George C. Dimitriou

Technology and Strategy Consulting
Subscribe

Archive for the ‘Security’

The growing world of cyber security

March 08, 2016 By: George Category: Security No Comments →

The-growing-world-of-cyber-security-11-1160x848

Security and the Internet of Things.

June 23, 2015 By: George Category: Security No Comments →

Security and the Internet of Things
Source: ComputerScienceZone.org

Safe Coding and Software Security.

March 23, 2012 By: George Category: Digital World, Security No Comments →

The need for secure application coding is greater than ever. This Veracode infographic represents anonymized data from billions of lines of code submitted for analysis by large enterprises, commercial software providers, open source projects, and software outsourcers in Veracode’s cloud-based application risk management services platform.

Secure Coding and Software Security

Infographic by Veracode Application Security

Mobile Security – Android vs. iOS.

February 04, 2012 By: George Category: Digital World, Security No Comments →

This informative infographic compares and contrasts the security features of Apple and Android products (provided by Veracode).

Android vs iOS infographic

Infographic by Veracode Application Security

Report on Internet Crime in the USA Released.

March 14, 2010 By: George Category: Digital World, Security No Comments →

The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), released the 2009 annual report about fraudulent activity on the Internet.

Online crime complaints increased substantially once again last year, according to the report. The IC3 received a total of 336,655 complaints, a 22.3 percent increase from 2008. The total loss linked to online fraud was $559.7 million; this is up from $265 million in 2008.

Year Complaints Received Dollar Loss
2009 336,655 $559.7 million
2008 275,284 $265 million
2007 206,884 $239.09 million
2006 207,492 $198.44 million
2005 231,493 $183.12 million

The 2009 Internet Crime Report details information related to the volume and scope of complaints, complainant and perpetrator characteristics, geographical data, most frequently reported scams and results of IC3 referrals.

The report is posted in its entirety on the IC3 website.

How Unique and Trackable Is Your Browser?

January 31, 2010 By: George Category: Digital World, Security No Comments →

Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies.

Panopticlick, a research project of the Electronic Frontier Foundation tests your browser to see how unique it is based on the information it will share with sites it visits.

Detailed Analysis of 32 Million Breached Consumer Passwords.

January 21, 2010 By: George Category: Security No Comments →

Imperva, a Data Security firm, announced today the release of study analyzing 32 million passwords recently exposed in the Rockyou.com breach. Imperva’s Application Defense Center (ADC) analyzed the strength of the passwords in a report, Consumer Password Worst Practices, that analyzes 32 million passwords to help consumers and website administrators identify the most commonly used passwords they should avoid when using social networking or e-commerce sites.

The report can be downloaded at: http://www.imperva.com/ld/password_report.asp

The report identifies the most commonly used passwords:

  1. 123456
  2. 12345
  3. 123456789
  4. Password
  5. iloveyou
  6. princess
  7. rockyou
  8. 1234567
  9. 12345678
  10.   abc123