An ode to open source and freeware developers

If the sharing of software wasn’t enough, open source developers also share their source code. It’s time we start appreciating what they have done for the IT industry.

Continue reading

An unusual bring your own device story

Security professionals have often cautioned organizations who allow their employees to bring their own mobile devices and then plug them into the network.

Continue reading

Who is this man-in-the-middle?

Man-in-the-middle (MITM) attacks are everywhere. If you’re a security professional you’re surely very well acquainted with them and if you’re just starting out this won’t be the last time you hear of MITM attacks.

Continue reading

Cybersecurity awareness: a waste of time?

We spend a lot of time talking about patch management, vulnerabilities and policies, yet we seldom talk about an important aspect of security; the people on your network.

Continue reading

Profitable Hacking

There are many reasons why people start hacking. Some do it for the thrill; others do it as a learning experience. Some do it for money. So how do hackers make their money?

Continue reading

The Pitfalls of Interpreting Vulnerability Data

There is no way to determine a platform’s security based on raw data, as that data needs to first be put into context, applied to a scenario, and interpreted

Continue reading

The Secret Question Threat

At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.

Continue reading

Android – The new battleground for software vulnerabilities

With over 1 billion Android devices activated, the platform’s popularity has inevitably caught the attention of malware creators. In some cases, mobile phones pose a greater security risk than a desktop computer.

Continue reading