Latest posts

Page 3

Shadow apps and unseen holes in your network you must plug

It’s not Microsoft’s patches or those from other well-known vendors you need to be worried about. It is the software you don’t know you have, which is the real worry.

Continue reading

50 Shades of Gray Mail

Even with both server-side spam filters and Outlook’s junk mail feature, I still get way too many email messages that I have to send directly to the Deleted Items folder.

Continue reading

Yahoo and Facebook privacy woes, Google focuses on Photo Mart

Monday Tech News: This week we talk about privacy or what is left of it; a new photo service from Google that is free and there are no strings attached for once; and why the drop of PC sales doesn’t mean people are not using them.

Continue reading

Hack Hall of Shame – May 2015

May has brought with it an increase in the number of attacks and many of these breaches, apart from being large in quantity are also large in quality.

Continue reading

Third Party Patch Roundup – May 2015

On the update front this month, we’ve already dealt with 13 Microsoft patches and now we’ll take a look at what has been released by third party software vendors.

Continue reading

Ten free sources to learn IT security

If you’re looking to improve your information security expertise the Internet is the place to go for fast, good and cheap training.

Continue reading

Don’t flip your bit – is RAM the next attack vector?

Hardcore hacking takes more than using an existing exploit, changing a few lines and releasing it and bit-flipping takes hacking to a whole new level.

Continue reading

Cybersecurity awareness: a waste of time?

We spend a lot of time talking about patch management, vulnerabilities and policies, yet we seldom talk about an important aspect of security; the people on your network.

Continue reading

Dangers of Apple Watch, Microsoft’s new Outlook, and rethinking security

This week we talk about one major security flaw in the Apple Watch, plans by the US and its allies to up their spying game and the revamp of Outlook.com.

Continue reading

Every criminal blackhat started with a first hack

Every criminal hacker started with a first hack. Whether it was guessing a friend’s password, or figuring out how to get around licensing for the latest game.

Continue reading