General

Last Updated on 17 April 2014, Total: 149 Blog Posts

  1. An overview of security articles in EU legislation

    A whitepaper published by the European network and Information Security Agency (ENISA) gives an overview of the legal aspects of cyber security in the European Union (EU). Although, the majority of data breaches do normally make it to the press but there are many breaches which remain either undetected or not reported. EU considers effective legislation is key here and... Read More

  2. Drive-by download attacks - a favorite tactic used by many attackers

    According to Microsoft's Tim Rains, drive-by download attacks continue to be a favorite tactic used by many attackers attempting to compromise large numbers of systems around the world. In his MS Security blog, Tim discusses drive-by download attacks and the need to keep all software up-to-date in an effort to mitigate this type of attack. He refers to information from... Read More

  3. Amazon has fixed a problem that helped hackers gain control over Honan's online accounts

    Following the devastating cyber-attack on Mat Honan's digital life, Amazon changes its policy and fixes the security hole by no longer allowing people to call Amazon and change account settings like credit cards and e-mail addresses. Previously, Amazon's phone policy essentially allowed hackers to use social engineering tricks on support representatives to learn sensitive information about targets like Honan. Read... Read More

  4. Sharing Responsibilities in Cloud Environments

    Cloud Computing elements such as, guest operating systems, physical platforms and others are easily associated with one party (provider or customer) being responsible for both management and security but what about responsibilities when elements overlap boundaries between the provider and the customer? Cloud Computing has brought about new challenges and most importantly, a distributed control environment. Although, some argue that... Read More

  5. Flexible Battery revealed by Korean Scientists

    The limitation in physical flexibility of portable devices can be defeated thanks to a super-thin and flexible battery invented by Korean scientists. The battery which seems to be commercially viable, can lead to gadgets that can be folded away into your pocket. The battery remains one of the largest single parts of any portable device but this lithium-ion battery is... Read More

  6. iCloud apparent flaw

    An apple user sells his MacBook Air and finds out that he can still track the device using Apple's "Find My Mac" feature, even though the laptop's hard drive has been completely erased. An apparent flaw in Apple's iCloud, allows owners of second-hand Apple devices to be tracked by the original owner, who can also remotely wipe all the data... Read More

  7. Register for free training - Windows Server 2012: First Look

    Learn how to cloud optimize your IT with Windows Server 2012 and how to take advantage of the skills and investment you have already made in building a familiar and consistent platform. With Windows Server 2012, you gain all the Microsoft experience behind building and operating private and public clouds, delivered as a dynamic, available, and cost-effective server platform. This... Read More

  8. Rights Protected Folder Explorer

    Rights Protected Folder Explorer is a Windows based application that allows you to work with Rights Protected Folders. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder. It works with Active Directory Rights Management... Read More

  9. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  10. Fake Skype malware app on Android

    Days after Trend Micro, a global leader in antivirus solutions broke the news of a fake Skype malware app for Android devices, Microsoft acknowledges the existence of the malware and releases an alert notification on its Malware Protection Center website. It urges users of Android phones to install security software or download the latest updates for those who already have... Read More

Featured Links