DNSBLs in an IPv6 world

It is certain that the future of the Internet communication belongs to the Internet Protocol version 6, or IPv6. Even though some people might think it is new, it’s been around for quite a while; the first document describing basics of IPv6 (RFC 2460) was published in 1998. The protocol has evolved since, and it …..

Top Five Security Risks in Cloud Computing

Overview of Cloud Computing Cloud Computing is a relatively new and evolving model of providing IT services over the Internet. There have been multiple attempts to provide a conclusive definition to cloud computing, and many of the industry leading organizations have adopted the National Institute of Standards and Technology (NIST) definition of cloud computing. NIST …..

Mobile Devices Security

Laptops, PDAs, Smartphones… all these and other mobile devices help us to extend our office way beyond our cubicle walls. It is productive, convenient, and sometimes, like when you are a proud owner of an iPhone, it is cool.  :  ) However, with all the good things mobile devices bring us, many dangers come. For example, …..

Why using complex passwords is important?

In this article I’d like to write about the importance of a password complexity. Many people create relatively simple passwords by using dictionary words or patterns. Yes, it makes life a bit easier, but let’s see how using a complex password can make it far more secure. One of the simplest and most common ways …..

Website Security Test