412 Results for:DOS

  • Sort by: 

How do Linksys router vulnerabilities expose user data?

By Judith Myerson 15 Jun 2017

Router vulnerabilities in over 20 Linksys models expose user data to attackers. Expert Judith Myerson explains how the flaws work and how to protect against them. Read More

Log4j explained: Everything you need to know

By Sean Michael Kerner 27 Jan 2022

Log4j, which is embedded in popular services and frameworks, became a headache for many businesses by the end of 2021. Businesses affected include Apple, Microsoft and VMware. Read More

My first computer: Making the leap into an IT career

By Cliff Saran 25 Aug 2020

The IT sector has always struggled to attract enough young talent from different backgrounds. We look at how people gained their first tech experience Read More

Break app infrastructure responsibly with chaos engineering

By George Lawton 18 Jul 2018

More enterprises are intentionally breaking applications with chaos engineering. It helps developers learn the causes of software failures and how to build better apps. Read More

Innovation and the economy: Going digital key to enduring downturn

By John Moore 06 Aug 2020

A financial crisis tends to jar organizations out of established ways of thinking and usher in innovation. Channel partners are well positioned to help clients through this transition and introduce ... Read More

Protego Labs launches serverless app security tool

By Warwick Ashford 08 Jan 2019

Security professionals and developers now have a way to assess the security of their serverless applications with a new open source testing tool donated to Owasp Read More

Lesson 4: How to use wireless IDS/IPS

10 Apr 2006

In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn how to choose a ... Read More

Microsoft co-founder Paul Allen dies, aged 65

By Cliff Saran 16 Oct 2018

Computer programmer who helped propel Microsoft to become one of the world’s largest businesses will be remembered for his generosity Read More

Four-fifths of SIM-swap fraud attempts successful

By Joe O’Halloran 16 Jan 2020

Researchers from Princeton University find that despite advances in technology, SIM-swap fraud continues to be difficult to detect and prevent, as fraudsters adapt attack techniques Read More