2008-12-18T18:15:27.885+00:00Many schools now have excellent IT facilities - usually including several desk top and laptop computers. A quick search on the internet for "laptop stolen from school" brings up many examples of when this has happened. Just one recent story is this one, describing a laptop theft from Muirhouse School.
"THIEVES have broken into yet another local school and stolen a laptop.You can take measures to reduce the impact of laptop theft from schools, such as increasing security, using locks to attach the computers to fixed objects, or ensuring that the building is alarmed.
During the latest break-in, which happened at Muirhouse Primary School, Motherwell, on Saturday afternoon, a window was smashed and the portable computer nicked from one of the classrooms."
2008-11-29T09:54:25.563+00:00Students are at high risk of laptop theft. A recent survey shows that almost 90% of students today own a laptop, however only a third of these are actually using their laptops portably. Around 66% of students refuse to bring their laptops onto campus, and the main reason for this is the risk of theft.
2008-10-05T10:34:46.028+00:00(image) We have now extended our range of maximum cover, cheap laptop and PC insurance products to cover Alienware computers.
2008-09-22T19:32:03.204+00:00The website for Cheap Laptop Insurance has been redesigned to be more user friendly, and make it easier for customers to choose the right laptop insurance policy.
The creators of the virus are after bank logins and personal data
Security experts are warning about a stealthy Windows virus that steals login details for online bank accounts. In the last month, the malicious program has racked up about 5,000 victims - most of whom are in Europe. Many are falling victim via booby-trapped websites that use vulnerabilities in Microsoft's browser to install the attack code. Experts say the virus is dangerous because it buries itself deep inside Windows to avoid detection.
The malicious program is a type of virus known as a rootkit and it tries to overwrite part of a computer's hard drive called the Master Boot Record (MBR). This is where a computer looks when it is switched on for information about the operating system it will be running. "If you can control the MBR, you can control the operating system and therefore the computer it resides on," wrote Elia Florio on security company Symantec's blog. Mr Florio pointed out that many viruses dating from the days before Windows used the Master Boot Record to get a grip on a computer.
Once installed the virus, dubbed Mebroot by Symantec, usually downloads other malicious programs, such as keyloggers, to do the work of stealing confidential information. Most of these associated programs lie in wait on a machine until its owner logs in to the online banking systems of one of more than 900 financial institutions.
The Russian virus-writing group behind Mebroot is thought to have created the torpig family of viruses that are known to have been installed on more than 200,000 systems. This group specialises in stealing bank login information. Security firm iDefense said Mebroot was discovered in October but started to be used in a series of attacks in early December.
Between 12 December and 7 January, iDefense detected more than 5,000 machines that had been infected with the program. Analysis of Mebroot has shown that it uses its hidden position on the MBR as a beachhead so it can re-install these associated programs if they are deleted by anti-virus software.
Although the password-stealing programs that Mebroot installs can be found by security software, few commercial anti-virus packages currently detect its presence. Mebroot cannot be removed while a computer is running. Independent security firm GMER has produced a utility that will scan and remove the stealthy program. Computers running Windows XP, Windows Vista, Windows Server 2003 and Windows 2000 that are not fully patched are all vulnerable to the virus.
2008-01-05T22:13:35.807+00:00If you were lucky enough to get a new laptop for Christmas, or purchased one at a cut price in the sales don' t forget to buy insurance.
