Skip to content
Information Technologi

Information Technologi

The World Runs on Information!!

  • About Us
  • Contact Us
  • More

    Tag: Security

    Passwords


    How do you ensure that the older generation remember their passwords,in a world that has increased the number of passwords one has to remember? What happens when… Read more “Passwords”

    07/21/2018 by Information Technology

    Security? Who is responsible?


    Responsibility for Security: Developers have a responsibility to develop with security as a goal. Businesses have a responsibility to use security tools and monitor their systems to… Read more “Security? Who is responsible?”

    06/04/2017 by Information Technology

    Is Windows Defender enough ?


    So you got a windows 10 machine or upgraded and you realise that you have Windows defender as a free antivirus that comes as part of the… Read more “Is Windows Defender enough ?”

    06/03/201706/03/2017 by Information Technology

    How one man could have set loose a Yahoo Mail virus — Naked Security


    Last year, Jouko Pynnönen scored $10k from Yahoo for helping it head off the risk of a Yahoo-wide email virus. This year… same again. via How one man… Read more “How one man could have set loose a Yahoo Mail virus — Naked Security”

    12/09/201612/09/2016 by Information Technology

    Security Update Alert!!!


    According to  Homeland Security Cisco has released Security Updates to address Various Vulnerabilities in Various Products and has Encouraged Users and Administrators to  review the following Cisco Security… Read more “Security Update Alert!!!”

    10/04/2016 by Information Technology

    This just in ,Montana Exposed


    Seems Security is the last thing on their mind,costing 1.3 million people their health records in Montana. For more on the story….Montana Exposed

    06/25/201406/25/2014 by Information Technology

    Case and point for White hat Hackers


    While disclosing vulnerabilities is standard practice in the computer industry, the people responsible for the vulnerabilities don’t always take it well. Related articles The modern-day bounty hunters(vancouversun.com)… Read more “Case and point for White hat Hackers”

    06/15/2014 by Information Technology

    CERBERUS HACKED!!!!


    Cerberus originally shared: The following communication was sent via email to all the users whose data is involved in the leak. Keep reading after the email for more… Read more “CERBERUS HACKED!!!!”

    03/27/2014 by Information Technology

    PRIVACY DEALS AND EGO


    How we sabotage our own privacy for deals and ego

     

    Share this:

    • Share on Tumblr
    • Tweet
    • Telegram
    • Email
    • WhatsApp
    • Print
    • More
    • Pocket

    Like this:

    Like Loading...
    07/02/2013 by Information Technology

    Were you using a browser called Opera between 9 p.m. and 9:36 p.m. Eastern Daylight Time on Tuesday, June 18????


    The Norwegian-based makers of an Internet browser called Opera reported today (June 27) that they discovered a security breach in their system on June 18. Please click… Read more “Were you using a browser called Opera between 9 p.m. and 9:36 p.m. Eastern Daylight Time on Tuesday, June 18????”

    06/30/2013 by Information Technology

    Posts navigation

    Older posts

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 923 other followers

    Enter your email address to follow this blog and receive notifications of new posts by email.

    Join 923 other followers

    • About Us
    • Contact Us
    Blog at WordPress.com.
    Cancel
    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.
    %d bloggers like this: