improve-your-security

Improve your security: Create good passwords

I never thought that I am going to write this post after publishing the two other Improve your security articles about passwords: #8: change the default passwords and #1: complex passwords aren’t always better But, here we are, after seeing three major websites (LinkedIn, LastFM, eHarmony)… Read more → from Improve Your Security http://improve-your-security.org/2013/12/06/create-good-passwords/ via improve-your-security.org Get the free eBook from […]

improve-your-security

Improve your security: “Improve your Security” mentioned on Adotas.com

In an interview for the magazine http://www.adotas.com I published a reference to the book:   I published a free eBook exactly to help these people to understand the risks and to teach them how to make their accounts and devices… Read more → from Improve Your Security http://improve-your-security.org/2013/12/05/improve-security-mentioned-adotas-com/ via improve-your-security.org Get the free eBook from […]

improve-your-security

Improve your security: How to combat the brute force attacks on WordPress blogs

We wrote 1.5 months ago in the article Botnet attack on WordPress about the ongoing distributed attack on the WordPress platform. WordPress has a default administrator called “admin” which can be changed to any user upon installation. According to various sources, the… Read more → from Improve Your Security http://improve-your-security.org/2013/12/04/combat-brute-force-attacks-wordpress-blogs/ via improve-your-security.org Get the free eBook from […]

(isc)2 CSSLP

The sad state of Java security

The problem of Oracle is that they bought a technology that was stretched out to be actually “write once, run everywhere”. The Virtual Machine that provides this functionality had to be ported to all devices, and lately (in the past few years) also on mobile devices. As written in the news, even if the “run everywhere” […]

General

What to do to stop phone and mail advertisements

The Christmas presents frenzy is starting during this time of year all over the world. Most of the shops are making the equivalent of their year to date revenue in these weeks before Christmas. So, it makes sense for them to have a good planned online advertisement strategy. This is the reason why you are […]

General

Black Friday is coming – stay alert

Every year, in the last week of November we have the Black Friday (November 29th) madness of buying at reduced prices. “Stay alert” doesn’t mean that you should only keep an eye on those great offers. It means that you should not fall for the scams that are going to show up. What is going to happen? We expect […]

General

5 tips to keep your mobile devices safe while using 3/4G and LTE

Having tablets and smartphones dominating the market has been the main motivation for IT companies to boost the 3/4G  and LTE technologies. This will significantly improve user connectivity but also will raise the risks levels in terms of security. These new technologies require that we have to pay more attention to our terminals in order to […]

General

Ransomware in the wild: the CryptoLocker malware

The Cryptolocker is a new variant of ransomware malware that encrypts various files on user’s computer and demands the owner of the computer to pay the malware authors in order to decrypt the files. The affected files are documents, images, databases and many others.   How to recognize it The CryptoLocker malware files are mostly […]

(isc)2 CSSLP

Security “for free”?

As security professionals, we are continuously facing the challenge of smaller and smaller budgets allocated to maintain and improve the IT security. That’s probably the main reason why there is always the temptation of “Free”. Many people, sometimes even professionals, think that they can achieve a good security for free. “For free” means in this […]

(isc)2 CSSLP

Define S.M.A.R.T IT security goals

One of the biggest problem that most IT security experts around the world have is the fact that IT security is never taken seriously until a security incident takes place. After that, management boards start being interested in IT security. However, these managers see security not through the eyes of an expert, but through the […]