Latest posts

Page 11

The Connected Car: A driving force for the cloud?

Phones aren’t the only pieces of machinery that have gotten smart in recent years. Automobiles have also been quietly increasing their levels of “intelligence.”

Continue reading

Nothing to see here folks… Move along

A security research company called Cybereason published a blog post about an APT targeting OWA. Microsoft then published a blog post that says, in essence, nothing to see here folks, move along.

Continue reading

Hack Hall of Shame – October 2015

The month of October has been very heavy on the attack, breaches and vulnerabilities side. The TalkTalk breach and the T-Mobile hack alone are enough to send shivers down the infosec community.

Continue reading

Filtering the web through proxy servers: transparent vs explicit

Filtering the web with the help of a proxy server is a common way of ensuring monitoring and control of the http(s) activity going on in your IT environment. There are two main ways of using proxy servers to filter the web traffic: explicitly and transparently.

Continue reading

Monday Tech News – Beware of the new Outlook phishing scam

Last week, we were shocked to find out details of the iPhone’s real price, we discovered Apple is breaking the enterprise market without even trying and we learnt of a new Outlook phishing scam.

Continue reading

Security 101 – Presume breach

The “presume breach” mindset goes at security from an entirely different angle, which is what today’s Security 101 post is all about.

Continue reading

Happy internet day!

Countdown with us the top 31 things that existed before the Internet, but today depend upon Internet technologies, even if it’s not really obvious that they do.

Continue reading

Third Party Patch Roundup – October 2015

Halloween is just around the corner and what could be scarier to an IT professional than a whole slew of security vulnerabilities that need to be patched?

Continue reading