The past few weeks the media has been abuzz with news about the threatened banning of the popular Blackberry service. What is the security row all about?
The past few weeks the media has been abuzz with news about the threatened banning of the popular Blackberry service. What is the security row all about?
Increasing use of IT in defense establishments is exposing them to the risks from cyber attacks. Alongwith conventional forces such as Army, Air force and Navy it is time that countries look at Cyberspace. A recent news article explains how the US defense was subject to malware attack from a flash drive. Continue reading “Malwares threats for Defence Establishments”
Do you know that your hi-tech copier machine is secretly capturing your confidential information? Not many of us know that. But the fact is hi-tech copiers and multi-function printers / scanners come with hard disks which retain the images of the documents copied. Continue reading “Your spy is sitting in your office corner”
How badly would your daily activities be impacted if you lose your mobile phone? If you lost your mobile phone now, would you remember the telephone number of your spouse / relatives or friends to call them without your mobile phone? Would you be able to reconstruct all your contact numbers onto your new phone without tearing your hair? If you answer yes, welcome to the club of Minorities !! If you answer no, read on ….
Continue reading “Shock-Proof yourself against loss of your mobile phone”
A good log management tool can be very effective in managing and ensuring security in an enterprise. However, the right tool can quickly become the wrong tool unless the organisation puts in the time and effort required to make the tool effective.
Here are a few best practices to ensure a successful implementation of a log management tool:
When a computer is compromised by an attacker he usually tries to elevate his privileges to that of the administrator or root user. The attacks that can be carried out by administrative users obviously have more far reaching effects and that is what the attacker wants.