WIPS stands for ‘Wireless Intrusion Prevention System’. WIPS helps in identifying unauthorized (‘rogue’) access points in an organization and taking appropriate countermeasures against the rouge devices. Continue reading “Tech Terminology Demystified – WIPS”
We had already gone through how virtualization works and the benefits it provides in an earlier blog, ‘Server Virualization Simplified’, in June 2011. Now let us find out how to secure a virtualized environment. Continue reading “How to secure a virtualized environment?”
QR – Quick Response – codes look like this:
We often mistype domain names when we are searching the web or trying to access a website. For e.g. we type instead of gmail.com, we may type gamil.com or icicibank can be typed as icici bank. Researchers have now shown that by creating ‘doppelganger’ (German origin-meaning duplicate or double) domains it is possible to steal information. A extract of the article has been included here.
Continue reading “Typosquatting-Use of Doppelganger Domains to steal data”
Hackers are known to be very clever and smart — which they need to be to remain one step ahead of the IT Security Professionals and the law administrators. However, here are some interesting “dumb moves” by Hackers that helped the officials track them down. Extracted from an article by Alan Wlasuk, and from a recent “PC World” article.
Virus hits Computer Systems on Airplanes. The US Airforce has reported that a computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions. Continue reading “How secure are we using embedded systems?”