Loading...


Internet Security Directory
ComputerWorld: Defensive Computing

-

ComputerWorld - Defensive Computing: Software bugs as weapons

Votes:23 Comments:0
By Michael Horowitz July 16, 2013 Two recent stories described the expanding use of software flaws/bugs as weapons. Click the URL above to read the full article READ MORE
http://blogs.computerworld.com/malware-and-vulnerabilities/22481/softw...

ComputerWorld - Defensive Computing: How useful is antivirus software?

Votes:20 Comments:0
By Michael Horowitz June 23, 2012 It goes without saying that antivirus software can't catch everything. But, does it catch 10% or 90% of the malware targeted at Windows users? Click the URL a READ MORE
http://blogs.computerworld.com/security/20580/how-useful-antivirus-sof...

ComputerWorld - Defensive Computing: Five approaches for defending a Windows PC ...

Votes:21 Comments:0
June 21, 2011 by Michael Horowitz A couple news stories here at Computerworld reminded me of some previously offered Defensive Computing suggestions. Click the URL above to read the full articl READ MORE
http://blogs.computerworld.com/18506/taking_stock_of_defensive_computi...

ComputerWorld - Defensive Computing: Sandboxie offers spear phishing protection

Votes:17 Comments:0
April 8, 2011 by Michael Horowitz Mere hours after writing here about the Epsilon data breach, how it may lead to spear phishing and why spear phishing is more dangerous than normal phishing, come READ MORE
http://blogs.computerworld.com/18098/sandboxie_offers_spear_phishing_p...

ComputerWorld - Defensive Computing: Internet Explorer bug? Yawn.

Votes:17 Comments:0
December 23, 2010 by Michael Horowitz Today (December 23, 2010) at Computerworld, Gregg Keizer writes "Microsoft late Wednesday confirmed that all versions of Internet Explorer (IE) contain a crit READ MORE
http://blogs.computerworld.com/17583/internet_explorer_bug_yawn

ComputerWorld - Defensive Computing: Defending an operating system

Votes:19 Comments:0
January 2, 2012 by Michael Horowitz I recently spent hours setting up a new Windows 7 laptop computer; removing pre-installed software, installing new software (IrfanView, Chrome, 7-Zip, etc.), tw READ MORE
http://blogs.computerworld.com/19499/defending_an_operating_system

ComputerWorld - Defensive Computing: Test your defenses against malicious USB fl...

Votes:20 Comments:0
January 24, 2009 by Michael Horowitz The latest malicious software to spread to untold millions of computers goes by the names Downadup and Conficker. Computerworld's Gregg Keizer calls its spread READ MORE
http://blogs.computerworld.com/test_your_defenses_against_malicious_us...

ComputerWorld - Defensive Computing: Why the bad guys are winning

Votes:7 Comments:0
June 1, 2011 by Michael Horowitz There was a show on CNBC recently about cyber threats. The show was pretty much what you would expect when an organization ventures away from its core competence. READ MORE
http://blogs.computerworld.com/18387/why_the_bad_guys_are_winning

ComputerWorld - Defensive Computing: 12 reasons not to use Internet Explorer, ev...

Votes:3 Comments:0
June 30, 2011 by Michael Horowitz Despite being mainly a Windows user, Internet Explorer is dead to me. Has been for ages. Aesthetics and speed have nothing to do with it. I split my time betwe READ MORE
http://blogs.computerworld.com/18552/12_reasons_not_to_use_internet_ex...

ComputerWorld - Defensive Computing: Defending a Wi-Fi network

Votes:10 Comments:0
July 17, 2011 by Michael Horowitz Promoting Defensive Computing is like nagging children to eat their vegetables. So, when a story hits the news with details of the absolute worst case scenario, i READ MORE
http://blogs.computerworld.com/18636/defending_a_wifi_network

ComputerWorld - Defensive Computing: Defending against malicious CDs and USB fla...

Votes:31 Comments:0
July 3, 2011 by Michael Horowitz Not long ago the Department of Homeland Security repeated a test that has been written about before. According to Bloomberg, they dropped CDs and USB thumb drives READ MORE
http://blogs.computerworld.com/18560/defending_against_malicious_cds_a...

ComputerWorld - Defensive Computing: The best defense against software problems:...

Votes:3 Comments:0
April 19, 2009 by Michael Horowitz My previous posting discussed various approaches to dealing with a Windows computer that's been infected by malicious software (malware). The easy approach, i READ MORE
http://blogs.computerworld.com/the_best_defense_against_software_probl...

ComputerWorld - Defensive Computing: Traveling? Pack a router

Votes:19 Comments:0
May 20, 2009 by Michael Horowitz If you are traveling with a laptop or netbook, you'll be better defended if you also pack a travel router. Routers perform multiple functions, the defensive comput READ MORE
http://blogs.computerworld.com/traveling_pack_a_router

ComputerWorld - Defensive Computing: Removing malware is best done from the outs...

