Quick pick

NIS2

NIS2

11 posts
ISO 27001

ISO 27001

19 posts
AI & ML

AI & ML

7 posts
SSDLC

SSDLC

14 posts
Antivirus

What to do if your computer has a virus

So, the unthinkable, the only thing which you always thought that it can’t happen to you did happen: your computer got a virus or more. What to do now? First of all, don’t be scared and think well before taking the next steps. Many people format first their computer and reinstall the operating system or even […]

quoted

Quoted in Focus Magazine MY: SMEs in the crosshairs

Remember this post: http://sorin-mustaca.com/2013/07/03/about-the-internet-threat-landscape-and-why-small-businesses-are-the-most-vulnerable/ ? I almost forgot about it… Until today. I received the PDF version of the final article: FocusM-MY   “SMEs are generally easier to attack than larger corporations”, says Mustaca I’ve been quoted quite a lot of times…  

quoted

Quoted in elconfidencial.com about security of Android and iOS

  Elconfidencial.com http://www.elconfidencial.com/tecnologia/2013-10-11/en-materia-de-seguridad-con-cual-me-quedo-android-o-ios_39710/   En materia de seguridad, ¿con cuál me quedo? ¿Android o iOS?  (Interviene Sorin Mustaka, experto en seguridad IT de Avira)         “”No mobile platform is fully secure as both are almost closed to security software developers.   The cybercriminals have no ethical barriers when it comes to develop […]

Security

Protect business information outside your organisation

Credits:http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/business-information European Cyber Security Month an EU advocacy campaign that takes place in October Protect business information outside your organisation Ensure you keep sensitive information secure: When you are outside your organisation, ensure you keep sensitive information and equipment secure at all times to prevent theft or loss. In particular when you are in public […]

General

Adobe hacked: lost source code and millions of user credentials

In a blog post published two days ago, Adobe Inc., the publisher of Adobe Acrobat, Coldfusion and many, many other titles, has reported that their infrastructure was hacked and source code of several products was stolen. The breach has been discovered by the researcher Brian Krebs and by the audit company Hold Security LLC. Additionally, the company said […]

Security

Protect your personal information and identity

Credits:http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/personal-information-identity European Cyber Security Month an EU advocacy campaign that takes place in October Protect your personal information and identity Use a strong password: Your password is the equivalent of the lock and key to your house on the Internet. Passwords are a major defence, and developing good password practices will help keep your sensitive […]

Security

Protect your personal computer (PC) and portable devices

Credits: http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/pc-portable-devices   European Cyber Security Month an EU advocacy campaign that takes place in October Protect your personal computer (PC) and portable devices   PC Use a firewall: Firewalls protect your network some viruses and hackers Install anti-virus software: Anti-virus software prevents virus infections from spreading on your computer Get the latest security updates: […]