Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Security

Infradapt Blog

This is some blog description about this site

The Darknet: The Illegal Tech Black Market in the Gutters of the Internet

The Darknet: The Illegal Tech Black Market in the Gutters of the Internet
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_darknet_gutters_of_the_internet_400.jpgWe’re so busy worrying about hackers that we rarely think about how they acquire the tools they need to steal you out of house and home. One reason that the surge of hacking activity has skyrocketed over the past few years is because hacking tools have become more readily available, through an illegal black market known as the Darknet.

Continue reading
0 Comment

Vulnerability WinShock Gets Patch 19 Years Later

Vulnerability WinShock Gets Patch 19 Years Later

b2ap3_thumbnail_problem_solved_400.jpgAfter a long 19 years, a critical vulnerability found in the Windows series of operating systems has been patched. IBM informed Microsoft of the flaw back in May 2014. The flaw, which allows for remote code execution via a packet to a Windows server, is found in every Windows operating system since Windows 95.

Continue reading
0 Comment

Two-Factor Authentication: What Does the Future Hold?

Two-Factor Authentication: What Does the Future Hold?

b2ap3_thumbnail_two_factor_authentication_400.jpgPasswords are slowly becoming obsolete in the face of more powerful security solutions. This is especially true considering how a hacker can input millions of characters every second in an attempt to break into your account and unleash who knows what into your business’s network. While using a password is still a good idea, professionals are working tirelessly to bring the new face of two-factor authentication to light.

Continue reading
0 Comment

Tip of the Week: How to Keep Yourself Safe while on Public WiFi

Tip of the Week: How to Keep Yourself Safe while on Public WiFi

b2ap3_thumbnail_pubic_wifi_issues_400.jpgAs a business owner, you might find yourself on the road a lot, and you likely feel the need to check your email for important updates from the home base. This becomes more difficult as you move from civilization into the vast unknown, with the only available WiFi connections found in public places. Unfortunately, public WiFi spots are notorious for being unsecured and unprotected, and it’s important to practice proper security when dealing with them.

Continue reading
0 Comment

Does Your Business’s Data Have a Self-Destruct Switch, Just in Case?

Does Your Business’s Data Have a Self-Destruct Switch, Just in Case?

b2ap3_thumbnail_destroy_data_400.jpgIt seems most logical to store every byte of your data, and with the advent of cloud computing, it's more affordable than ever. While most companies tend to store a huge amount of data, some forget that they should always be willing to delete old files if need be. This is especially true if you deal with sensitive data which can leave your business liable to a possible lawsuit.

Continue reading
0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries