Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Software

Infradapt Blog

This is some blog description about this site

A New Plan Might Make Software Reverse-Engineering Far More Difficult for Hackers

A New Plan Might Make Software Reverse-Engineering Far More Difficult for Hackers
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_software_re-engineering_400.jpgHackers make life difficult for even the most innocent Internet user, and it’s all thanks to a nasty little trick called reverse-engineering. This is when a hacker picks apart the code that makes up a program, then scans it for vulnerabilities or exploitations. A new type of security measure is being developed to protect against the reverse-engineering of software.

Continue reading
0 Comment

DecryptCryptoLocker Provides Fix for Nasty Ransomware

DecryptCryptoLocker Provides Fix for Nasty Ransomware

b2ap3_thumbnail_decryptolocker_400.jpgA few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims' computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker.

Continue reading
0 Comment

ITaaS: Transform Your IT Department Into a Service!

ITaaS: Transform Your IT Department Into a Service!

b2ap3_thumbnail_managed_services_provider_400.jpgWhat are managed IT services all about? You've heard about how businesses are saving on their IT costs by outsourcing their technology needs, but how does this service work? The money-saving answer comes from this radical new approach to treating IT as a Service!

Continue reading
0 Comment

ALERT: Back Off! New Point-of-Sale Malware Threatens Businesses

ALERT: Back Off! New Point-of-Sale Malware Threatens Businesses

b2ap3_thumbnail_point_of_sale_malware_400.jpgIf your business purchases hardware or other supplies from a retailer, or if you are your own point-of-sale, your company might be targeted by a new type of Point-of-Sale malware known as Backoff. The malware is capable of stealing credit card information from unsuspecting victims, and should be a cause for concern for those unprepared to fight against it.

Continue reading
0 Comment

Google Strengthens Zero-Day Exploit Research

Google Strengthens Zero-Day Exploit Research

b2ap3_thumbnail_google_research_400.jpgWith all of the zero-day exploits popping up lately, such as the GameOver Zeus malware and Heartbleed bug a few months ago, it only makes sense to step up research on how and why it occurs. Google is doing just that with its new research program, rightfully dubbed Project Zero.

Continue reading
0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries