Paper-based Data Leakage Still a Concern
There is an intriguing article in the Saturday Washington Post about the lawsuit involving Hilton Hotels and Starwood Hotels regarding boutique hotel branding. In a suit filed in federal court…
There is an intriguing article in the Saturday Washington Post about the lawsuit involving Hilton Hotels and Starwood Hotels regarding boutique hotel branding. In a suit filed in federal court…
As if this story could get any worse… John Schiefer, an employee of human-powered search engine Mahalo, was sentenced to four years in prison this week for operating a botnet. This would be the same Mahalo that hired Schiefer without even a Google search, let alone a background check. They would have learned that Schiefer had [...]
In January, we blogged about American security consultant John Kenneth Schiefer pleading guilty to four felonies counts, including accessing protected computers to conduct fraud, disclosing illegally intercepted electronic communications, wire fraud and bank fraud. Now, another company has hired him without even doing a simple Google search on their new employee. https://enclavesecurit.wpengine.com/blogs/kellitarala/2009/01/28/background-checks-and-references-are-imperative-for-info-sec-professionals/ Mahalo.com, a web company dubs [...]
Does your company’s Human Resources Department complete background checks and reference checks on employees? Is it documented in the employee manual? Many companies are compelled to complete these checks if they are healthcare providers, defense contractors, or children services providers, but other companies don’t want to spend the time or money to complete background checks. [...]
Computer malware Conficker otherwise known as DownadUp is creating havoc across the Internet, but especially at Sheffield Teaching Hospitals. The malware exploits the MS08-067 vulnerability patched by Microsoft last October. MS08-067 fixes vulnerability in the Server service that could allow remote code execution via a specially crafted RPC request. This vulnerability is particularly nasty because [...]
Happy New Year!It is very tempting to write about the top ten technology gadgets of 2008 or the top ten security problems for 2009, but I just can’t take anymore! Who let the paparazzi into technology reporting? Those articles would be more valuable if the authors would evaluate their predictions from the previous year and [...]