Tags » IT Security

Gaza Cyber Warlords

The endless news flow about the Gaza conflict with a number of victims increasing on both sides and troubling potential for further escalation has completely camouflaged some other equally important events taking place in the background. 188 more words

Why Hire a Certified Computer Repair Technician?

We are living in the webbed world, where each and every aspect of our life is connected to computers and smart phones. Hence, whenever these gadgets break down or get faulty unexpectedly, your first response is absolute panic.   252 more words

IT Support Melbourne

Privacy Healthcare

How about this horror movie for a change? A laptop with the 500 patients personal data was stolen from the medical facility in South Carolina. What kind of personal data? 161 more words

Cyber 9/11

The years of 9/11 aftermath have seen hundreds and hundreds of thoroughly written reports with warning messages and conclusions. However, it seems that all of our eyes were on the sky while the enemy has been preparing itself for an invisible attack with no sound or warning. 133 more words

Apple: I'm a winner, but also a sinner!

Bad news folks! It seems that the rumors about the iPhone’s back door were true. This invisible access point was supposed to ensure an easy work for the people who are servicing your smartphone. 159 more words

Gotta TruSST'MM

Had been planning for a long (?) time already to write something up on the issue of Trust in OSSTMM3© – in particular, how it doesn’t conform with received (abstract) notions of trust and how that’s a bit confusing until one thinks it through wide and deep enough. 134 more words

Information Risk Management

Hackers Love Superman Too

The guys from the McAfee have a sharp expert IT security eye for all intriguing things taking place in the background, or to be a little bit more precise in the backstage. 176 more words