MITRE maintains the CWE, which is a list of the top 25 most dangerous software errors. This list serves as a common language for describing software security weaknesses and as a standard measuring stick for software security tools that target these weaknesses. This list […]
Adware can be a very touchy subject. While it can be advantageous to see advertisements for things you are interested in while you are browsing online, for example, it is also very troublesome how they know so much about you. Before understanding what adware really […]
A rogue access point is defined as a wireless access point that has been installed on a private company’s network without proper authorization. These rogue access points can create quite the massive headache unless defended against by using the following tips. The network’s policy is the […]
You must be logged in to post a comment.