Private browsers: a beginner’s guide

Private browsers: a beginner’s guide

Information about what you eat, what you watch, who you text, who you sleep with and where you’re going on vacation has long been a commodity. You basically give it to your browser for free, which then passes it on to companies you have no interest in for them to...
Conversation hijacking and how to deal with it

Conversation hijacking and how to deal with it

Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations. Targeted e-mail attacks aren’t limited to spear phishing and business e-mail compromise (BEC). Another serious threat is conversation...
Attacks on virtualization systems and Linux servers

Attacks on virtualization systems and Linux servers

Ransomware. Nasty. But how to build defenses against it? Rather – what should be protected first and foremost? Often, Windows workstations, Active Directory servers, and other Microsoft products are the prime candidates. And this approach is usually justified. But we...
Open source: the top-10 risks for business

Open source: the top-10 risks for business

IT companies were the first to go open source, and many large businesses followed suit. After all, the ability to reuse and independently modify code as well as fix bugs spurs rapid innovation and cost reduction. But open source has some inherent negative...
How to work safely with personal data

How to work safely with personal data

How to store and process personally identifiable information in a company with minimum risks. Governments of many countries are tightening the laws that regulate working with personal data. At the same time, the number of data leaks is only growing from year to year....