Secuity Testing

The accelerated use of IT in the workplace for business and personal purposes has generated important privacy concerns because of the substantial amounts of data that is collected about employees by employers.

What is a Zombie Computer?

Here’s all you want to know about zombie computers such as how they are used by cybercriminals in DoS attacks and for sending out Spam for example. In this article you also find tips for preventing your computer from becoming a zombie and what to do should your system be infected by botnet software.

Bluejacking - Anatomy and Threat Prevention

Here’s what Bluejacking is and all you need to know about to protect you from receiving unsolicited messages by means of Bluetooth. This article additionally contains information about Bluesnarfing, a dangerous attack which uses the same Bluetooth properties as Bluejacking.