How to Avoid Becoming the Villain

Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until a few years ago. Poorly secured FTP servers were often hijacked and copyrighted software was […]

Continue reading

Spyware: The Next Generation

The world of IT continually creates new technologies and malicious software develops along with it. As we become more reliant on devices such as mobile phones, consoles and tablets, it is just a matter of time before hackers begin to focus on these technologies and develop tools that allow them to snoop on and steal […]

Continue reading

Unsolicited Phone Call Scams – Part Two

In Part One, I talk about a phone call scam I received and how I had been passed by the “caller” to a “supervisor”, and then to a “technician”, and how the story just got better and more believable along the way. When it was the technician’s turn, he told me that I had over […]

Continue reading

Unsolicited Phone Call Scams – Part One

Phone call scams are becoming an epidemic. The phone rings and, upon answering, the caller promptly identifies himself/herself and often claims to work with a prominent organization, such as Microsoft – all of which is bogus. However, some of the craftier callers claim to be from the nearest major computer retailer in your area. The […]

Continue reading

Windows Server 2012 – An Overview

Windows Server 2012, the latest addition to the Microsoft Server operating system line up, was launched recently and with all the hype I just had to give it a spin.  In most cases, changes to server operating systems are hidden under the hood, yet this time round Microsoft has changed its interface to the new […]

Continue reading

Keeping Up with the Times

I came across two stories recently that made me wonder what the outcome would be if they were seen in parallel. The first, reported by Wired.com, showed how, despite being repeatedly told about the importance of security, people seem to block these warnings out and consciously, out of convenience, choose insecure practices.

Continue reading

Is Exchange Anti-Spam Enough?

We all know the importance of network security, yet it is also necessary to strike a balance between its costs and its benefits. This is not easy and there is no golden rule here, with the golden ratio being different for every organization. Because this is a vague area, it can also give rise to […]

Continue reading

When You Become the Enemy

Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, however, are aware of this practise and counter it by hacking legitimate sites and turning […]

Continue reading

European Legislation Might Outlaw Security Tools

In a recent post I had outlined my concerns about the Anti-Circumvention rules imposed by ACTA. I had suggested that as a result, legislation could in future be such that using certain tools required by the security profession – which could also be used by people with malicious intent such as disassembles – would be […]

Continue reading

You’ve got All Your Security Technologies in Place… Now What?

Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to enforce an organization’s network security but the journey shouldn’t stop there. You can only achieve […]

Continue reading