Nature, people, states, machines, relationships – everything has a life cycle. Including technology. Nothing stays in the same perfect condition forever and nothing works as it should with no proper care and attention. This evanescent aspect of things is concerning me today because I’m going to bring into your attention concepts like software rot, code […]
The post Software Rot and Cybersecurity: Why Code Degradation Is Crucial to Business Safety appeared first on Heimdal Security Blog.
Alexander Graham Bell’s invention of the telephone back in 1876 marked one of the most important cultural revolutions of mankind – its invention and everything that followed afterwards (the invention of the first dial phone, the apparition of the first mobile/cellular phone, the apparition of the 2nd, 3rd, 4th and 5th generation technologies) allowed us […]
The post Android Permissions Can Be Dangerous: Full Guide to Managing Them appeared first on Heimdal Security Blog.
The Smurf Attack is one of the oldest, simplest and effective cyber-attacks, one that can draw down many unpleasant consequences for any targeted company. Before trying to understand what is a Smurf Attack, we must first understand the concepts of DoS and DDoS. Denial-of-Service or Distributed Denial-of-Service attacks generally try to make a network’s resources […]
The post Smurf Attack 101: History, M.O., Consequences appeared first on Heimdal Security Blog.