rootkit

How to Fight Rootkits

Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself ...
apt_title

What is APT?

APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known a...
vacation

Ten Tips For a Secure Vacation

It can be very tempting to instantly share the most exciting moments of your vacation with relatives and maybe make your friends a little bit jealous. That’s why we usually pack s...
safebooking

Stay Safe When Arranging Your Vacation

The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigila...
passwords

21st Century Passwords

Almost all computer security instructions, whether it is a help page on Facebook, corporate regulations or part of the “… for dummies” series, urge us to use strong passwords at a...
exploit_title

What is an Exploit?

If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not – the m...