by Jozsef Gacsal | Jul 1, 2023 | Blog post, WCC
CWE or Common Weakness Enumeration table shows what are the typical (most frequent and critical) software vulnerabilities in software based on the US National Vulnerability Database (NVD). As they stated: “An attacker can often exploit these vulnerabilities to take...
by Jozsef Gacsal | Jul 1, 2023 | Blog post, WCC
Here is probable reason for that: The Potentially Unwanted Applications at various appstores. What happens?Nothing new in the first place. Every little helps, as we know it.Clever guys found out that creating and selling “useful” mobile applications around fancy...
by Jozsef Gacsal | Jul 1, 2023 | Blog post, WCC
“We all have a responsibility. Simple things, turn your phone off every night for five minutes. For people watching this, do that every 24 hours, do it while you’re brushing your teeth or whatever you’re doing.” Well, this a very good advice, we can only agree with...
by Jozsef Gacsal | Jun 27, 2023 | Blog post, WCC
The Waikato Chambers of Commerce helped for the first ever Lunch and Learn event by Torotoro in the offices of the Chambers. Here you can see the original agenda. Practical steps for owners and managers to fulfil their duties in cyber security. What are the management...