Security, Privacy, & Risk, Cyrptocurrencies, Blockchain, & Fintech

Protecting your Cyber presence!
  • Services
  • About Us
  • Quora
  • Flipboard
  • Paper.li Newspapers
Facebook LinkedIn Twitter Email Google+ pinterest RSS

Media


Listen on Google Play Music

Subscribe

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Archives

  • January 2019
  • December 2018
  • July 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • November 2017
  • September 2017
  • August 2017
  • June 2017
  • May 2017
  • March 2017
  • January 2017
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • December 2013
  • July 2013
  • June 2013
  • March 2013
  • April 2012
  • January 2012
  • December 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • April 2011
  • January 2009
  • May 2008
  • April 2008
  • March 2008
  • January 2008
  • October 2007
  • September 2007
  • August 2007

iPhone unlocked!

Aug27
by Shahid Sharif on August 27, 2007 at 10:35 pm
Posted In: Uncategorized

So much for AT&T’s strategy to have exclusive rights to sell Apple’s iPhone.  Apple probably convinced AT&T into beleiving that their Mac osX is very secure and so would their iPhone OS.  The fact that an 17-year old can unlock the code on iPhone makes Apple look like fools.

 The morale of this story is, no matter how secure you make your application, OS, or platform there is someone out there who will infiltrate it and make you look like a fool.

Comments Off on iPhone unlocked!

Monster.com hacked!

Aug26
by Shahid Sharif on August 26, 2007 at 7:35 pm
Posted In: Uncategorized

I was just following up on news today and came across an article on BBC news. According to the article most of the information lost pertained to North American users, and about 5000 non-north american users.  The attack originated in UKRAINE, what this means is that the users whose information was lost should expect a lot of SPAM, and PHISHING type email asking for more personal/private information.  I wonder if Monster.com is lining up its lawyers in preparation of a law suit.  Should be interesting.

Comments Off on Monster.com hacked!

Corporate intranet blogs

Aug11
by Shahid Sharif on August 11, 2007 at 8:40 am
Posted In: Uncategorized

The two most worrysome issues in corporations were dealing with use of emails and webservers.  Now a third more potent tool are the BLOGs.  People can blog to their hearts content on the internet, but when it comes to blogging on the corporation intranet a lot of issues surface like:

  • Content of the blog
  • Compliance with Legal and HR policies
  • Privacy concerns

In my opinion all blogs on a corporate intranet musst be moderated with AUP (Acceptable Use Policy and user education

 What to you guys out there think? you opinions are welcome.

Comments Off on Corporate intranet blogs

( No Title )

Aug09
by Shahid Sharif on August 9, 2007 at 11:06 pm
Posted In: Uncategorized

Technorati Profile

Comments Off on

Importance of data classification

Aug08
by Shahid Sharif on August 8, 2007 at 10:25 pm
Posted In: Uncategorized

How important is data classification for an organization? and should the meta data be stored centrally?

Comments Off on Importance of data classification
  • Page 171 of 172
  • « First
  • «
  • 168
  • 169
  • 170
  • 171
  • 172
  • »

Tags

Amazon android Apple Audit authentication backdoor Banking bitcoin blockchain Compliance Credit Cards cryptography Dark Net darknet - the darkside dark Web encryption EU Europe European Union exploits Facebook FBI GDPR Google Hacking ICO malware Microsoft NSA password Payments payment week Privacy privacy coins privacy tokens ransomware Resume Security SOC2 SSAE18 Time Management tls tor Voice vulnerability

Categories

  • Anonimity (3)
  • Audit (5)
  • Automobile (2)
  • Bitcoin (2)
  • Blockchain (7)
  • Compliance (6)
  • Credit Card (1)
  • Cryptocurrences (5)
  • Cryptocurrencies (4)
  • cyber resilience (1)
  • cyber resiliency (1)
  • cyber security (1)
  • cyberresilience (1)
  • cybersecurity (1)
  • data (1)
  • Distributed Ledgers (6)
  • Education (3)
  • Employment (9)
  • Encryption (12)
  • Entrepreneurship (4)
  • Finance (25)
  • GDPR (1)
  • Hacking (30)
  • Health (3)
  • Human Rights (1)
  • ICO (4)
  • Identity (1)
  • Insurance (1)
  • Intelligent Personal Assistant (1)
  • Internet (2)
  • IoT (1)
  • Leadership (2)
  • Maker (1)
  • Monetization (3)
  • NFC (2)
  • Organization (1)
  • Passwords (7)
  • Payments (9)
  • People Management (4)
  • Podcast (2)
  • Privacy (43)
  • Privacy Coins (3)
  • Productivity (7)
  • Programming (2)
  • Project Management (1)
  • Remittances (1)
  • Risk Management (7)
  • Scoop.it (4)
  • Scripting (1)
  • Security (113)
  • SEO (2)
  • Side Chains (1)
  • Smartcontracts (1)
  • Social Media (5)
  • Software (3)
  • Stable coins (1)
  • Storage (1)
  • Technology (591)
  • Tokens (1)
  • Virtualization (1)
  • Voice Assistant (1)
  • Wallet (2)
  • Web Development (1)
  • Web Marketing (2)
  • Services
  • About Us
  • Quora
  • Flipboard
  • Paper.li Newspapers

©2007-2019 Secunoid Inc | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