Skip to main content

Home/ Information Security/ Group items tagged a

Rss Feed Group items tagged

Skeptical Debunker

Sea World killer whale attack video leads to malware | Graham Cluley's blog - 0 views

  •  
    Dawn Brancheau, a trainer at Sea World in Orlando, was killed yesterday after being attacked by a killer whale. News of the tragedy sped quickly around the world, and now sick cybercriminals are exploiting the story of 40-year-old Brancheau's death for their own commerical gain. Through SEO (search engine optimisation) techniques, hackers have created webpages stuffed with content which appears to be ghoulish video footage of the animal trainer's death - but are really designed to infect visiting computers.
Ace Dee

SEO Services that Exceeds Expectations - 1 views

Oracle Digital impressed me greatly with their content, knowledge and passion for the industry. After following Oracle Digital for three months and liking what I saw, I approached them for an initi...

SEO Perth Brisbane

started by Ace Dee on 22 Feb 11 no follow-up yet
hansel molly

Great Remote Computer Support Services - 2 views

Computer Support Professional offers unrivaled online computer support services that gave me the assurance that my computer is in good hands. Every time I needed the help of their computer support ...

computer support

started by hansel molly on 06 Jun 11 no follow-up yet
helen hunt

Quality Computer Help Desk Support Services - 1 views

I am so thankful with HelpVirtualDeskSupport help desk support services. They help me fixed my computer. Their PC help desk support specialists really know what they are doing. HelpVirtualDeskSup...

help desk support

started by helen hunt on 17 May 11 no follow-up yet
sally pearson

Computer Help like No Other! - 1 views

ComputerHelpFastOnline answered my call for computer help fast! I never expected how quickly they can resolve my computer problem. Their computer help expert technicians really knew their job and...

computer help

started by sally pearson on 13 Jul 11 no follow-up yet
peerlyst

WannaCry no more: ransomware worm IOC's, Tor C2 and technical analysis + SIEM rules, by... - 0 views

  •  
    After a rather long day, night and morning of studying the news, researching and hunting the #WannaCry ransomware worm there are some discoveries to be shared.. This includes Host and Network IOCs, their analysis obtained with help of fellow security researchers and practitioners, review of C2 infrastructure and its interactions with Tor. Last but not least are some free SIEM use cases. What else should a security practitioner know for their handling of WannaCry?
valuementor

What is advanced Penetration testing - 2 views

Advanced penetration testing is a simulated cyber security testing to check for exploitable vulnerabilities in a system. Pen testing may involve attempted breaching of application systems or front...

security Cyber computer identity penetration testing

uygosmv

Transport Layer Security - Wikipedia, the free encyclopedia - 0 views

  • The client responds with a Certificate message, which contains the client's certificate.
  • The server requests a certificate from the client, so that the connection can be mutually authenticated, using a CertificateRequest message.
Zaid Mark

Corrupted System Files Causing Black Screen - 0 views

  •  
    Bumping into a Black Screen, while booting Windows 8 is one of the most reported issues of this operating system. As a matter of fact, this event has a number of preceding sources, and you can recover from it using several troubleshooting methods.
anonymous

Fix Slow Running Computer Now - 0 views

My computer is running so slow so I contact Fix Slow Computers Online. They offer online computer support services to fix slow computers. They have the best computer tech specialists who know how t...

fix slow computers

started by anonymous on 12 May 11 no follow-up yet
vivektrivedi

Cloud based IT Solution Sydney | IT Service Provider - 0 views

  •  
    Based out of Sydney, Australia, Exigo Tech is in the business of helping companies create robust IT infrastructure, develop intuitive applications, automate business processes and add value to their clients with digital transformation and business consulting. As a solution provider, Exigo Tech enables businesses to achieve high operational efficiency and enhanced productivity with their range of services in project management, cognitive solutions, Microsoft Dynamics and more. Exigo Tech is also recognised as one of the leading cloud service providers offering private cloud, public cloud and hybrid cloud solutions. Exigo Tech offers added agility to their customers via perfectly tailored disaster recovery solutions which is inclusive of managed services, backup, recovery and other security services. Exigo Tech provides app or application development services which augments the digital transformation journey for many of their clients.
Rodolfo Arce

dxflatline flatpipes: A TCP proxy over named pipes - 0 views

  •  
    "A TCP proxy over named pipes"
  •  
    Very interesting tool for remote access and firewall bypass
Jonas Patrick

What is identity theft prevention - 0 views

  •  
    Identity theft prevention means taking precautionary measures to save your identity from being stolen by a fraud person that can misuse your personal information.
anonymous

Why should Penetration Testing be conducted frequently - 0 views

  •  
    The popularity of cloud computing and BYOD really brought information security to the forefront. The intruders also got smarter and more intelligent in finding new ways and new loopholes to attack. In order to deal with the future attacks, what a business…
anonymous

Identity and Access Management: Explained in Detail - 0 views

  •  
    Identity and Access Management is an information security framework which focuses on the security of the digital identities in a workplace and enables an administrator to maintain control over the access to the company resources, both physical and digital
Kiran Kuppa

Applied Cryptography Engineering - Quarrelsome - 0 views

  •  
    "This article was written with several goals: to hurry along the process of getting Applied Cryptography off the go-to stack of developer references, to point out the right book to replace it with, and to spell out what you else you need to know even after reading that replacement. Finally, I wrote this as a sort of open letter to Schneier and his co-authors."
Zaid Mark

How to enable the F8 key to start Safe Mode in Windows 8 - 0 views

  •  
    Since Windows 8 does not allow users to boot into safe mode or load advanced Startup options by pressing F8, users are finding it difficult in troubleshoot Windows 8. If you are one out of many people looking for a way to enable Advanced Startup Options using F8 key, you have landed on the right webpage.
Sally Croft

The Best VPN of 2015 in the UK | Virtual Private Network Blog - 0 views

  •  
    This post answers why UK VPN service has become a must-have for every internet user in 2015? Further, we'll show you how to choose the best UK virtual private network amongst all.
Jonas Patrick

Ways to Prevent Identity Theft - 0 views

  •  
    It is always said that prevention is better than cure. By using KeepmyID, you can save yourself from being a victim. Prevent and protect your ID from theft before it's too late.
« First ‹ Previous 61 - 80 of 114 Next › Last »
Showing 20 items per page