security
Loading page

What Makes A Good IT Security Professional?

There’s a shortage of IT professionals; there’s an even greater shortage of IT security professionals. Organisations are paying good money to find the right talent to protect their valuable IT assets and that’s motivating broader IT professionals to either skill up or outright move into the security space. But just because you have the technical know-how doesn’t mean you’ll be an effective security professional. So what makes a good IT security professional? Let’s find out.


Make Your Organisation More Secure By Removing Security Tools

High profile data breaches have pushed IT security up on the agenda of organisations. As a result, some companies have been overzealous in implementing a whole host of security solutions in the hopes of staving off attacks. But this is not an effective or efficient approach to IT security; You need to take the plunge and streamline your security product portfolio. Here’s where you can start.


So You've Found An Attacker On Your Network - Don't Panic

If you find a cybercriminal has penetrated your organisation’s security defences and has entered the corporate network, don’t panic. Just because there’s an intrusion doesn’t mean that data has been stolen just yet. There may still time to stop attackers from getting away with any valuable information assets. Here’s why.


Why Phone Antivirus Software Is A Waste Of Time

One of the surprisingly common questions I’m asked in my day job is “do I need to buy antivirus software for my phone or tablet?” The short answer is no — anti-virus software for sale in the Google Play store or the App Store are at best pointless, at worst, outright scams. But that’s not to say you shouldn’t take steps to protect the very personal information on your phone.


Shredo Simplifies Secure File Deletion On Mac OS X

Mac: Securely deleting files isn’t a total necessity for most of us, but if you want to make sure what individual files you delete are really gone for good, Shredo’s a solid tool for doing so.


Ubuntu Forums Hacked, Attackers Get Away With Names, Emails And Salted Passwords

Yesterday, Ubuntu custodian Canonical made users aware that its official forums had been breached via SQL injection. While usernames, email addresses and salted passwords were nabbed in the attack, Canonical is confident hackers did not get access to any core Ubuntu services.


How Your Wireless Footprint Helps Police Catch Thieves

With billions of wireless devices shipped across the globe every year, it is safe to assume that most of us carry at least one wireless gadget with us most of the time. The number of wearables to be shipped this year alone is expected to exceed 100 million. Interestingly, one-third of wearables next year will be rather inconspicuous, with smart contact lenses and connected jewellery also hitting the market. These wireless devices leave digital footprints via leaked radio signals that can be used by police to track down thieves who steal these gadgets. Here’s how.


Cybercriminals Are Fleecing Freelancers By Posing As Potential Clients

We hear about sophisticated attacks using ransomware and other viruses, but cybercriminals often use relatively low-tech social engineering methods to do their dirty work as well. Kasperky Lab discussed a rise in attackers targeting freelance workers by posing as a potential client and then tricking them into surrendering control of their mobile devices through legitimate remote access apps. Here’s what you need to know.


Zero Day BIOS Bug Found On Lenovo PCs - Other PC Makers Also Affected

Adding to Lenovo’s security woes, another BIOS vulnerability has been found on the vendor’s PCs. According to an official statement from Lenovo, the flaw originates from one of its independent BIOS vendors and Intel so it’s likely other PC manufacturers are affected as well. Here’s what you need to know.


How To Stay Protected In A World Of Non-Stop Malware Threats

Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay up-to-date with these latest threats to ensure that network environments and software applications are secured against them. Sure thing, you might think. I’ll get to today’s million malware threats right after I finish counting raindrops. We’re here to offer our assistance by going through a few of the most common malware threats that organisations face today.


Loading page