CyberSecurity, CyberDefense, Cyber Resilience

InfoSec, SecNews, AppSec, Best Practices, Project Ideas, Source Code, etc. || Dr. Grigorios Fragkos, follow: @drgfragkos

Friday, 27 February 2015

How to prevent a business from being the next exploited target

›
Over the past few years, Cybersecurity has become a high priority task on the agenda of every organisation that wants to: prevent unpleasan...
Thursday, 19 February 2015

Good luck Lenovo and thank you for the Superfish!

›
When you purchase a laptop it comes with some default, pre-installed applications. I personally hate this and it is quicker to format ...
Thursday, 12 February 2015

PCI SSC bulletin on impending revisions to PCI DSS, PA-DSS (updating to version 3.1)

›
The Payment Card Industry Security Standards Council (PCI SSC) in order to address few minor updates and clarifications and one impacting c...
Wednesday, 4 February 2015

Private IPv4 and IPv6 address spaces

›
In the Internet addressing architecture, a private network is a network that uses private IP address space, following the standards set b...
Tuesday, 3 February 2015

To Flash, or not to Flash?

›
Adobe suffers its third critical vulnerability (CVE-2015-0313) for this year. The vulnerabilities are exploited by the use malicious advert...
‹
›
Home
View web version

About Me

drgfragkos
View my complete profile
Powered by Blogger.