General

Microsoft, Apple, Facebook victims of Java exploits

We wrote several times that when Oracle fixed quickly the security holes in Java, it did not have enough time to address the source of the problem. This can be now seen more clear after big names in the IT industry like Microsoft, Apple and Facebook felt victims to Java exploits.              […]

General

How would you describe yourself?

Your LinkedIn profile can tell someone a lot about you. But, what are your strongest skills? How could you describe yourself in a few words?   Here is how: create a cloud of words from your profile enhancing the words that appear most.                 Here are more of […]

(isc)2 CSSLP

Official contributor in the (ISC)2 Blog

    With the third article published in the (ISC)2 Blog I was accepted as an official contributor in the (ISC)2 Blog.             Here is a link to all my articles: http://blog.isc2.org/isc2_blog/mustaca/index.html Here is a link to my biography: http://blog.isc2.org/isc2_blog/authors.html#mustaca    

(isc)2 CSSLP

Define S.M.A.R.T IT security goals

One of the biggest problem that most IT security experts around the world have is the fact that IT security is never taken seriously until a security incident takes place. After that, management boards start being interested in IT security. However, these managers see security not through the eyes of an expert, but through the […]

General

Improve your security #10: Make backups

It is said that three things are certain in life: we are born, we pay taxes and we die. Adding a little bit of IT facts on top of this, I can add a fourth certain thing: hardware fails. It is only a question of when and not if it fails. And when it fails, you want […]

General

Didn’t you uninstall Java already?

If you didn’t uninstall it, then think again about this. Here is how to uninstall or deactivate Java from your system. Oracle has announced that they fixed with the update on February 1st only a part of the problems originally planned to be fixed. The second part of the problems will be fixed with the […]

General

Security 101: February 2013

Nowadays, a lot of people are shopping online. To do that, they greatly rely on internet banking. What precautionary steps or systems are used to make sure users have a secure transaction? The most important thing to do is to make sure that your computer is not infected with malicious software. For this, you will […]

Uncategorized

Was BusinessWire also hacked?

I received the following email from BusinessWire.com  which makes me think that they got somehow hacked and are forcing all users to change their password. I couldn’t see anything on their website, also Google didn’t provide anything useful. We will be requiring all Businesswire.com users to change their password in the next few days. This maintenance is […]