Category Archives: Security

Computer Worm Uses Fake FedEx Delivery Notification Emails to Infect PCs, Warns PandaLabs | Press Panda Security

Computer Worm Uses Fake FedEx Delivery Notification Emails to Infect PCs, Warns PandaLabs | Press Panda Security. Here’s all the grizzly technical details of what will happen to your computer if you click on the “Get Postal Receipt” button in … Continue reading

Posted in Security | Leave a comment

Android malware poses as Angry Birds Space game | Naked Security

They’ve gone entirely too far this time!  Come on! Angry Birds?  That’s like attacking apple pie and motherhood! Android malware poses as Angry Birds Space game | Naked Security.

Posted in Security | Tagged , , , , , | Leave a comment

Nefarious and Angry Employees Still a Primary Threat to Organizations

Internal threats still challenge the security of your network and the privacy of your company data. Nefarious and Angry Employees Still a Primary Threat to Organizations.

Posted in Privacy, Security | Tagged , , , , , , | Leave a comment

Cisco Blog » Blog Archive » Will Wi-Fi Begin a New Chapter for Mobile?

Most of the time we don’t know or even care how we connect.  Its just “that” we connect and when we don’t or can’t we get really cranky.  At work its usually simple:  either you can or can’t depending upon … Continue reading

Posted in Infrastructure, Security | Leave a comment

The Need for a Special Forces Offensive Cyber Group

In the same way as the US chose to use Special Forces to hunt down war criminal Osama Bin Laden, we also need to consider using special operations agencies and personnel to thwart the growing risk of cyber attacks of … Continue reading

Posted in Security | Leave a comment

Custom gTLDs from ICANN

Custom gTLDs from ICANN.  TLD is Top Level Domain for the uninitiated.  This action is an important milestone in the development of the Internet fabric.  Even though content controls and even intellectual property protection have been difficult to legislate or … Continue reading

Posted in Security | Tagged , , , , , , , | Leave a comment

Cisco, Juniper, Check Point, Palo Alto among firms in security contest – Computerworld

Cisco, Juniper, Check Point, Palo Alto among firms in security contest – Computerworld.  The big guys battle it out.  Email me if you are interested in learning more about Palo Alto Networks.  colin.mackinnon@transitionit.com

Posted in Security | Tagged , , , , | Leave a comment