Volume 2 Number 5 May 2009.
Rogue (Fake) Anti-Virus Software: How to Spot It & Avoid It!*
From the Desk of David Badertscher
Volume 2 Number 5 May 2009.
Rogue (Fake) Anti-Virus Software: How to Spot It & Avoid It!*
From the Desk of David Badertscher
http://www.msisac.org/April 2009 Volume 2 Number 4.
From the Desk of David Badertscher
The use of credit cards to pay for goods and services is a common practice around the world. It enables business to be transacted in a convenient and cost effective manner. However, more than 100 million personally-identifiable, customer records have been breached in the US over the past two years[1]. Many of these breaches involved credit card information. Continued use of credits cards requires confidence by consumers that their transaction and credit card information are secure. The following provides information as to how the credit card industry has responded to security issues and steps you can take to protect your information.
March 2009 Volume 2 Number 3.
Social Networking Sites: How To Stay Safe
From the Desk of David G. Badertscher
Book Review by David Badertscher*
March 6, 2009.
The Oxford Companion to International Criminal Justice
From the ABA Criminal Justice Section: http://www.abanet.org/crimjust
United States v. Hayes (No. 07-608)
“The court released an opinion regarding the prohibition on possession of a firearm by convicted felons to include persons convicted of a misdemeanor crime of domestic violence. Police officers discovered a rifle in respondent Hayes’s home. Hayes was charged with possessing firearms after having been convicted of a misdemeanor crime of domestic violence. He was previously convicted for battery in 1994 against his then-wife. Hayes moved to dismiss the indictment on the ground that his past conviction did not qualify as a predicate offense because West Virginia’s generic battery law did not designate a domestic relationship between aggressor and victim as an element of the offense. When the District Court denied the motion, Hayes entered a conditional guilty plea and appealed. The Fourth Circuit reversed, holding that a ยง922(g)(9) predicate offense must have as an element a domestic relationship between offender and victim.”
February 2009 Volume 2 Number 2.
CLLB Information Security Newsletter
Monthly Cyber Security Tips NEWSLETTER
January 2009 Volume 2 # 1
Challenge or Secret Questions
From the Desk of David Badertscher
“What happens to your mission-critical… application source code should the vendor go bankrupt? This is when you need a Technology Escrow service.Tech Escrow requires vendors to deposit source code into an account held by a third party agent to ensure ongoing accessibility of the software. Recent research by IDG research Services highlights some recent trends and gaps in coverage, making the case for Technology Escrow.”
See: How to Minimize Risk with a Software Vendor ‘Prenup’ Paper by Digital Iron Mountain under sponsorship of IDG Research..
November 2008 Volume 3, Issue 11
MAIN TOPIC:
Internet Shopping โ How to Enhance Your Security Online