University of Southern California

Monthly Archives: September 2013

Using Social Media Safely: Geotagging

Posted on by mbordas

When many digital cameras and smartphones snap a photo or record video, they append information about that photo or video to the digital file. This information, called exchangeable image file format (Exif) data, can include technical details about the camera … Continue reading

Posted in Education, Social Networking | Tagged , ,

Zero-Day Vulnerability in Internet Explorer

Posted on by mbordas

On September 17, Microsoft published an emergency security advisory and “Fix it” solution to address a zero-day vulnerability affecting all supported versions of Internet Explorer. (Zero-day vulnerabilities are those that exploit previously unknown vulnerabilities and for which there is no … Continue reading

Posted in Security Updates | Tagged ,

Using Social Media Safely: Previewing Shortened URLs

Posted on by mbordas

Users of social networking sites and apps often take advantage of URL shortening services, such as tinyURL, Bitly, or goo.gl, to make long, unwieldy website addresses more manageable. While these services can be convenient, they can present a security risk … Continue reading

Posted in Education, Social Networking |

Patch Tuesday Roundup for September 2013

Posted on by mbordas

Today is Patch Tuesday for September 2013. Microsoft released thirteen security bulletins, four of which are considered critical. The bulletins include fixes to vulnerabilities in a range of products including Windows, the Office suite, Outlook, and all supported versions of … Continue reading

Posted in Patch Tuesday, Security Updates |

The Danger of Default Passwords

Posted on by mbordas

Many Internet-connected devices and services, such as routers, webcams, and databases, initially come with default usernames and passwords to allow new users to easily log into and configure a product. Many people neglect the important step of changing the default login information, leaving them vulnerable to cyber attack. … Continue reading

Posted in Password Security | Tagged