Identity Verified Thinker in Technology / Internet / Infrastructure
Mike Dailey
Mike Dailey
Mike Dailey is the owner of claroPoint.com, an Information Technology consulting firm specializing in the design, integration, and management of Internet website and security technologies. He can be reached through the claroPoint website at http://www.claroPoint.com
 

Categories

This Blog has no active categories.
 
Close  
Oct. 6, 2011 12:30 pm
As we read and discuss the subject of computer hacking and related nefarious uses of the Internet, we focus for the most part on the Information Technology and Information Security side of the topic. There is another side, however, one dealing with the moral and ethical aspects of hacking, approached from a religious viewpoint to draw the parallel between what many consider innocent computer...  Read More
Oct. 5, 2011 8:21 am
Not long ago, the phrase portable secure storage did not mean a great deal to the average business traveler. Today, however, carrying large amounts of data, including application files, digital photos, and music, is a reality for most tech-savvy travelers. Whether you are on the go for business or personal reasons, you likely carry a large quantity of data with you, and odds are it is not...  Read More
Sep. 23, 2011 11:20 am
We are just a week away from the month of October, and October is National Cyber Security Awareness Month (NCSAM). The goal of National Cyber Security Awareness Month, conducted every October since 2004 and sponsored by the National Cyber Security Alliance (NCSA), is to improve cyber security posture and preparedness, and to encourage everyone to protect their networks and our nation’s critical...  Read More
Sep. 9, 2011 6:12 pm
United States House of Representatives members are readying a series of cybersecurity bills that are designed to enhance security on several fronts, including toughening law enforcement, assigning responsibility to the Department of Homeland Security (DHS) for federal IT and critical infrastructure security, and to lessen legal liability for private organizations that adhere to security best...  Read More
Sep. 5, 2011 8:15 am
It is no secret that cyber attacks are growing in complexity and severity. In August of this year, a malware-powered cyber-reconnaissance attack, dubbed Operation Shady RAT, was reported by McAfee. The cyber attack had been ongoing since 2006, and claimed victims across a wide spectrum of Internet connected organizations, including government agencies in the United States, Canada, and South...  Read More
Aug. 30, 2011 9:17 am
According to a joint survey by the University of Pennsylvania and University of California-Berkeley, 84% of consumers object to being tracked online, with many seeing it as a violation of their online privacy. With that type of user feedback, it is not surprising that this week’s launch of a “Do Not Track” option by the Interactive Advertising Bureau (IAB) was met with staunch criticism by...  Read More
Aug. 26, 2011 5:22 pm
There has been a lot of discussion lately concerning Internet security and privacy, spurred on by what seems like an almost daily occurrence of web site hacking and the loss of confidential data. Medical facilities, private industry, and governments alike struggle to come to grips with new methods of cyber crime and cyber terrorism. While the majority of cyber attacks are carried out by amateur...  Read More
Aug. 23, 2011 3:35 pm
As more incidents of hacking, theft, and data loss make the headlines this week, the question remains as to who is responsible for the lapses in Internet security that make it seemingly easy to commit these types of cyber crime. Whether it be the public or private sector organization that was targeted, a government body, an Internet Service Provider, or the throngs of Internet users and consumers...  Read More
Aug. 18, 2011 10:28 am
A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different author's name. I hadn’t been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my...  Read More
Aug. 15, 2011 9:58 am
As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time. Releasing the personal information of innocent...  Read More
Jul. 26, 2011 8:09 am
The term security posture is used in information security to describe the overall security effectiveness of a given system, service, or network. All aspects of security strength and weakness are evaluated and weighed against both potential and known threats in an effort to gauge the current level of protection. This same process can be used to develop a "personal" security posture, by assessing...  Read More
Jul. 6, 2011 10:38 pm
A fledgling international cyber security alliance is continuing to gather backing from private business, according to a recent article published on ComputerWeekly.com. The International Cyber Security Protection Alliance (ICSPA) aims to support law enforcement agencies in countries that lack the resources to fight cybercrime. Commercial security organizations such as McAfee and Trend Micro...  Read More
Jun. 30, 2011 11:11 pm
