Latest posts

Page 3

Can you secure your keep?

In how many ways can one of your network’s hosts become compromised? Well, according to independent security testing company The AV-TEST Institute, somewhere north of 300 million.

Continue reading

Adobe fixes second vulnerability in Flash

Last week, Adobe made the headlines again with a zero day vulnerability in their Flash Player software. Over the weekend, they put out an update to fix a second such vulnerability; this one impacts both IE and Firefox when running on all currently supported versions of Microsoft’s Windows operating system.

Continue reading

Whose airwaves are they, anyway?

How do you balance private property rights with the right to use those public airwaves no matter where you are?

Continue reading

Exploit Kit strikes again: Attackers taking advantage of unpatched Flash vulnerability

Adobe Flash is in the news again, with reports of a new zero day vulnerability in Flash Player being exploited with the help of an exploit kit called Angler.

Continue reading

Introduction to permissions, Part 4: Troubleshooting permissions and best practices

In the last part of our Permissions series, we’ll look at troubleshooting permissions and some best practices.

Continue reading

57 technical terms that all true geeks should know

Every culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language.

Continue reading

Security 101 – physical security

Your staff travelling with company IT resources should be aware of their surroundings and take basic precautions to safeguard the equipment and data in their care. Here are some of these basic physical security best practices.

Continue reading

Two steps forward and one step back: Why do tech companies always break some key functionality in their new and improved devices?

Why do brand new models of tech devices or entirely new versions of software so often seem to take two steps forward and then one step back, removing important features or even adding serious problems that weren’t in the previous versions

Continue reading

Insider threats are alive and very (un)well

What should a company do when users, whose roles require access to sensitive data, misuse that access? What precautions can companies take to reduce both the risk of this happening, and the damage that can result from insider activity?

Continue reading

January 2015 – Microsoft Patch Tuesday

It turns out we’re looking at eight security updates this month – of which only one addresses a vulnerability that’s rated critical. One thing about this group of patches that’s unusual is that every one of them affects Microsoft Windows.

Continue reading