I’ve Been Hacked – What To Do After You’ve Been Hacked

I’ve Been Hacked – What To Do After You’ve Been Hacked

| | General Security, tips
By Carter Graydon at Hacked.com There’s nothing quite like that feeling of dread that slowly envelops you when you realize you’ve been backed. Regardless if it’s just your social media account or ...
How to prevent your laptop from overheating

How to prevent your laptop from overheating

Laptops may be more affordable than ever, but we’re also using them for more advanced tasks than ever. This means you run the risk of overheating your laptop and causing long-term damage ...

What’s behind PCI’s New MFA Requirements?

| | all posts, tips
Requirement 8.3 of the PCI DSS 3.2 goes into effect today (Feb 1, 2018), making MFA (multi-factor authentication) a requirement for every organization involved in payment card processing. Many have implemented MFA ...
DEF CON 21 - Ming Chow - Abusing NoSQL Databases

Application Level Denial of Service – An In-Depth Guide

Denial of Service attacks that bring down popular websites often involve thousands of hacked consumer devices and servers. While these attacks mainly aim to overwhelm the target system with traffic, in order ...
IT hardware checklist for SMBs

IT hardware checklist for SMBs

As a business owner, you don’t want to start the new year faced with last year’s hardware problems. And although you can’t leave every issue behind, you can start implementing policies to ...