General

AirPi #1: set up AirPi on your RaspberryPi running Raspbian

Initial source: http://trouch.com/2012/08/03/airpi-airplay-audio-with-raspberry/ What is AirPi? AirPi is the RaspberryPi implementation of Apple’s protocol called AirPlay. Using AirPlay you can send audio and video streaming from you Apple Device (ipad, iPod, iPhone, Mac) to RaspberryPi. This implementation is sending only the sound.   Why all this trouble? Do you know those expensive devices called Sonos? I […]

General

Avira Anwender sind vor der Malware „MiniDuke“ geschützt

Sie haben bestimmt schon von der neuen Malware gehört, die gerade die Zero-Day-Schwachstelle in der PDF-Software von Adobe ausnutzt. Dieses Schadprogramm namens “MiniDuke” entwickelt sich allmählich zum Alptraum eines jeden Unternehmens: Es ist polymorph; das heißt, es gibt unzählige Varianten des Schädlings. Es nutzt die Sicherheitslücke einer sehr beliebten Software aus: Adobe Reader. Das Programm […]

General

Avira users are protected against the MiniDuke Malware

If you live on this planet, you must have definitely have heard of the new malware that is making use of a zero-day vulnerability in Adobe Reader. This malware is called MiniDuke, and it is slowly but surely becoming the nightmare of any company: it is polymorphic – there are thousands of variants in the […]

General

Microsoft, Apple, Facebook victims of Java exploits

We wrote several times that when Oracle fixed quickly the security holes in Java, it did not have enough time to address the source of the problem. This can be now seen more clear after big names in the IT industry like Microsoft, Apple and Facebook felt victims to Java exploits.              […]

General

How would you describe yourself?

Your LinkedIn profile can tell someone a lot about you. But, what are your strongest skills? How could you describe yourself in a few words?   Here is how: create a cloud of words from your profile enhancing the words that appear most.                 Here are more of […]

(isc)2 CSSLP

Official contributor in the (ISC)2 Blog

    With the third article published in the (ISC)2 Blog I was accepted as an official contributor in the (ISC)2 Blog.             Here is a link to all my articles: http://blog.isc2.org/isc2_blog/mustaca/index.html Here is a link to my biography: http://blog.isc2.org/isc2_blog/authors.html#mustaca    

(isc)2 CSSLP

Define S.M.A.R.T IT security goals

One of the biggest problem that most IT security experts around the world have is the fact that IT security is never taken seriously until a security incident takes place. After that, management boards start being interested in IT security. However, these managers see security not through the eyes of an expert, but through the […]

General

Improve your security #10: Make backups

It is said that three things are certain in life: we are born, we pay taxes and we die. Adding a little bit of IT facts on top of this, I can add a fourth certain thing: hardware fails. It is only a question of when and not if it fails. And when it fails, you want […]