Repeat after me, “hackers most often target vulnerabilities, not specific people or companies.” Now, say that over and over again.. and shortly you should come to the conclusion that every single device and application typically has vulnerabilities which... It is common for me to submit several hundred abuse reports as part of our security monitoring service every day. If I was asked for an off the cuff ball park of the main attack types from January 2012 to August 2012, I would probably answer with 40% remote file... Linux Socket Monitor by R-fx Networks is a good, automated, tool to let you know if an application is creating TCP and UDP sockets. The caveat we’ve experienced over the years is that when you receive an LSM alert that might involve malicious malware or hacker... While there are a growing number of technical articles on how to protect your Apache based server against the SSL Beast, I’ve yet to see an article that goes into the SSL Cipher Suite that should be used for allowing only RC4-SHA and nothing else. This past... Fiduciary is not a word you hear or read often as a small to medium business (SMB) owner. Yet if you are the steward of any size business, fiduciary should be an active word in how you manage your business. How does this relate to trust, security, and your business on...