Indented Quotes and Images – beautiful

/
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean…

Information Privacy Issues with People Search Websites: What can you do to protect yourself?

/
At one time, when you wanted to know something about someone you would use a search engine like Google or Yahoo, but that is not the case anymore. There are hundreds of websites with your personal information listed that will provide your information to someone for a fee and some even for free. Many people always ask, “How did my information get on this site?”, and I often state, “You put it there.” Maybe not directly, but through various online activities such as Facebook and Twitter updates as well as signing up to purchase items online. All of that information is eventually collected and stored in some company’s database.

Feb Edition of Hackin9 – Network Security

/
Another exciting edition of Hackin9 is out and you can download it here. Information about this edition is located below: · Wuala – Secure Online Storage There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from LACIE may have something unique in the way their solution works.

Parents’ Internet Monitoring Study by NetSmartz.org

/
NetSmartz is a very informative site geared towards aiding with the awareness efforts on how to better protect our kids while online. They have an excellent collection of data pertaining to how bad the situation is on the gap between parents understanding what their teens are doing online below:

Teen Internet Safety Statistics from NetSmartz.org

/
Teen Internet Safety Study A survey commissioned by Cox Communications and NCMEC2 found that Teen Internet Usage and Attitudes about Safety Present Potential Risks but also Opportunities for Education and a Role for Watchful Parents and Guardians

Cyber-Bullying Overview and Information

/
Cyber-bullying uses the new forms of digital communication technologies to repeatedly harass others. A cyber-bully is someone who uses technology to harass, embarrass, intimidate, or stalk someone else. The methods used can include emails, instant messaging, text-messages, digital photos and all other means of electronic communications.

Another title for our pretty cool blog

/
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean…

CEIC 2011

/
CEIC is one of the largest international gatherings of legal, IT, law enforcement, and government attendees that focus on the latest developments in the digital investigations field. Industry experts, decision-makers and influencers attend CEIC year after year for a high-quality educational program and valuable networking opportunities.

RSA Conference USA 2011

/
RSA Conference 2011 proudly brings the industry’s best and brightest together to celebrate its 20th anniversary. Join us as we honor the giants of the past and look toward the future.

14th Annual New York State Cyber Security Conference

/
The 2011 Conference is co-sponsored by the NYS Division of Homeland Security and Emergency Services Office of Cyber Security (OCS), the New York State Forum, Inc. and the University at Albany's School of Business and College of Computing and Information. OCS's experience with leading and coordinating New York State's cyber security efforts and the University's academic excellence in information assurance combine to make this a must-attend event.