2007-09-11T10:49:50.076+00:00By Brent MacLean Monday, September 10, 2007 Internet security is big news today and is growing at an exponential rate. According to the latest National Opinion Poll, as of January 2007, almost half of UK citizens still harbour a “deep mistrust” of the Internet due to security concerns. This does not include statistics from North America so I am sure the overall global numbers will indeed be quite alarming once available. The premise of ideas however is consistent.The House of Lords Select Committee on Science and Technology, meanwhile, is currently orchestrating a major enquiry into personal Internet security. Their Lordships observed wisely that “With the ever growing use of home computers, the spread of broadband, and the rise in internet banking and commerce the importance of proper internet security measures has never been greater.”How well equipped is our Government to combat the threat of cyber crime that currently exists? Response to the consultation has been extensive, and the Lords Select Committee has been hearing evidence since consultation closed in October 2006, from parties as varied as the Internet Service Providers Association, Richard Clayton of the Cambridge Security Lab, John Carr of the Children’s Charities’ Coalition on Internet Safety, Jonathan Zittrain of the Oxford Internet Institute and many speakers from commercial bodies such as eBay, as well as the ICO, OFT and DTI. Meanwhile the councils have been more concerned with the public aspects of cyber security. In the last few years we have seen a rash of communications from them on topics such as information system security, critical infrastructure protection and denial of service attacks. ENISA, the European information Security Agency established in 2004, is becoming increasingly active. Despite all this, most businesses and citizens in Europe did still not take the threat posed by cyber-insecurity seriously.Unsurprisingly, a program followed this damning summary quickly and a Draft Directive on Critical Infrastructure Protection announced at the end of 2006. The security and economy of the European Union as well as the well being of its citizens depends on certain infrastructure and the services they provide. The destruction or disruption of infrastructure providing key services could entail the loss of lives, the loss of property, a collapse of public confidence globally.At root here, of course, is the fear not of simple hacking by domestic criminals or bored teens, nor even of blackmail by gangs of Estonian extortionists, but, in the post 9/11 world, of serious terrorist activity directed at nuclear plants, hospitals, automated transport, air traffic control, banking systems and domain name servers: the catalogue of possible targets is endless. Accordingly, the Draft Directive proposes the designation of a European Critical Infrastructure which will receive special protection and attention. The Appendix blandly designates “The Internet” in its entirety as part of this ECI. When and if the Directive passes, it will be fascinating to see how the fairly onerous responsibilities of the Directive – e.g. the creation and implementation of an Operator Security Plan - can be applied to every part of the Internet, including small one man ISPs and universities, etc. – but that is a problem for later discussion.For now, the point of this article is that, in the realm of Internet security, the personal is also the public (an adaptation of the old feminist adage that the personal is political?) and that the two cannot, and should not, be separated if we are to attain the nirvana of a safe and secure critical infrastructure and Internet. Nor can consideration of personal security and privacy threats to consumers; usefully be separated from the home security practices of those same individuals. I[...]
2007-09-11T10:26:08.664+00:00Data theft is becoming an ever more pressing issue, even for advisers, but there are methods of reducing risk – Emily Freeman investigates.Around the world, there has been an epidemic of thefts of laptops and other mobile devices where the motive of the theft may not have been to sell on the hardware, but to access the information contained on the device.Sometimes the circumstances initially appear to be a straightforward burglary of an office, home, or motor vehicle. Sometimes the device or laptop is just lost or left in a hotel or at the airport. What may have originally been a straightforward physical crime or disappearance can change, if thieves realise the value of the information contained on the device. Such a circumstance has led to extortion attempts, in some cases, for the return of the hard drive of the computer once the thieves realise there is sensitive personal or corporate information that the owner would want returned. Some equipment has been stolen for the sole purpose of stealing the data held on it, as identity theft involves organised crime around the world.In the UK, there was the well-publicised matter in February 2007, involving the theft of a home laptop of a Nationwide Building Society employee which contained confidential customer data. The FSA levied a £980,000 fine after it came to light that the laptop contained information on nearly 11 million customers. Although at the time, there were no reports of identity fraud as a result of this incident, and the file did not contain PIN numbers, there may have been customer names, addresses and account numbers stored. Nationwide communicated to the affected customers concerning the security breach, but the FSA was concerned about the controls in place to prevent such an event from happening at all.In the US, an event like this would have had far greater consequences. Significant identity theft class action activity caused by the passage in more than 36 states, starting with California in 2003, of requirements to notify affected individuals, whether customers or potentially even employees, of potential security breaches involving unencrypted personally identifiable non-public information. This information includes name, address and social security number, or name and address associated with a driver's licence or account number. The costs of notification and mitigation can be in the millions.Notification costs involve not only mailing and public relations, but also legal advice, professional assistance through a call centre, free credit report and credit monitoring. Following a notification, issuing banks will seek reimbursement of costs associated with closing compromised credit cards. Finally, for publicly traded companies, there is the real possibility of a derivative shareholder action filed after the announcement of a large security breach and its impact on the brand and investors.From all indications, this US notification requirement is being considered seriously by the regulators in the EU, although financial services firms do notify their customers on a voluntary basis. The legal, regulatory and reputational risks of the data theft caused by a theft of a mobile device is a major concern for financial services companies, no matter where they are located. There are a number of risk management approaches to deal with the problem.It is important to establish a clear laptop security procedure for employees, independent contractors, vendors and business associates regarding storage of non-public personal information – either medical or financial – on mobile devices. Conducting security awareness training to make sure the procedure is understood and reinforced is wise. This aspect of the security programme should be included as part of internal and external audits.If such info[...]
