Detecting Keyloggers and Espionage Software

Detecting Keyloggers and Espionage Software

Did you know that there is a thriving industry that caters to people who enjoy surreptitiously spying on others? Spy shops that sell telescopes, hidden cameras, voice recorders, and other surveillance devices tend to do brisk business, and there is also a software side to this industry. What Can Spying Software Do? Spy software, not…

Details
Read This Before Taking Your Computer to be Repaired

Read This Before Taking Your Computer to be Repaired

When buying a new computer, you will probably never think about a future trip to the repair shop. It does not matter whether you get a Windows, Apple, ChromeOS, or Linux system; the need for repairs may arise someday. You can certainly do a lot to avoid frequent trips to the computer repair shop, but…

Details
Designing a Modern Data Center for Your Office

Designing a Modern Data Center for Your Office

More than a decade has passed since cloud computing became the new paradigm of enterprise data networks. What was once considered to be a cutting edge solution is now a business standard, and the days of client/server office networks are mostly over. Modern business networks operate as data centers; whether you keep servers on-premise or…

Details
The Importance of Secure Email Hosting

The Importance of Secure Email Hosting

When former United States Special Counsel Robert Mueller testified before Congress in July 2019, information security experts paid attention to his testimony for reasons that were more technical than political. One of the various matters that Mueller investigated during his tenure was the hacking of email accounts operated by the Democratic National Committee as well…

Details
Understanding Hybrid and Private Cloud Systems

Understanding Hybrid and Private Cloud Systems

Cloud computing, at least as we came to know it during its inception in the late 1990s, has changed significantly. When most people think about “the cloud,” they have a vision of public cloud computing, which encompasses popular services such as Microsoft Office 365, Google’s G Suite for business productivity, and Software-as-a-Service solutions such as…

Details
Understanding HIPAA Server Compliance

Understanding HIPAA Server Compliance

One of the main goals of the Health Insurance Portability and Accountability Act is to protect the privacy and integrity of patient health information, particularly when it is handled in electronic formats. Business entities that deal with protected health information in the United States are expected to comply with certain HIPAA guidelines, and this goes…

Details
How Hackers Can Take Down 40 Websites in Minutes

How Hackers Can Take Down 40 Websites in Minutes

Here’s a situation that underscores the importance of network security these days: a novice hacker working for the research and development department of a Japanese automaker was able to exploit a cross-site scripting vulnerability to infiltrate a server and compromise 40 websites in seven minutes. Method of Attack Used in the Hack The attack started…

Details