Votes:35 Comments:0
July 26, 2009 by Michael Horowitz A few days ago, at WashingtonPost.com Brian Krebs blogged about businesses that had money stolen from them courtesy of malware on their computers. One of the c READ MORE
http://blogs.computerworld.com/removing_malware_is_best_done_from_the_...

ComputerWorld - Defensive Computing: Are you competent to run Windows safely?

Votes:8 Comments:0
August 14, 2009 by Michael Horowitz I recently wrote about defending a Windows computer from the Clampi Trojan. Much of the advice, like disabling autorun, was pretty standard stuff. But, taken as READ MORE
http://blogs.computerworld.com/14551/are_you_competent_to_run_windows_...

ComputerWorld - Defensive Computing: Don't be tricked into uninstalling MalwareB...

Votes:37 Comments:0
September 4, 2009 by Michael Horowitz Tom Kelchner at Sunbelt Systems reports on malicious software (the Protection System "rogue") that issues a phony alert trying to trick a Windows user into un READ MORE
http://blogs.computerworld.com/14668/dont_be_tricked_into_uninstalling...

ComputerWorld - Defensive Computing: Defensive computing priorities

Votes:40 Comments:0
December 19, 2009 by Michael Horowitz Some recent dealings with non-techies reminded me how focused they are on antivirus (really anti-malware) software. This is a shame, if not a sham. Of course READ MORE
http://blogs.computerworld.com/15280/defensive_computing_priorities

ComputerWorld - Defensive Computing: Defending against drive-by downloads

Votes:34 Comments:0
February 26, 2009 By Michael Horowitz View a web page, get infected with malware. Websense Security Labs recently reported that eWeek.com, the website of the computer magazine, was hosting mali READ MORE
http://blogs.computerworld.com/defending_against_drive_by_downloads

ComputerWorld - Defensive Computing: Different approaches to removing malware

Votes:7 Comments:0
April 16, 2009 By Michael Horowitz Malware (malicious software) seems to be getting worse. No surprise, since there's big money in it as a recent article in the Wall Street Journal pointed out: h READ MORE
http://blogs.computerworld.com/different_approaches_to_removing_malwar...

ComputerWorld - Defensive Computing: Be prepared to remove the hard drive from a...

Votes:29 Comments:0
April 14, 2009 by Michael Horowitz If you are shopping for a laptop computer let me suggest that being able to easily remove the hard drive should be an absolute requirement. Perhaps the best way READ MORE
http://blogs.computerworld.com/be_prepared_to_remove_the_hard_drive_fr...

ComputerWorld - Defensive Computing: The down side of automated backups

Votes:19 Comments:0
December 26, 2011 by Michael Horowitz The last place you would expect to hear anything negative about backing up files, is a blog on Defensive Computing. Yet here we are. Click the URL above to READ MORE
http://blogs.computerworld.com/19486/the_down_side_of_automated_backup...

ComputerWorld - Defensive Computing: Removing malware from an infected PC - batt...

Votes:39 Comments:0
January 17, 2009 by Michael Horowitz As a consultant, I'm occasionally called on to remove malicious software (malware) from infected Windows computers. A recent case offered a stark example of so READ MORE
http://blogs.computerworld.com/battling_antivirus_programs

ComputerWorld - Defensive Computing: What you don't know about the Windows Malic...

Votes:7 Comments:0
February 5, 2009 by Michael Horowitz Microsoft's Windows Malicious Software Removal Tool (MSRT) is a free program that removes a whole host of the most popular malicious software (malware). Many W READ MORE
http://blogs.computerworld.com/what_you_dont_know_about_the_windows_ma...

ComputerWorld - Defensive Computing: Backing up your computer: How about the app...

Votes:30 Comments:0
November 4, 2009 by Michael Horowitz When it comes to backing up a computer, what most people think of, copying files, is somewhat limited. Copying data files is fine, as far as it goes, but a run READ MORE
http://blogs.computerworld.com/15042/backing_up_your_computer_how_abou...

ComputerWorld - Defensive Computing: Spear phishing evolves

Votes:24 Comments:0
March 6, 2010 by Michael Horowitz First came phishing, targeted at the masses. Then came spear phishing, targeted at executives and other employees in possession of trade secrets. Click the READ MORE
http://blogs.computerworld.com/15705/spear_phishing_evolves

ComputerWorld - Defensive Computing: Thinking about backup

Votes:35 Comments:0
March 14, 2010 by Michael Horowitz Leo Notenboom is the man behind Ask-Leo.com. I've been reading his site/newsletter for a long time and highly recommend it. Recently, Leo took a 3 week trip h READ MORE
http://blogs.computerworld.com/15746/thinking_about_backup

ComputerWorld - Defensive Computing: Don't click that link, but if you do...

Votes:13 Comments:0
April 11, 2010 by Michael Horowitz Here, briefly, are two more issues that belong in the non-existent User Guide to the Internet. Issue one: You can't trust Google search results. Any time a READ MORE
http://blogs.computerworld.com/15907/dont_click_that_link_but_if_you_d...
Computer World Defensive Computing blogs
Internet Marketing in Indiana , Internet Marketing in New Jersey
-
Search
Search
Search
Search
Login
Privacy Policy