Website Files Ransomed – Not Just Personal Files
This image explains (from PCWorld Article) The Ransomware image that can occupy your computer if you had the misfortune of downloading the wrong item (malware – virus, etc). Or if…
Defend Your Systems
This image explains (from PCWorld Article) The Ransomware image that can occupy your computer if you had the misfortune of downloading the wrong item (malware – virus, etc). Or if…
The Wifi device that you have (either yourself or by someone else) are setup with: Decide on naming your device, and also decide on the encryption technology to set up…
SecTor presentation by Kristin Lovejoy at http://2015.video.sector.ca/video/144598380 There are several business disrupters: The Cloud is changing how software is developed and thus how security should look at the cloud Agile…
Gartner has a report on the Critical capabilities of Security Information and Event Management(SIEM) software by 13 companies. Each company was analyzed on several characteristics AccelOps, AlienVault, BlackStratus, EMC, EventTracker,…
It is an interesting document from the stateoftheinternet.com https://www.stateoftheinternet.com/downloads/pdfs/SpamBot-Investigation-whitepaper-R3.pdf This botnet had 83,000 unique infections (which include webservers running all operating systems) And on page 6 where the researchers revealed…