Loading...
January 23, 2019
Voting machines and elections in general are still vulnerable to hacking, says Matt Blaze, but adoption of risk-limiting audits and software independence gives hope for improvement. Read more â¶
Center for Internet Security releases Microsoft 365 benchmarks
12 famous passwords used through the ages
The clean desk test
I can get and crack your password hashes from email
Temporary micropatch available for zero-day Windows exploit
Data from smartwatch provided âkey evidenceâ against hitman
Join leading IT analyst firm Enterprise Management Associates (EMA) for a webinar that will reveal the current state of enterprise security readiness within the context of security management tools, issues, and practices. Read more â¶
Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization. Read more â¶
FROM OUR BUSINESS PARTNERS
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more â¶
Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones. Read more â¶
Ten ways a messy desk puts confidential information at risk. Read more â¶
Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash â just by sending you an email. Take these steps to test for the vulnerability. Read more â¶
A publicly disclosed Windows zero-day vulnerability could allow attackers to take full control of systems once they compromise a low-privilege account. Here's a fix. Read more â¶
Police used data from a Garmin GPS watch to help get a man convicted for killing a crime boss known as Mr. Big. Read more â¶
As the fastest path to a modern data center, hyper-converged infrastructure is the hero program under the IT Transformation campaign. Read more â¶
© 2025