Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.
Articles & Videos
A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.
We have hundreds of public facing web pages : do we protect all of them or only those
a) that when defaced will cause our corporate image to be affected?
b) or web pages that have injection & cert…
I have removed all remnants of the virus that caused this pop up. However they is something still on the pc that will randomly cause this message to be displayed. I have searched all over go…
I'm trying to find the usage of a particular DOMAIN\Service-Account usage in my whole AD domain.
Can anyone here please share which Security Event ID should I be looking / monitor or …
I have a friend who has outdated software on his web-server.
How can I prove to him that the server is vulnerable to attack?
My plan is to go to known vulnerability databases and …
Any security risks comments on the abov…
We had a client notebook stolen and they never place s password to open the notebook and their emails are with password saved that means that browser open, emails available. We heard that there is a …
We were informed that the apps Rpcapd.exe in our Windows 10 should be disabled from msconfig. In msconfig services tab, it's description is "Remote Packet Capture Protocol v.0 (experimental)" from th…
is anyone familiar with this tool: 'Kaspersky Anti-Ransomware Tool for Business'.
what is your opinion on it ?
is it free ?
I am browsing a site I have developed. www.fobgfc.org
The problem comes when refreshing the page. At the bottom I see "waiting for www.fobgfc.org..." as expected. Then "www.fobgfc.org" is replaced…
I'm trying to sieve out which of the signatures / malwares in F-Secure is ransomware.
Anyone can get me a list?
Hi, I have a client who has been done over with dma locker 3 and also had there only backup , which was on a local nas.
I had twice tried selling them cloud backup and Dr.
At the moment, there onl…
Recently I received a text from a person I recognized but who was not in my contacts. Despite the fact they were not in my contacts, their full name was in the body of the text along wi…
My OS is win 10 pro 64 bit and I seem to have a malware or virus of sort that displays an AD, Ad by Stack Player, and it sometimes plays a video or music. I have run malware and also Avast programs, …
We have a mobile client,. When launched, the mobile client requires authentication to our internal auth system, which basically happens via https. The client goes to https://login,mydomain.com
We have a mobile application that we'd like to security test.... The app runs on iOS and android
I understand there are static tests, dynamics tests, manual tests and so on. Does anyone ha…
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
On an airport fake "free wifi" network, would you be safe if using VPN?
Two hazards come to mind:
1) The initial login page could be malicious to take advantage of any drive-by boobie-traps. Fo…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY.
How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you should read this article.
I received an unusual email notifying me as the winner of something. As you can see in the image below, that the email was sent by IAWP.org from Stephanie but the sender name is "Goog…
I used to download PDF & html pages & have several cases where there's
Adobe exploits & HTML infected pages.
If I'm browsing the Internet on a Linux desktop & do copy of the html or
PDF pages & t…
We noticed something strange. We have a cell phone with its own LTE Internet and the office with cable internet; both from the same provider. When out of the office, obviously the cell uses its LTE …
Above url gives a method to lock/prevent certain programs from running. What
I need to permit only a list of programs, …
A very common problem I get from the average user is they have an issue with viruses, malware, and spyware. There are numerous articles out there on how to remove viruses and over the course …
"Ransomware" is make up of two words "Ransom" and "Ware" which is blackmail someone (asking for 'Ransom') using a malicious software ('Ware'). In short, the poor victim not payi…
3,492 points this week
Springfield, United States
2,500 points this week
Napier South, New Zealand
1,000 points this week
Köln, Nordrhein-Westfalen, Germany
1,000 points this week
Johannesburg, South Africa
900 points this week