412 Results for:DOS
- Sort by:
How do Linksys router vulnerabilities expose user data?
15 Jun 2017Router vulnerabilities in over 20 Linksys models expose user data to attackers. Expert Judith Myerson explains how the flaws work and how to protect against them. Read More
Log4j explained: Everything you need to know
27 Jan 2022Log4j, which is embedded in popular services and frameworks, became a headache for many businesses by the end of 2021. Businesses affected include Apple, Microsoft and VMware. Read More
My first computer: Making the leap into an IT career
25 Aug 2020The IT sector has always struggled to attract enough young talent from different backgrounds. We look at how people gained their first tech experience Read More
Break app infrastructure responsibly with chaos engineering
18 Jul 2018More enterprises are intentionally breaking applications with chaos engineering. It helps developers learn the causes of software failures and how to build better apps. Read More
Innovation and the economy: Going digital key to enduring downturn
06 Aug 2020A financial crisis tends to jar organizations out of established ways of thinking and usher in innovation. Channel partners are well positioned to help clients through this transition and introduce ... Read More
Protego Labs launches serverless app security tool
08 Jan 2019Security professionals and developers now have a way to assess the security of their serverless applications with a new open source testing tool donated to Owasp Read More
Lesson 4: How to use wireless IDS/IPS
10 Apr 2006In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn how to choose a ... Read More
Microsoft co-founder Paul Allen dies, aged 65
16 Oct 2018Computer programmer who helped propel Microsoft to become one of the world’s largest businesses will be remembered for his generosity Read More
Four-fifths of SIM-swap fraud attempts successful
16 Jan 2020Researchers from Princeton University find that despite advances in technology, SIM-swap fraud continues to be difficult to detect and prevent, as fraudsters adapt attack techniques Read More