How is working with IT boys

People ask me all the time… how is working with IT boys? How is working in a male-dominated firm? And not any kind of firm, but an actual IT company! How is the feeling of being surrounded all the time by boys, guys, men…? First of all – as you probably already know- boys will…

How the selection of the tool to be used in a specific problem can lead to glorious success or catastrophic failure

Some days ago this article from BBC fell into my attention (https://www.bbc.com/news/uk-54422505), which explains how data of positive identified COVID-19 infections, in Britain, were lost into oblivion, due to the fact that the format of “.xls” was used to gather the data. Don’t get me wrong here, this article is not a roast for the…

Defense in depth

More than ever, infrastructure security is at risk and measures should be put in place so as to prevent or react in the … “unlikely event of a loss of cabin pressure”? “the most-likely event of a network security breach!” None of the above Well, those of you that chose “B” guessed (or even better,…

WordPress 5 major pending changes

On August 28th, 00:45 GMT+2 a major attack on WordPress websites was carried out. Many WordPress sites had their admin account renamed. We managed to block the attack on its early beginning and monitor the procedure carried out using honeypots. An upgrade to all WordPress sites to latest version 5.5 hosted on our datacenters was…

Steganography as a weapon in credit card frauds

As Wikipedia states: Steganography (/ˌstɛɡəˈnɒɡrəfi/ STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós (στεγανός), meaning “covered or concealed”, and -graphia (γραφή) meaning “writing”. Ancient Greek leader Histiaeus used this practice back in…

When Protocols outpace Chipsets, the Ricoh MPC 2050 case

It is a recurring phenomenon, in the IoT era, for network devices to be required to send emails and have access to SMTP functionality. Thus, most device manufacturers attempt to follow through and implement the contemporary security protocols while designing and when firmware patching is possible. However, only so much can be done by firmware…