Latest posts

Page 7

Top 10 free tools for network monitoring and analysis [Video]

We’ve selected the top ten tools for digital forensic investigation and incorporated them in this short video. Enjoy!

Continue reading

You’ve got (malicious) mail

Unfortunately, email-based malware has gotten much more malevolent over time. And security pros should not see email as “old hat” or an outdated form of attack. Deb Shinder explains why.

Continue reading

August Patch Tuesday roundup

Nine security bulletins were released in August, addressing 37 vulnerabilities, most of them in Windows and a few in server products.

Continue reading

Are vulnerabilities really a risk or simply hype?

Vulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?

Continue reading

Microsoft bumps up security on IE after it earns title of “most exploited browser”

Microsoft is adding a new security feature to Internet Explorer. It’s called Out-of-date ActiveX Control Blocking.

Continue reading

Five great ways to stay in control of a mobile workforce

With mobile working widely expected to continue gaining in popularity, IT departments need to know how to maintain control and security of IT infrastructure. Here are five tips on how to do that.

Continue reading

The case for building a BYOD policy

Whether you’re looking to build a basic BYOD policy or one that’s tailored for your company’s specific needs, the project involves the same steps. Here’s a step-by-step guide.

Continue reading

More bad news for iOS users

At Black Hat USA 2014, researchers presented new ways to “exploit unpatched iOS vulnerabilities for fun and profit”. Deb Shinder tells us more about this in her post.

Continue reading

August Advance Notification: Patched to the nines

August is bringing us a total of nine security updates from Microsoft that will be coming down the pike next Tuesday – two critical; seven important.

Continue reading

It’s time to take care of your Internet immunity

Increase your Internet immunity – here’s a white paper on how to understanding today’s top online threats and how to guard against them.

Continue reading