The Dragon that Guards the Data: No Pet Names in Passwords!


“I really don’t pay much attention to security,” the potential client told me. “I don’t have anything on my computer that anyone would want to steal.” There was a time when that would have been an almost valid idea. If you didn’t do your finances on your computer and you didn’t keep personal information there,…
Jason Hiner thinks not. The problem is likely less that Vista is bad, than that it is new and different and just a little clumsy for people who are accustomed to Windows XP. The idea of resolving security issues by forcing people to respond to the computer more often may be necessary–I don’t really know–but…
I always tell users to be very certain of any attachments, not only checking who they’re from, but being certain that the person in question intentionally sent them. This e-card greeting spam (Washington Post article) should remind you of another thing: Links in an e-mail don’t necessarily go where the text says they go. Be…
Wordfence Lists Top Security Analysis Tools, and it is generally worthwhile to read their material.
Details come from @BarracudaMSP (advisory). The key element is to carefully check incoming email, and never open an attachment if you have any uncertainty about its origin. Good security software is very helpful, but cannot save you from everything, especially if you execute it yourself. For my clients, let me note that you have the…
I just got notice of a vulnerability in Firefox from Wordfence. I have no original information, but I have generallly found that the Wordfence people provie good information. I will post a comment here (an a note at the top of this post) when this vulnerability has been fixed. The one way to avoid the…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)