The Definitive Ransomware Protection Guide for Business in 2020
Prepare - Survive - Recover

Found a Windows Bug? You Could Get a $15,000 Bounty

Found any kind of Windows flaw? Then you could be able to claim a big bounty from Microsoft, who announced all Windows flaws were now fair game. While the company has been running bug bounty programs since 2013, it has expanded it year after year to include bugs in Hyper-V, Microsoft Edge, and exploit mitigation


Most Vulnerable Software of 2016: Anything Linux Based

This year Linux has taken the gold, silver, and bronze medal for software vulnerabilities, beating out notoriously unsafe applications such as Adobe Flash and Acrobat. The Android Mobile OS, which is based on the Linux Kernel, took first place with 523 Common Vulnerabilities and Exposures (CVE). Second place for this dubious “award” went to Debian


Server 2012 caught your eye? Here’s a few practical tips to get started

With all of the hyped new features, returning old features and cloudy developments coming out of #TechEd are you thinking about upgrading to Server 2012? If so, now’s an opportune time to get some of the tricks and tip under your belt, to make Server 2012 work smooth as clockwork.