Next Unit of Computing(NUC) – great secure computing platform

If one sets up a computer correctly it can be very secure. With the right anti-virus/anti-malware solution, the NUC can be a very effective business platform. The NUC can be set up with a SSD hard drive and thus will have a very low maintenance profile (with no moving parts inside). Our partner Lazerware uses Centurion … Read more

31337 hacker tells how he owned Gamma

data.langly.fr has the post in English and very well written The hacker writes well and explains how he owned (penetrated) the website gamma-international.de, which redirects to finsupport.finfisher.com The hacker 31337 explains himself including how to stay anonymous, and not reveal who you are to the site that he attacked. He uses Google tricks including the … Read more

How did the Attacker Gain Entry?

In the realm of incidence reporting and response Management: CERT has a process to use. One has to have a Computer Security Incident Response Team (CSIRT) A security incident occurs when unwanted scans and attacks are happening. Breaking a security policy is also a security incident.   Of course breaking into a server and stealing data … Read more

Smartphone manufacturer Xiaomi downloads all personal data

International Business Times  story The Xiaomi phones are sold in China and the head of global expansion was a Google executive. F-Secure a Finnish co.   and their blog: Finances of F-secure and more I know them as an Anti-Virus company among other things.