Etienne A. Gibbs

Etienne A. Gibbs

Born on the island of St. Thomas in the US Virgin Islands, Etienne A. Gibbs, MSW, became an Internet Safety Advocate and Educator after his personal computer was infected by a hacker, virus, or spyware. Now his mission is to help educate others about the dangerous side of surfing the internet.

back to homepage

Etienne A. Gibbs Free Articles

Living in the Age of the Internet Gangster, Part Three of Three: Sleeping with the Phishes . . .

One of the newest phishing trends to emerge has almost everybody in the security industry concerned: Trojan phishing. So-called Trojan programs, named after the horse of mythology that put the Greeks inside Troy's city walls, disguise themselves as beneficial files, but actually enable hackers to gain access to computers from remote locations to steal account information directly from a computer.

Read More

Living in the Age of the Internet Gangster, Part Two of Three: An Evolution of Professional-class ..

Members of the hacker community throughout that region now are adapting to take advantage of the latest phishing scams. As a natural transition is taking place, "phishing" is the term applied to online schemes that attempt to lure people into giving up sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy sources.

Read More

Living in the Age of the Internet Gangster (Part One of Three): Following a Basic Business Model

Over the past several years, Internet security firms have discovered strong connections to gangs in Eastern Europe that have worldwide reach and operate with seeming impunity. Today's Internet criminals have extended the turf of what law-enforcement agencies have traditionally called the Mafia.

Read More

Your Child's First Year at College: Prime Target for Identity Theft?

If your son or daughter is a recent high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is easy and highly profitable.

Read More

Cybercriminals Use Keylogging Software to Steal Your Passwords Secretly

The keylogging programs are often hidden inside ordinary software downloads, e-mail attachments, or files shared over peer-to-peer networks. Because they can be embedded in webpages, they take advantage of browser features that allow programs to run automatically.

Read More

Criminals Flock to the Internet and to a Computer in Your Home or Business

Criminals are increasingly trying to trick citizens into giving them their bank account details, according to a published survey which showed such "phishing" attempts almost doubled in the first six months. Over 157,000 unique phishing messages were sent out around the world in the first half of 2006, an increase of 81 percent compared with the six-month period to end-December 2005.

Read More

Are Predators Waiting, Watching, and Engaging on Your Child's Social Networking Sites?

Skillful with their cell phones, instant messaging accounts, and with access to personal computers at home and school, young people are easy targets for sexual predators. Too many of them are ready and willing to share personal information online without a thought to how it might be misused by others.

Read More

A Five-Step Plan to Help You Stay Ahead of Computer Security Attacks, Risks, and Threats, Part Five

Vulnerability scans are used to scan desktops, servers, and networking gear for compliance to corporations' security policies. Then the resulting information is used to improve security measures. Some corporations check for gaps in several key areas including system security configuration settings, security patches, antivirus status, personal firewall status, and industry-known vulnerabilities.

Read More

A Five-Step Plan to Help You Stay Ahead of Computer Security Attacks, Risks, and Threats, Part Four

In response to a Level 1 incident, the manager of the resources involved is instructed to cease use of the resources until the bank's incident response coordinator makes contact and provides further instruction.

Read More

A Five-Step Plan to Help You Stay Ahead of Computer Security Attacks, Risks, and Threats, Part Three

An alert that reaches full-blown incident status triggers an organization's response plan-assuming it has one. Security experts say large enterprises typically do maintain some type of formal response plan, though incident response varies widely.

Read More

A Five-Step Plan to Help You Stay Ahead of Computer Security Attacks, Risks, and Threats, Part Two

Security information and event management software rolls up alerts from firewalls and intrusion-detection/protection systems, along with event data from antivirus products, databases, Web servers and elsewhere. It offers two tracks to get to the source.

Read More

A Five-Step Plan to Help You Stay Ahead of Computer Security Attacks, Risks, and Threats, Part One

I have put together five steps that you can take under consideration when evaluating your home or business computer systems. These steps will be presented in five parts.

Read More

Don't Let Hackers Turn Your Computer into a Zombie

Today millions of businesses and homes have implemented wireless networks for their convenience, and, sadly, for the convenience of the cybercriminals. And hackers don’t even have to open your garage door to enter your home or business.

Read More

Twenty Reasons for Taking a Mexican Vacation

Going away on a vacation brings numerous benefits. It refreshes our enthusiasm, helps us to know ourselves a little better, and makes us, upon our return home, happier, healthier, and much more effective in coping with stress. The key to reaping the benefits of traveling is in the going away. Hardly anyone reaps a benefit from spending a vacation time at home to work around the house.

Read More

What Every Employee Should Know About Taking the Initiative

Taking the initiative to get the job done can make a marked improvement in your performance and productivity, especially when you demonstrate it in partnership with your supervisor. Just be aware that most supervisors welcome constructive ideas and suggestions from their supervisees; however, some resent it, even fear it, because they do not know how to handle it.

Read More