Monthly Archives: August 2012

Take a look at this fascinating article published on Yahoo! Finance by Stacy Cowley at CNNMoney.com that describes real social engineering attacks mounted at July’s DefCon conference in Las Vegas. This is an example of how attackers don’t have to … Continue reading

Posted in Social Engineering | Tagged , , | Leave a comment

An interesting article from ExtremeTech.com about security in the cloud. Despite the title (“Is ‘cloud security’ an oxymoron?”), it takes a balanced approach, suggesting you be aware of the pitfalls rather than avoid cloud computing services. Is ‘Cloud Security’ an … Continue reading

Posted in Cloud Security | Tagged , | Leave a comment