The U.S. District Court has ruled that a law suit filed against Google can proceed, paving the way for a potential class-action lawsuit against the search engine giant for the illegal interception of open residential wireless access point transmissions. Judge James Ware rejected Google's argument that a dismissal of the case was warranted because the wireless signals intercepted by Google were...  Read More
Jun. 28, 2011 10:11 am
Microsoft is advising customers to reinstall if their desktop OS becomes infected with a new rootkit that hides in the PC boot sector. This new variant of a Trojan Microsoft calls "Popureb" can infect the system at such a deep level that the only way to remove the malware is to reinstall Windows, Chun Feng, an engineer with the Microsoft Malware Protection Center (MMPC), said last week on the ...  Read More
Jun. 25, 2011 11:07 pm
Since its launch in October, 2004 Project Honey Hot has made some interesting progress in their war against spam email. The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to...  Read More
Jun. 25, 2011 11:58 am
In this multipart series we will be discussing the process and procedure for configuring an iptables firewall under Linux. This series will guide Linux users with any level of networking experience through the entire process of installing and configuring a complete iptables firewall. Included in the final firewall configuration will be leading industry-standard best practices for firewall traffic...  Read More
Jun. 21, 2011 12:18 pm
The recent announcement of a 13-year old security flaw found in an Open Source security library has renewed the debate between open source and closed source software. The library, crypt_blowfish , allows for fast two-way password encryption. The flaw introduces the potential for passwords to be easily compromised and affects PHP and a number of Linux distributions that include the...  Read More
Jun. 18, 2011 2:43 pm
Microsoft announced on Thursday the findings of a survey which revealed that over 7000 Windows home and business customers in several countries--including the United States, United Kingdom, Ireland, and Canada--have been targeted by a phone phishing scam. According to Microsoft, "the scam works by criminals posing as computer security engineers and calling people at home to tell them they are at...  Read More
Jun. 17, 2011 11:03 pm
For many of us in the technology field the preventative measures we take to keep ourselves and our systems safe online can become second nature. We become comfortable with the drill, so comfortable, in fact, we sometimes forget that not everyone may have the resources and technical information that we have at our disposal. Keeping this in mind I spent some time searching for and collecting a...  Read More
Jun. 12, 2011 3:36 pm
According to a recent Homeland Security News Wire article , nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically--primarily as a cost savings effort--the risk and exposure of our private medical information increases while our...  Read More
Mar. 22, 2009 12:07 pm
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In ...  Read More
Feb. 12, 2009 11:57 am
As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. CIOs and IT managers will depend on risk-based decision making and...  Read More
Jan. 26, 2009 3:37 pm
As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised. According to Monster.com: "As is the case with many companies that maintain large databases of information,...  Read More
Jan. 24, 2009 11:53 am
If current predictions are correct, 2009 will be a tougher year than 2008 in terms of the economy. In tough economic times such as these it becomes increasingly important for us to follow recommended safety practices when going online. As the numbers of Internet-related fraud and financial scams continue to increase we should expect the current economic situation to produce more victims of...  Read More
Jan. 24, 2009 11:51 am
We're learning this week that we have officially passed the one billion number in terms of people using the Internet. Eric Schonfeld writes in his article on TechCrunch that the number is probably higher than that. One billion is a staggering number, even though it makes up only 15 to 22 percent of the world's population. Nevertheless, those one billion Internet users give us a lot to deal...  Read More
Jan. 12, 2009 11:47 am
Identity Theft is a crime in which an impostor obtains key pieces of personal identifiable information such as Social Security numbers and driver's license numbers and uses them for their own personal gain. It can start with lost or stolen wallets, pilfered mail, or even the use of a credit card at the local mall. According to the Federal Trade Commission, identity theft ranked No. 1 on the list...  Read More
Return to Main Blog Page

No Worries, We Are NOT Vulnerable To The OpenSSL Bug

We do not use OpenSSL here at BestThinking.com or ThinkerBooks.com. No need to worry or change passwords here because of the widely-publicized Heartbleed Bug. We have suffered two short outages recently presumably because much of the Internet transport infrastructure does rely on OpenSSL and they have been updating their systems.

Close
 
Latest Ebooks