Category: Security

Apr 10, 2014

Heartbleed: The New Web Security Flaw

A major web security flaw, known as “Heartbleed,” was recently identified. It may affect up to two-thirds of the Internet’s web sites, exposing sensitive data to potential hackers. With news sources all abuzz with coverage of Heartbleed, Safety Net would like our clients to have a better understanding of this new bug. Heartbleed is the result of a coding error with OpenSSL, the most popular […]

Read
Feb 28, 2014

Apple iOS and OS X Security Flaw Found

Sometimes, there really is a bad apple. The media was a flurry this week because a major security flaw was identified with encrypted communications on iPhones, iPads, and other iOS devices and computers. True, Apple has recently released an update to fix this vulnerability for both their mobile operating system and OS X for desktops. However, their reputation […]

Read
Feb 07, 2014

Potential Cyber Risks with the Winter Olympics

The media has covered many stories about potential dangers at the 2014 Winter Olympics, but here’s one threat you may not have considered. The United States Computer Emergency Readiness Team (US CERT) has issued the following warning: “Whether traveling to Sochi, Russia for the XXII Olympic Winter Games or viewing the games from locations abroad, […]

Read
Jan 31, 2014

Another Credit Card Breach at a Major Retailer?

On the heels of Target’s holiday season fraud scandal, another major retailer has revealed that they may have been affected by a credit card security breach. Multiple sources in the banking industry say they are tracking a pattern of fraud on cards that were recently used at arts and crafts retailer, Michaels. The Texas-based specialty […]

Read
Jan 03, 2014

The Five Most Dangerous Email Subject Lines

Websense has posted the five most dangerous subject lines used in phishing emails worldwide. Based on research by Websense Security Labs gathered between January-September 2013, the subject lines are: 1. Invitation to connect on LinkedIn 2. Mail delivery failed: returning message to sender 3. Dear Customer 4. Comunicazione importante 5. Undelivered Mail Returned to Sender […]

Read
Dec 02, 2013

IT Security 101 for Business

Note: This article is featured in TCBN’s December 2013 issue.    Protecting your organization against IT security risks is becoming increasingly important in today’s business climate. Instances of malware and cyber intrusion are more sophisticated and widespread than ever before. You only need to look to the media to find examples. Corporate giants like Visa, JCPenney, […]

Read
Nov 15, 2013

Cyber Threats Related to the Philippines Typhoon Disaster

After a natural disaster, phishing email scams and websites requesting donations for bogus charitable organizations often begin to appear. These emails may contain links or attachments which direct you to phishing or malware-laden websites. The recent Philippines Typhoon disaster is no exception. The United States Computer Emergency Readiness Team (US CERT), which is part of the […]

Read
Nov 05, 2013

MI Aims To Combat Cybercrime

I recently attended the Michigan Cyber Summit 2013 in Novi, MI. The event was great example of how the government and corporations partnering to help combat IT security threats. At the event, Michigan Governor Rick Snyder unveiled a new volunteer IT force, the Cyber Civilian Corps, a group charged with helping the state respond to cyber […]

Read
Oct 31, 2013

Use Caution with USB Drives

USB drives are popular for storing and transporting data, but some of the characteristics that make them convenient also introduce security risks. One option is for attackers to use your USB drive to infect other computers. An attacker might infect a computer with malicious code, or malware, that can detect when a USB drive is […]

Read
Oct 16, 2013

Phone Apps and IT Security

Think before you app – understand what information, such as  location and social network accounts, the app would access and share…before you download it to your phone. Phones can contain tremendous amounts of personal information. Lost or stolen devices can be used to gather information about you and potentially, others. Protect your phone like you […]

Read