Wednesday night, coincidentally on the eve of attending a security conference, I received a call from a man who claimed to be “Microsoft Support”. The caller said he was “following up on my support case” and needed access to my computer. Since iuvo...
Bryon Beilman
Avoid tech support phone scams
by
Bryon Beilman |
March
06,
2015 |
Security,
Scams,
Data Breach,
cyber attacks
5 Critical Steps for Implementing a Subversion Server
by
Bryon Beilman |
December
28,
2014 |
Process,
Tools
by Bryon D Beilman
Security Lessons Learned from the Syrian Electronic Army
by
Bryon Beilman |
May
13,
2014 |
Security,
Data Breach,
cyber attacks
by Bryon D Beilman
Heartbleed - What can you do about it?
by
Bryon Beilman |
April
09,
2014 |
Process,
Security,
Tools
The newly announced OpenSSL vulnerability is potentially one of the most serious vulnerabilities found in the last 10 years. People inherently trust SSL encrypted connections (i.e. https://yourbank.com ), which now has been turned on its head. The...
Top 5 Tests for your IT Infrastructure
by
Bryon Beilman |
March
30,
2014 |
IT Infrastructure
by Bryon D Beilman