published a draft of a strategy designed to make the concept of trusted identities and authentication more of a reality in the digital world. In a 39-page document (PDF) entitled the “National Strategy for Trusted Identities in Cyberspace” (NSTIC), the White House promotes what it calls the Identity Ecosystem, an interoperable […]

Research: How Social Networks Leak Your Information

A new study from Worcester Polytechnic Institute shows mobile online social networks are providing tracking sites and other third parties with users’ physical locations or the unique identifiers for their mobile devices and other information. The paper, “Privacy Leakage in Mobile Online Social Networks” (PDF), was unveiled last week at the 3rd Workshop on Online […]

ICANN Allows .xxx Adult Domain Application to Advance

The board of directors for the Internet Corporation for Assigned Names and Numbers (ICANN) voted today to allow the longstanding application for an .xxx domain for the adult entertainment industry to move forward. The application will now move on to ICANN’s Governmental Advisory Committee. The creation of a top-level domain for adult sites has been […]

How to Choose a Data Loss Prevention Tool

Data loss prevention sounds like a great idea. But poor planning can run up costs, making how organizations choose tools an important-and meticulous-process. There are several things organizations should take into account when buying a DLP solution, starting with what type of data they want to protect, Securosis analyst Rich Mogull said. From there, organizations […]

Inside Text Message Phishing Attacks

Not all phishing takes place online. Text message-based phishing, called smishing, is still out there, and though on the decline, a report from security vendor Internet Identity (IID) shows it is still being used to target credit unions. In smishing, scammers use text messages to impersonate companies and lure victims into calling a fake interactive […]

Controversial Cyber-Bill Passes Senate Homeland Security Committee

A U.S. Senate committee has given the thumbs up to a controversial cyber-security bill that some claim expands executive powers too far in the event of a cyber-attack. The Protecting Cyberspace as a National Asset Act (PDF) was approved by the Homeland Security and Governmental Affairs Committee today in a unanimous vote. Critics have accused […]