Mike Foster's IT Security & Best Practices Blog

Latest Posts

Stop Your Vulnerabilities in a Flash

Adobe Flash, something almost all organizations use, is often an easy target for attackers who want to successfully obtain control over your computers and network. And yes, you can do something about it!

Continue reading Stop Your Vulnerabilities in a Flash


Hacking Competition Helps You

Every year, a major hacking competition called Pwn2Own attracts hackers from around the world to break into computers and programs. This year, hackers earned a total of $442,000 finding holes.

Continue reading Hacking Competition Helps You