Pulse Wave is a New Technique Using an Old Attack

DDoS Before we get into the nitty-gritty of how the pulse wave attack behaves, we must first define what a distributed-denial-of-service (DDoS) and denial-of-service (DoS) is, so we are all on the same page. Instead of regurgitating text from resources on the internet I have included a nice quote from Wired. Simple DoS attacks, performed from a single […]

Security Best Practices for Wireless Networks

The key to securing data is to have positive control of it so only the people that need to access it can and when they need to. Wireless networks pose a challenge to this goal because unlike wired connections wireless networks are reachable for up to 100 feet outside of the home or business. If someone […]

How Much Do You Trust Your Antivirus Company?

Do you know which data your antivirus collects during scans? Antivirus has kernel level access to the operating, meaning there isn’t a file on your computer hard drive that it can’t touch. Antivirus scans data that is being read from and written to the hard drive, and depending on which antivirus company you choose, data […]