Archive | IT Risk and Security

RSS feed for this section
3d computer servers in perspective

Location, location, location!

It’s the number one rule in real estate: Location, location, location! What it means is identical homes can increase or decrease in value based on… more...
Read full story Comments { 0 }
Toll Fraud Photo

Toll Fraud

According to Government Security News earlier this year Senator Charles Schumer (D-NY) announced that a phone hacking ring with ties to Al Qaeda-related groups in… more...
Read full story Comments { 0 }
Java 7 update now available from Oracle

Java 7 update now available from Oracle

Last week a critical security vulnerability was discovered within Oracle’s popular Java 7 Runtime Environment (JRE), affecting Java 7 Update 10 in addition to all… more...
Read full story Comments { 0 }
pic-3-rick-paine

Phone fraud rears its ugly head

Let’s not mince words: phone fraud is expensive and wastes everyone’s time. But, it can be avoided. Blocking International toll calling is a great place… more...
Read full story Comments { 0 }
phone

What is Voice Mail Fraud?

A hacker calls into a voice mail system and searches for voice mailboxes that still have the default passwords active or have passwords with easy… more...
Read full story Comments { 0 }