Tag: criminals

The Debate on a Critical Vulnerability in Microsoft

Here is a full text version; for a concise summary of the arguments and the background to the debate, see the links below: (Please note that this is a summary and does not contain all of the technical details and background to the debate. ) This debate will take place on Wednesday 14th February, at…

Read More

Protecting IoMT Devices

As part of my series on IoMT devices, I need to discuss what we can do about it, given the nature of the devices running IoMT. They present a unique challenge regarding confidentiality. While their privacy is generally acknowledged, protecting their confidentiality can be a challenge. This article discusses how we can best prevent devices…

Read More

The Drug Abuse Treatment Strategy of the Bureau

The following article was written by Richard Schmit, MS/S, CDN and Program Director, Adult Day Treatment Center, and Program Director, D. Treatment Project, Department of Children and Families, and Associate Program Director, D. Treatment Project, Department of Corrections. The author is licensed as a clinical counselor with the Adult Treatment and Court Services Agency. He…

Read More

Tips of the Day in Computer Security

Computer security is a significant area with which IT managers and security professionals are concerned at their daily work. A significant amount of time is spent on implementing and maintaining security measures; however, the security measures themselves are often ignored. IT managers and security professionals may not be aware of the threats that are posed…

Read More

How to Cheat in Games, Part 1: The Case Against

How to Cheat in Games, Part 1: The Case Against: Cheating in gaming is a crime. Cheating can be a big problem, so it’s best to play it safe. When it comes to cheats, though, you have a few options if you want to play the game without causing trouble. The easiest of these is…

Read More

Is Audacity Spyware?

The following is an excerpt from an online article by The Register on the ethics and privacy issues surrounding the application of the audacity software development, and I have written a follow-up article on the ethics and privacy issues surrounding the audacity data collection and retention project. This week, we learned that the software development…

Read More

From the Shocking Killing of Det Marconi to the Murder Trial of Otis McKane

Article Title: From the shocking killing of Det Marconi to the murder trial of Otis McKane | Programming. On April 15, 1943, one of the greatest crimes in the history of the City of Brotherly Love ended as follows: Detective George Marconi killed one of the most notorious men ever to have been in the…

Read More

How to Use Password Manager With Windows 10 and System Center Configuration Manager

This post is part of the Network Security series for Microsoft. NET and contains information that may relate to security issues that you encounter using Windows 10 and System Center Configuration Manager. The Network Security series is a series of posts covering Windows 10 Security features. I’m excited to introduce the series to a new…

Read More

What Is Cybercrime?

Cybercrime differs in the amount of damage it can inflict. The latest data from Symantec show that cybercrime is a global concern with more than $3 trillion dollars in annual losses to users. For example, with malware being the primary source of all cybercrime losses, a malware researcher named Brian Krebs estimated the actual damage…

Read More