Cybersecurity

221

Solutions

24

Articles & Videos

535

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Related Topics

  1. Security
  2. Network Security
  3. Vulnerabilities
  4. OS Security
  5. Encryption
  6. Anti-Virus Apps
  7. Networking
  8. Delphi
  9. Visual Basic Classic
  10. Hardware Firewalls
Refine results

Hello to everyone,
this question might be easy for most of you but I would like to be notified by email  on every critical Vendor's vulnerabilities found.
Actually I go and check once a week on …

320 views
Free Tool: Subnet Calculator
Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?

029 views

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your …

0199 views

windows 7
using only google chrome browser

and I am told by norton anti virus
that an exe file is safe

I am not installing a program

norton says exe is from google

am I being sent a …

564 views

how can i create one folder on usb and require a password.


i dont want to compress a folder (zip rar) because must uncompress to view folder every time i view folder

i am using a windows 10 …

763 views

Hello Ee,

Recently one of my hosted web applications is getting hammered maliciously by bots  trying to post bad data etc , this occurred suddenly and this is the first time in 5 years.We have …

1143 views

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report …

0659 views

I'd like to move from our current P.O.S system and members database, to a cloud-based solution.

The company we’d like to use is ISO 27001 security accredited, they don’t store credit card info and …

657 views

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.

0135 views

What software do you recommend for
Laptop "remote wipes" or "total lockdowns"
so data cannot be taken from the harddrive
when something like the below happens
in the FUTURE ?

I assume the …

10108 views
Complete VMware vSphere® ESX(i) & Hyper-V Backup
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

In my wireshark evaluation of a malware from a word document, I noticed that it makes an HTTP POST to a site.
The post packet contains information about my computer.  GUID, BUILD, INFO, IP, TYPE, …

233 views

Hi Guys

I am just wondering what extra could I do for my company from the security point of view.

We have onsite server, exchange online, firewall and analyzer on place, AV running on each wks …

969 views
Credit Card

A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.

0118 views

Hi experts,
I know Office 365 security and compliance module already has something like this but it's not ideal... Clumsy to export and too much manipulating data to get the simple data i'm looking …

145 views
Technology Architects Testimonial

Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art …

047 views

Are any of you using an IRR (Incident Response retainer) to assist with Cyber incidents ? I am curious to know from others how well this is working for your organizations and if you feel there is good…

150 views

experts,

ON a windows 7 computer I run netstat and see established connections

Example:

proto    Local Address            Foreign Address              State
tcp        10.50.50.50:49198    …

349 views

Hi

Could you helpe me to understand something please.

How is possible that over one week my network at work made 16,355 connections?

For example 1969 widnows update connections how is …

893 views

A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a …

0247 views
Free Tool: SSL Checker
Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

How do I trace an email address back to the IP address of computer it came from?

It's a yahoo email address ?

1378 views
Secure Portal Encryption

With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name …

011 views
PDF Encrypted Email

The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The …

010 views

Evening. I have a server that got infected with the file "Photo.scr" and its copied itself to every folder and subfolder on my drive M.
I am trying instructions of what I can find online but with no …

19150 views

My daily bandwidth repots show some IP addresses that are trying to access my systems

What tools (https://www.iplocation.net, https://www.ultratools.com/tools/ipWhoisLookup, etc) do you recommend …

4161 views

These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives basic information about SQL injections

0518 views
Show more content
201506-LO-Top-001

Cybersecurity

221

Solutions

24

Articles & Videos

535

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Related Topics

  1. Security
  2. Network Security
  3. Vulnerabilities
  4. OS Security
  5. Encryption
  6. Anti-Virus Apps