The question a wise security manager asks is, can it be done, outside of a James Bond or Mission Impossible scenario? Is it possible to hack a satellite? If you mean use the satellite for your own signals, the answer[…]
Archive: September 2016
  		2016
	
	
	
	
		
		
		25		
		
			Sep		
	
	
	
	
	    
	    
	    
		
		
		17		
		
			Sep		
	
	
	
	
	    
	    
	    
		Five Questions to Ask When You’ve Been Compromised 1. Which systems and data were affected? 2. How did they do it? 3 . Who did this to us? 4. Is it really over? 5. Can it happen again? Modern security[…]
		
		15		
		
			Sep		
	
	
	
	
	    
	    
	    
		Anyone who has even the slightest amount of contact with the internet is familiar with the scenario: An email or actual piece of mail arrives from a company who apparently handles some part of your connected life. The letter calmly[…]
  
  	End  
	
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|


