Protect Your Employees

Protecting your company online begins with ensuring your employees are prepared to assist in keeping your computers and networks safe. Simply put, the best security technology in the world can't help you unless employees understand their roles and responsibilities in safeguarding sensitive data and protecting company resources.

How to build multiple layers of security for your small business

The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items.

Most of us have heard about the concept of building a defense in depth in order to protect computer resources from black hat hackers. The idea revolves around the use of multiple defenses to thwart, or at least limit, the damage arising from a potential security breach.

News Group admits four News of the World journalists personally hacked phones

The publisher of the News of the World has admitted for the first time that four of its journalists personally hacked phones using information supplied by the private detective Glenn Mulcaire.

Until now, the only reporter to have admitted hacking was Clive Goodman, the former royal editor who was jailed in 2007.

But court papers released to The Daily Telegraph show that News Group Newspapers accepts that three other unnamed reporters at the now-defunct tabloid “intercepted voicemail messages using information provided by” Mulcaire.

Exploit Code Released That Can DOS PcAnywhere

A newly identified vulnerability in Symantec’s pcAnywhere computer remote control product has been published, the flaw exposes its users to Denial of Service attacks.

The code was published Friday on Pastebin by Johnathan Norman, director of security research at network security vendor Alert Logic, and can be used to crash a pcAnywhere service called awhost32.

WordPress plugin relocate is vulnerable to arbitrary files

What is Relocate?

Relocate Upload lets you specify folders, and adds a menu to the Media Library (and Edit Media admin page) that lets you switch media items between these folders and WPs default upload location.

Description

A vulnerability has been discovered in the Relocate Upload plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

UK Student Jailed for Hacking Facebook Despite ‘Ethical’ Claims

Trying to hack ethically into Facebook without any proper documentation can land you behind the bars. That is what happened to 26-year old Glenn Steven Mangham.

Glenn, a software development student in the UK, has been jailed for eight months for hacking into Facebook from his bedroom at his parents’ house in York in northern England.

Greek teen arrested over ministry cyber attack

Greek police said Monday they had arrested an 18-year-old suspected of hacking into the justice ministry's website earlier this month, an attack claimed on behalf of online hackers group Anonymous.

Two other boys aged 16 and 17 were also being sought over the case, police said.

In the February 2 cyber attack, the hackers posted a statement on the ministry website in response to Greece's tough fiscal reforms and the country's decision to join a controversial international anti-piracy pact.

Cell Phone Hackers Can Track Your Location Without Your Knowledge

Cellular networks leak the locations of cell phone users, allowing a third party to easily track the location of the cell phone user without the user's knowledge, according to new research by computer scientists in the University of Minnesota's College of Science and Engineering

What is ip address and loopback IP address?

An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address.

Within an isolated network, you can assign IP addresses at random as long as each one is unique. However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.

What are private and public IP addresses

Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post We will try to explain the difference between a public and a private IP address in layman’s terms so that it becomes simple and easy to understand

What are Public IP Addresses?

Syndicate content