Top Stories Security
- What Metadata Does The Government Want About You?
- 24 Key Network Threats To Watch Out For Right Now
- A Complete IT Security Approach Summarised In Nine Pictures
- Scan Your WordPress Themes And Plug-Ins For Suspicious Code
- What Would The Tech Requirements For Metadata Retention Be?
- We Don't Have Enough Data About Metadata Plans
We recently covered Microsoft’s lesser-known Enhanced Mitigation Experience Toolkit (EMET) that adds protection against malware. Microsoft recently upgraded it to version 5.0 with even more protection against Internet nasties.
They are out there… or should that be “they are in and around your network?” Yes, at any moment in time, they may infest your network, putting your data at risk; ticking time-bombs waiting to explode, configurations ripe for exploit. And don’t forget those decisions made in the heat of the moment that, had rational thought prevailed, would never have been permitted.
Computer users everywhere are looking at the USB stick sat next to their computer this week with trepidation. Many are now wondering if this trusted friend has turned against them now that cybersecurity experts say they’ve found a massive flaw in the very make up of these devices. It seems the humble USB drive can easily be used to compromise basic security principles in your machine.
WordPress has a lot going for it, including a flexible, open platform the encourages users to develop plug-ins and themes that make it even better. That same benefit, however, invites more nefarious parties to craft malicious code and slip it into free content. While prevention is always the best option, it doesn’t hurt to install a plug-in or two that can detect and alert you to suspicious code.