Storing Card Numbers Unencrypted – REALLY?

The US Federal Trade Commission has sued Wyndham Worldwide and three of its subsidiaries for poor data security, it was announced in late June. To be clear this is a lawsuit and it is not a statement of guilt. As of this writing Wyndham has not agreed to any of the items in the suit. […]
Read More ›

Hackers in the Media

I was looking at the Prezi site today (and you should too, if you give presentations) and I found this:  Hackers in the Media. The creator is Molly Sauter of the Center for Civic Media at MIT. You should watch it for two reasons: 1) it does a fantastic job of examining how the media […]
Read More ›

Internet Crime Help From Uncle Sam

One of the more interesting places to get information about crime on the Internet is the Internet Crime Complaint Center at www.ic3.gov. According to their site  the IC3 “was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) to serve as a means to receive […]
Read More ›

Exploit vs. Antivirus: It’s No Contest

In a recent blog, we talked about the recent Java vulnerability and how it was still kicking around.  The flaw has been identified as CVE-2012-0507 in the Common Vulnerabilities and Exposures database.  You might be thinking that you are still safe, as you have antivirus.  Let’s find out how well it protects you. As of […]
Read More ›

Encrypt Early, Encrypt Often

My last post was about malicious update notices that pop up when using public network connections. I advised checking digital signatures on the updates. I want to add to that and expand a bit on public communication channels and storage. First, when you use a public network, wired or wireless, your data may not be […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.