Tech Zone

Every criminal blackhat started with a first hack

Every criminal hacker started with a first hack. Whether it was guessing a friend’s password, or figuring out how to get around licensing for the latest game.

Continue reading

The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins

We know how administrators love free tools that make their life easier. Here are 20 of the best free tools for monitoring devices, services, ports or protocols and analyzing traffic on your network. Even if you may have heard of some of these tools before, we’re sure you’ll find a gem or two amongst this […]

Continue reading

Windows 10 Mobile closer to reality and why Windows Phones matter

For over a decade, Microsoft has been an also-ran in the world of smartphones companies. Is this about to change with Windows 10 Mobile for Phone?

Continue reading

Drugs, music, sex, romance. Parenting in an online world

With apologies to Prince, the title of this post sums up some of the biggest concerns parents have when it comes to their kids going online.

Continue reading

Security 101: Authentication (part 3) – protecting authentication

Authentication is critical as it helps to determine who is and who isn’t a valid user so that authorization can take place. It also helps to identify actions to a specific individual.

Continue reading

Mobile payments raise the age-old question: Convenience or security?

Why would anyone want to tie their credit card or bank account details to a device that can easily go missing, or save it with a company that might get hacked?

Continue reading

Was the Melodifestivalen hack really a hack or app failure?

While there is still a bit of mystery surrounding the Melodifestivalen incident, there are also lessons to be learned.

Continue reading

30 years of Hollywood distorting the Net

On July 28 this year, the film The Net, celebrates its 20th anniversary. This was one of the first feature films that had the Internet as a prominent plot device. Here we count down another 20!

Continue reading

Tech Vendors Giveth, Tech Vendors Taketh Away

“Feature bloat” has long been a complaint regarding new devices and software.The recent high profile security threat posed by Superfish, adware that Lenovo preinstalled on some of their computers, has vendors reassessing the issue. But are some tech companies going too far in the direction of taking away features that some users have come to […]

Continue reading

New Obama cybersecurity agency has lessons for us all

U.S. President Barack Obama launched a new cybersecurity agency that aims to pull together security information from other agencies to gain a better overview of the overall threat and find new ways to fight it.

Continue reading

Find us on Facebook

Follow us on Twitter