For people at home or on the move, Fujitsu brings you a good all round laptop with Intel's dual core processor and Genuine Windows Vista® Home Premium. An 80Gb hard drive capacity and dual layer DVD rewriter means you can store more of your favourite DVDs and music. Watch them over and over again on your bright 15,4’’ wide screen. With 4 USB connections you can connect your printer, camera, MP3 player and much more.
With the Sony Vaio N31 Laptop featuring a powerful Intel Core 2 Duo processor and with Genuine Windows Vista (R) Home Premium installed, you can experience breakthrough mobile capabilities. The styilsh 15.4'' X-Black LCD widescreen display is perfect for watching your favourite movies and photos. The impressive 1GB memory (RAM) is enough to run Genuine Windows Vista (R) Home Premium without any performance issues, and running multiple applications at the same time poses no problem. The 100GB hard drive is plenty of storage for video, music and photos. So, if you want a top brand laptop that is built for performance, then this Sony is perfect.
One of the leading manufacturers of ace laptops is Sony. It has introduced a series of laptops in its VAIO family - the Sony VAIO N31S/W being one of the best models in the series. The Sony VAIO N31S/W comes with a stylish look with enhanced features concealed inside. The gadget is equipped with the powerful Window Vista and Intel Core 2 Duo
2007-09-06T07:46:12.369+00:00BBC NEWS Technology Apple overhauls entire iPod line
2007-09-01T10:14:41.022+00:00Features for this ADVENT 7203 - Intel Core 2 Duo Processor T5300 - 1.73GHz, 533MHz FSB, 2MB Cache - Genuine Windows Vista (R) Home Premium - 1GB Memory - 80GB Hard Drive - DVD ReWriter MultiDrive - 15.4" Widescreen Display - 128MB Shared Graphics - Wireless Enabled - Up to 3 Hours Battery Life Specification for this ADVENT 7203 Processor Type Intel Core 2 Duo T5300 Processor speed 1730 mhz Memory Size 1024 MB Memory Type DDR II Hard Drive Capacity 80 Gb Optical Drives DVD Super Multi Dual Layer CD-ROM Speed 24 x CD-RW Speed. 24 x DVD-ROM Speed 8 x DVD-RW Speed 8 x Screen Size/Type 15.4" WXGA Graphics Card Type Integrated Graphics Memory Up to 128 MB Sound Type AZALIA Modem Type 56kbps Wireless Enabled Yes No. of USB Connections 4 No. of Firewire Connections 1 Other Interfaces 3945 ABG Battery Type Li-Ion Battery life (up to) 3 hours Operating system Windows Vista Premium Weight 2.7 kg Height 352 mm Width 355 mm Depth 254.5 mm Colour Black/Silver[...]
2007-08-31T18:38:03.323+00:00Cheap Medion Widescreen Laptop with Windows Vista Home Basic Was: £399.99 Save: £100.00 Now: £299.99 Featuring Genuine Microsoft Vista Home Basic and an Intel Celeron Mobile processor, this slick Medion Multimedia Wireless Notebook boasts loads of space for storing music and photos, plus a dual-layer DVD re-writer.FeaturesIntel Celeron M Processor 410A15.4" 16:10 Widescreen display512MB DDR II memory 80GB hard disk drive Multi-format dual layer DVD writer/re-writer Built-in wireless networking (802.11g/b)VIA Chrome9 HC DirectX 9 graphicsHigh definition audio with 16-bit sound chip & 2 integrated stereo speakers Built-in microphone 4 USB 2.0 portsSoftware Included:Windows Vista Home BasicCorel Word Perfect Office X3NERO Burning ROM 7 EssentialsBullguard Internet Security Pack (90 days free)[...]