It is without a doubt the norm to think of IT staff as the tech-savvy geniuses that they truly are, and mostly only as “techies”. The go-to folks, who speak a language all their own when their special skills are required to create special software, … [Read more]
5 Tips To Help You To Secure and Manage Your Passwords
Over the years the computer landscape has changed. Computers have gotten faster, phones and TVs have gotten smarter, and threats have gotten meaner. One thing hasn't changed much - how we login or unlock our devices - the password. … [Read more]
MySQL Vulnerability Allows Attackers to Bypass Password Verification
Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials. The vulnerability occurs only on *NIX based … [Read more]
CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks
The US Computer Emergency Response Team (US-CERT) has advised that some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable to a local privilege escalation attack. An attacker may exploit the … [Read more]
Cost of a DDoS
A Distributed Denial of Service (DDoS) can bring the Internet services of any online business to its knees. Such downtime can cause businesses heavily reliant on the Internet to suffer some heavy financial losses. … [Read more]
Mobile Applications for the Mobile Phone Market
In an address to the audience during a recently concluded seminar entitled "Cloud Vision", the Honourable Minister of Science, Technology and Tertiary Education (MSTTE), Fazal Karim, said that technology services should take into consideration our … [Read more]