List Headline Image
Updated by ►David Clarke FBCS CITP on Nov 05, 2013
 REPORT
5 items   3 followers   0 votes   24 views

Security DDOS

Security DDOS

Electronic Security a Worry in an Age of Digital Espionage

He leaves his cellphone and laptop at home and instead brings "loaner" devices, which he erases before he leaves the United States and wipes clean the minute he returns. In China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely.

How to avoid being tagged as a terrorist: Don't pay cash for coffee

February 10, 2012, 2:35 PM - It's difficult to figure out where you stand in the eyes of the law these days TSA, the Dept.

Is cyberwar hype fuelling a cybersecurity-industrial complex? — RT

The raid that ravaged Megaupload was just the start. A powerful trade group that lists the biggest names in the entertainment biz as its members has called-out dozens of countries in their latest report and is insisting on sanctions against them.

2

Using strong passwords on devices.

Using strong passwords on devices.
1

Make sure users know exactly which data could be deleted automatically or remotely.

Make sure users know exactly which data could be deleted automatically or remotely.