Our Blog at Oversitesentry.com goes over in some detail the new XSS attack vector. An exifdata image could include scripts that may affect you or your website…
It means anyone with Internet can email you anywhere in the world – that is a good thing (it may not be that useful if…
Securosis discusses the “CloudSOC” And as usual one has to decide what they will protect – is your data on the cloud? Where is your…
Why audit your computer? An ethical hacker can scan, then “attack” your computer or network and then tell you what is going on with any…
To prove this beyond a shadow of doubt: There are several methods malware can get on your system. (most likely method is if you click…
“… Through the process of risk management, leaders must consider risk to U.S. interests from adversaries using cyberspace to their advantage and from our own…
Risk analysis as it pertains to computer resources, is a process of determining potential fiscal cost of having one or more of the three elements(reliability,…
Kaspersky PDF download link Highest threat(2013 survey) is malware or viruses. , the next threats come to Spam, and phishing attacks. Network intrusion or hacking…
My education is as a Systems engineer (and is in my Blood 🙂 What is a systems engineer? Applied Mathematics as well as engineering.…
Hopefully you will not see this image on any of your computers: But unfortunately there is no way to recover from this Cryptowall infection, the…