How to Avoid Becoming the Villain (Part 2)

Life is full of surprises. I recently wrote an article titled How to Avoid Becoming the Villain on why it is so important to configure your servers correctly so that people cannot exploit them for illegal purposes. A few days ago, I came across a case that adds weight to the points I made then.

Continue reading

Education is Your Only Defence against Shoulder Surfing

All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are. It has happened to most of us and shoulder surfing can be either accidental – you  happen to be next […]

Continue reading

The Hidden Security Threat

Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention. The researcher had a Herculean task to complete: to scan billions of IP addresses […]

Continue reading

Using pirated software? Swashbuckling with risk!

We are often warned about the security risks when using pirated software. While some believe the ‘piracy argument’ is pushed by vendors to scare people into buying software rather than pirating it, this statement is not incorrect.

Continue reading

How to Avoid Becoming the Villain

Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until a few years ago. Poorly secured FTP servers were often hijacked and copyrighted software was […]

Continue reading

Spyware: The Next Generation

The world of IT continually creates new technologies and malicious software develops along with it. As we become more reliant on devices such as mobile phones, consoles and tablets, it is just a matter of time before hackers begin to focus on these technologies and develop tools that allow them to snoop on and steal […]

Continue reading

Unsolicited Phone Call Scams – Part Two

In Part One, I talk about a phone call scam I received and how I had been passed by the “caller” to a “supervisor”, and then to a “technician”, and how the story just got better and more believable along the way. When it was the technician’s turn, he told me that I had over […]

Continue reading

Unsolicited Phone Call Scams – Part One

Phone call scams are becoming an epidemic. The phone rings and, upon answering, the caller promptly identifies himself/herself and often claims to work with a prominent organization, such as Microsoft – all of which is bogus. However, some of the craftier callers claim to be from the nearest major computer retailer in your area. The […]

Continue reading

Windows Server 2012 – An Overview

Windows Server 2012, the latest addition to the Microsoft Server operating system line up, was launched recently and with all the hype I just had to give it a spin.  In most cases, changes to server operating systems are hidden under the hood, yet this time round Microsoft has changed its interface to the new […]

Continue reading

Keeping Up with the Times

I came across two stories recently that made me wonder what the outcome would be if they were seen in parallel. The first, reported by Wired.com, showed how, despite being repeatedly told about the importance of security, people seem to block these warnings out and consciously, out of convenience, choose insecure practices.

Continue reading