The Latest in IT Security

Posts Tagged ‘Configuration’

My primary email address assigned by my ISP can’t be changed. It gets a lot of spam. In the past that wasn’t really a problem because I rarely used it for anything, but a few years ago I foolishly began using it on resumes.

Read more ...

Many organizations that run industrial control systems strive to isolate them from the Internet, but sometimes forget to disallow Domain Name System (DNS) traffic, which provides a stealthy way for malware to exfiltrate data. Sometimes referred to as supervisory control and data acquisition (SCADA) systems, industrial control systems (ICS) are notoriously insecure. Not only is […]

Read more ...

In my previous tutorial, I wrote about digitally signing emails in Apple Mail to ensure that an email being sent or received is verified as coming from a trusted source. While this does nothing to hide the contents of the email from prying eyes, it does serve to identify the users involved in sending and […]

Read more ...

Categories

MONDAY, MAY 21, 2018

Featured

Archives

Latest Comments

Social Networks