For IT Security folks, especially those in a large corporation, dealing with Threats Security or External Content Threats Security has a potential to take away a significant operations time. So what is External Content Threats Security? External Content Threats Security usually involves threats through many threat agents which evolve over time. These threat agents […]
Continue ReadingRemove Powered by Zedo & URL.cpvfeed.com Popups
Spyware such as Zedo, powered by Zedo and URL.cpvfeed.com redirects your browser or opens popups displaying advertising. Step by step security article on How to remove the Zedo, powered by zedo, URL.cpvfeed.com popups and also remove the core.sys rootkit.
Continue ReadingWhy Biometric Security CANNOT secure a Corporate Environment
Biometric Security is being billed as the next savior of personal and corporate security, a superior solution to our Identity and Access management problems. However, the fact is that if someone steals your Biometric ID, it remains stolen for life.
Continue ReadingNeutrality of Net Neutrality article on Wikipedia under dispute
I saw this on an RSS feed somewhere and went down to further investigate. This is definitely funny where the neutrality of Net Neutrality article on Wikipedia is disputed. While this is standard practice on Wikipedia where any disputed articles or hotly debated articles are branded under this category, the picture is definitely funny.
Continue ReadingDirty Business: What Security and Pen Testers need to know to get the job done
This article is part # 3 in the series on Penetration Testing. The first in this series talks about Penetration testing as a profession and a general introduction. The second introduces you to some critical keywords and security tips you need to be aware of before proceeding through the rest of this series. When you are performing […]
Continue Reading