Profitable Hacking

There are many reasons why people start hacking. Some do it for the thrill; others do it as a learning experience. Some do it for money. So how do hackers make their money?

Continue reading

The Pitfalls of Interpreting Vulnerability Data

There is no way to determine a platform’s security based on raw data, as that data needs to first be put into context, applied to a scenario, and interpreted

Continue reading

The Secret Question Threat

At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.

Continue reading

Android – The new battleground for software vulnerabilities

With over 1 billion Android devices activated, the platform’s popularity has inevitably caught the attention of malware creators. In some cases, mobile phones pose a greater security risk than a desktop computer.

Continue reading

Employee Internet monitoring is really a process of discovery

Employee Internet monitoring is a discovery tool that enables the IT admin to properly manage and secure the network from the bad guys.

Continue reading

Why corporate security is needed beyond corporate walls

Laptops are a great target for malicious attackers and some really sophisticated methods are being used. Business laptops should be properly secured and that they are checked for vulnerabilities and missing patches regularly.

Continue reading

Are you prepared for Microsoft Forefront’s EOL?

Microsoft Forefront will be discontinued. Instead, Microsoft has launched a new product line called Exchange Online Protection. Can existing Microsoft Forefront Protection customers simply migrate to the new Exchange Online Protection solution?

Continue reading

Are vulnerabilities really a risk or simply hype?

Vulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?

Continue reading

How to solve Windows Firewall Error Code 0×80070424

Windows Firewall Error Code 0×80070424 may indicate a problem with the Windows Module Installer. Here’s how to fix it.

Continue reading

The 13 most important skills for sysadmins to develop

We’ve collected a list of the skills that are most important to sysadmins, no matter what their specific focus is – check it out!

Continue reading