This article is a first in a series about building and managing a modern data center. Have you decided to build a brand new data center to meet your company’s needs? Then you have surely though about what type of a data center you’re going to build, how much technology is going to be inside […]
Would you like to try out a virus? You probably don’t hear an offer like this a lot. But now it’s time to seriously think about it – as a newly established Malware museum offers just that. It’s a collection of old viruses, worms and other malicious software hailing from the long-passed ages of DOS and it […]
Several unrelated investigations from different security companies all bring very similar results. Lately there has been an increase of distributed denial of service (also known as DDoS) attacks, through which culprits attack servers and make them inaccessible to regular users.
Hacking is bad. This idea is deeply rooted among a lot of people. And many journalists only seem to make this notion stronger.
The calm week of Adrian Newby, CTO, was about to change. His company provides internet-based software-as-a-service to its clients. One of those clients was now in trouble. Their servers have started acting up. They were receiving huge amounts of internet traffic they just could not cope with. The symptoms were there. Newby knew that this […]
There’s a new way for hackers to get control over a computer and it’s surprisingly simple. They can just take control of their target’s mouse. Security experts found a fault that allows a hacker to hijack a computer through a wireless mouse of their victim with just a cheap USB dongle and few lines of […]
A hacker combing through a company network stumbles on a lucky find – the memory of one of the servers holds login credentials of an administrator. And already he’s made a mistake. The trap has sprung. The hacker tried to take hold of fake credentials that were intentionally left there by the server’s defenders. They […]
“We want internet to be safer!” think lots of people all over the world. And experts are working on just this day and night. However, results of their hard work are often so difficult to understand that only security experts themselves know what has been accomplished. This is the case with SSL certificates. While IT […]
Maybe you know a person like this. He or she will adamantly claim that they have never been to any suspicious or dangerous websites, have never opened an email attachment as long as they live and have never downloaded anything. And yet they have a computer haunted by malware. However, the time has come for […]
Most users are not aware of their wifi security. Routers have unsafe configurations that make them susceptible to malware attacks. For instance, there are security failures in the operating system, the firmware, the security algorithm and the web applications of routers. Attackers can use these vulnerabilities as entry points to compromise your network. In fact, there […]