Security

Last Updated on 26 Aug. 2015, Total: 85 Blog Posts

  1. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  2. 5 Crucial Parts of Cloud Computing Security People Often Forget About

    Guest blog post by Sameer Bhatia founder and CEO of ProProfs, a leading provider of online learning tools for building, testing, and applying knowledge... Read More

  3. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  4. Apps on Google Play harbouring Adware

    Apps on Google Play pose as games and infect millions of users with Adware... Read More

  5. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  6. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  7. Bing-IP2hosts – Enumerate hostnames for an IP using bing.com

    Bing-ip2hosts uses MS Bing’s IP feature to enumerate all hostnames which Bing has indexed for a specific IP address... Read More

  8. Buffer overflow vulnerability in Wireshark

    Wesley Neelen from Hoffmann Investigations discovered an MPEG file parser buffer overflow in Wireshark... Read More

  9. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  10. Consumers Lose Faith in Passwords

    TeleSign consumer account security report is an international study of digital security concerns and practices... Read More

Featured Links