12 Sep 2016

There is a new android malware that hijacks your phone's shutdown process and basically tricks you in thinking that it is shutdown. It can then make calls, take pictures and other various functions without your knowledge. Sound like something out of a spy movie eh?

This...

12 Sep 2016

So as you might have already heard, hackers found a way to access your car and like me you are wondering if you should be worried. I did some research and the truth is there is no real need to panic. Apparently this flaw was noticed and rectified before it was made pub...

12 Sep 2016

One of the latest scams to hit the internet is centered on the famous messaging app “whatsapp”. Numerous phishing sites depicting the new WhatsApp Web service are popping up and trying to obtain a user’s cellular number to carry out scam campaigns and subscribing to pr...

12 Sep 2016

What, When and Who, this is #1 rule regarding Auditing, and it is no difference in the world of network security. We want to know what was accessed, by who and when was it done.

Netwrix have a suite of tools to audit changes on your network. This can range from Active D...

12 Sep 2016

Picture this: Sitting by a waterfront sipping on a refreshing beverage and saying to yourself how can my day get any better. This is what the fortunate social media participants and other lucky patrons of the Cisco Live event in San Diego will enjoy.

That is right,...

12 Sep 2016

Documentation … that is the one word that is hated and loved at the same time by us I.T Guys everywhere, whether you are a Network , Systems or I/S person, we love when it is around but hate to do it. More and more I found that there is no comprehensive tool out there...

4 Dec 2013

Meraki.  If you have never heard of them before I suggest you sit back and let me tell you a little story. It is about a Systems Admin that had to deploy and monitor a wireless solution in another country, but the people up top didn’t want to send him on the trip to pa...

3 Dec 2013

You may be wondering by now, if we are have all these online devices, who is going to protect us from the hackers out there? Well this will be a combination of some innovated cloud solutions, a new authentication process (because in my opinion, traditional word base pa...

3 Dec 2013

So guess what? We are in the world of Internet of Everything and one aspect of that is even extended to our pets. You can now go off to work and don't have to worry about feeding your furry little friend. There are now solutions where you can feed your pets remotely, e...

2 Dec 2013

The recent introduction of IPv6 has really helped in the advancement of Internet of Everything. As you know, we only have so many IPv4 Addresses to go around. We have so many addresses that now with IPv6 we can apply multiple IP addresses to every grain of sand in the...

Please reload

  • Google+ Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
Globalization concept
Digital social media
Glowing Keyboard

© "Security is key and Devops is life" ~ Antonio Cheltenham