Computer Security

Infographic: The Battle Against DDoS Attacks

Infographic: The Battle Against DDoS Attacks

DDoS attacks are always perpetrated by hackers using remote controlled botnets which are used to mount incessant, low-key attacks on targeted websites.

Continue Reading
The Office Copy Machine

Another Identity Theft Risk – The Office Digital Copier

Nearly every digital copier built since 2002 contains a hard drive – like the one on your personal computer – storing an image of every document copied, scanned, or emailed by the machine.

Continue Reading