Destroying Data the Cheap and Easy Way

Screen shot 2010-10-13 at 2.41.16 AM

I walked by our local computer repair shop on the way to lunch yesterday and ran across a couple of kids taking customer privacy seriously. Instead of perusing personal data, like some repair shop employees do, these guys shatter hard drives that are left behind when customers upgrade their hard drives. I told these guys […]

Google Adds More Security for Mobile Google Apps Users


Aiming to make Google Apps and Google’s version of Cloud Computing even more attractive to the Enterprise sector, Google is rolling out an extra layer of security that is geared towards easing security concerns in those who have to manage those issues. Essentially the way this works is that in addition to having a password, […]

Fixes for Facebook/AT&T Issue and Novatel MiFi

There is news on two recent security issues we’ve reported on. First up, AT&T has supposedly corrected the issue that found Facebook users logging into other users’ accounts when using their mobile phones. More details here. While there isn’t a patch yet, Novatel is promising a fix is coming for the security hole recently discovered […]

Novatel MiFi Exploit Gives Up Data

It is no secret that many of us on the GBM Team love the Novatel MiFi card. We’ve got several members who use and rely on these handy mobile hotspots in both the Verizon and Sprint flavors. Well, we’ll be keeping our eyes peeled for a firmware update, hopefully soon, after news of a security […]

How to Secure and Recover Your Gmail and Google Apps Accounts


Amit Agarwal of Digital Inspiration lived through a cloud computing nightmare and survived to blog about it. Last week someone hacked into his GMail and Google Apps account, which meant they had access to just about everything in his personal and business digital life. Luckily, he had some contacts at Google that helped him regain […]

Check your webmail accounts

Just this morning, I’ve had to deal with one hacked webmail account, received word of another, and heard from a trusted source that a security-oriented agency held impromptu meetings about webmail passwords today. Not saying that adds up to something big, but there’s a little too much coincidence here for me to dismiss. The problem […]

GBM Poll: How Often Do You Change Your Password?


The other day I dropped a computer off at the local repair shop because it was under warranty.  After verbally asking for my contact information and email address, the attending technician asked, “What’s the password on this machine?”  I answered audibly, without considering who was around me.  There were at least two other people within […]

Microsoft Addressing UAC Concerns in Release Candidate

Well, it appears the Windows 7 chiefs are listening and have posted an update to their UAC article from earlier today. In their latest communication, Steven Sinofsky   and Jon DeVaan say: With this feedback and a lot more we are going to deliver two changes to the Release Candidate that we’ll all see. First, […]

Micosoft Takes On the Elephant In the Room: Windows 7 and UAC

Much has been written about Long Zheng’s and Raphael Riviera’s reporting on UAC “vulnerabilities”. Up until today, Microsoft has not said much on the subject. On the Engineering Windows 7, Microsoft’s Jon DeVann takes the issue head in a very lengthy post – well worth reading….more below.

Data Locker

This is the Data Locker Pro AES, a platform independent portable hard drive with 256 bit hardware AES encryption.

Remotely Disable a ThinkPad With a Text Message

Lenovo has added a new feature to their ThinkPads that allow it to be remotedly disabled in the event that the laptop / tablet pc becomes stolen – simply by sending a text message to WWAN phone number for the laptop. This is a great thing for IT shops needing maintain better control over their […]

Experts Advise Caution Because of Exploit in Internet Explorer


I’m seeing a lot of reports on this Internet Explorer exploit this morning so here’s sort of a public service announcement. Apparently Microsoft is acknowledging a severe exploit in IE (all versions of the browser) and some security experts are advising that you use another browser until the hole is plugged. The BBC is carrying […]

Lost That Computer? How About a GPS Kill Switch?


I’m sure this kind of security approach will come in handy for some in the enterprise world and also some consumers. Ericsson and Intel are working on a GPS based anti-theft technology by focusing on compatibility between Ericsson’s Mobile Broadband Modules and Intel’s Anti-Theft PC Protection Technology.

AVG Users Take Note: Error Removes Windows System Files


If you are an AVG user (7.5 or 8.0) you need to do an update right away. Yesterday an update that was released recognized a Windows XP system file (user.dll) as a virus and recommended deleting the file. If the file did get deleted you would not be able to boot up and have to […]

Laptop Security Tips

Lifehacker is featuring an excellent how-to that demonstrates the steps necessary to secure and protect your laptop.  Their tips are broken down into the following phases: Phase One: Lock and Key This phase discusses ways to physically protect your machine from being stolen. Phase Two: Alarms and Security Cameras How to keep an eye on […]

Are SSDs A Bigger Security Risk?

Interesting article in ComputerWorld about the increased security risks of Solid-state drives (SSDs). According to some experts they aren’t as secure as their spinning cousins. The jist is that they have no phyiscal security hooks making them relatively easy for a hacker to remove them, and then read the data using a flash chip programmer. […]

Sybase Announces Support of Panasonic Toughbook U1

Sybase iAnywhere announced today that they’ll provide full support for the Panasonic Toughbook U1, the new rugged ultra-low-small PC. Sybase iAnywhere Afaria a core component of the Information Anywhere suite, provides comprehensive management and security capabilities to ensure that mobile data and devices are up-to-date, reliable and secure.” Fundamentally more of an IT application, but […]

GottaBeSecure: WiFi vs. Mobile Broadband

If you read my weekly GottaBeSecure articles, you’ll know that WiFi security is one of my favorite topics. Many people ask me, however, whether cell phone data cards (AKA mobile broadband or air cards) are any more secure? Assuming you’re worried about your average black hat hacker or your snooping next door neighbor, the answer […]

All About AuthenTec and Fingerprint Technology

I remember when Tablet PCs first rolled out five years ago, we were all using pc card based fingerprint readers. Nowadays, integrated fingerprint readers have become standard features in Tablet PCs, and are quickly making their way into other mobile devices like phones, peripherals, etc. In addition, they are being used for more than just […]