Latest posts

Page 7

Windows 10 major update coming soon

Future Windows updates will be delivered more as a service, with continuous automatic updates that add not just security vulnerability patching but new features and capabilities as well.

Continue reading

The Connected Car: A driving force for the cloud?

Phones aren’t the only pieces of machinery that have gotten smart in recent years. Automobiles have also been quietly increasing their levels of “intelligence.”

Continue reading

Nothing to see here folks… Move along

A security research company called Cybereason published a blog post about an APT targeting OWA. Microsoft then published a blog post that says, in essence, nothing to see here folks, move along.

Continue reading

Hack Hall of Shame – October 2015

The month of October has been very heavy on the attack, breaches and vulnerabilities side. The TalkTalk breach and the T-Mobile hack alone are enough to send shivers down the infosec community.

Continue reading

Filtering the web through proxy servers: transparent vs explicit

Filtering the web with the help of a proxy server is a common way of ensuring monitoring and control of the http(s) activity going on in your IT environment. There are two main ways of using proxy servers to filter the web traffic: explicitly and transparently.

Continue reading

Monday Tech News – Beware of the new Outlook phishing scam

Last week, we were shocked to find out details of the iPhone’s real price, we discovered Apple is breaking the enterprise market without even trying and we learnt of a new Outlook phishing scam.

Continue reading

Security 101 – Presume breach

The “presume breach” mindset goes at security from an entirely different angle, which is what today’s Security 101 post is all about.

Continue reading

Happy internet day!

Countdown with us the top 31 things that existed before the Internet, but today depend upon Internet technologies, even if it’s not really obvious that they do.

Continue reading