Website Security Check

Security Audit Systems provide a service that allows webmasters to have their website security checked against the latest web vulnerabilities. This service is the same as having a Website Penetration Test which gives you a detailed report on our findings once the security checks have been performe[...]

What is a botnet?

Have you been a victim of a botnet attack? Often when people face attacks against their website infrastructure they are left being told that their website was attacked by a botnet. To the non technical this means absolutely nothing, and of course most people are left thinking, what is a botnet? What[...]

OWASP Top 10 2013

What is OWASP? OWASP stands for Open Web Applications Security Project, and is an open-source collaboration of web based security tools, technologies and methodologies from industry leaders, educational organisations and individuals from around the world. The aim of OWASP is simple; help people with[...]

Top 5 Security Apps for iPhone

Below are a selection of security apps you can install on your iPhone or Android smartphone. 1) GadgetTrak This handy little app allows you to track your iphone once enabled. You can also send push messages to your phone telling the person who has it that it’s being tracked. One of the feature[...]

Windows 8 security

Below is a lit of some of the new Windows 8 security tools. Integrated Windows Defender Windows 8 will include a full anti-malware solution, known as Windows Defender which will now include the antivirus features from the Microsoft Security Essentials program. Windows Defender will also have improve[...]

What is Penetration Testing

What is Penetration Testing? A Penetration Test, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organisation. The purpose of the test is to identify security vulnerabilities and then attempt to successful[...]

OWASP Top 10 2012

What is OWASP? OWASP stands for Open Web Applications Security Project, and is an open-source collaboration of web based security tools, technologies and methodologies from industry leaders, educational organisations and individuals from around the world. The aim of OWASP is simple; help people with[...]

Anonymous Surfing

This guide gives you several points to help protect your identity while surfing the internet in the hope to stay anonymous online. 1) Proxying What is it? A proxy allows you to ‘bounce’ your connection through a proxy server. A proxy server is essentially another computer running on the [...]

Internet Explorer 9 Zero-Day

Hackers are taking advantage of a new zero-day exploit in Internet Explorer 9 and all previous versions, by hijacking the web browser and executing trojans such as Poison Ivy on victims PCs. The unpatched bug in IE7 to IE9 can be exploited in Windows XP, Vista and Windows 7. Advise has been given to[...]

Windows 7 security essentials

Below is an outline of key security features you should have enabled in Windows 7 to help protect against attack or virus infection. 1) Windows Updates This is an essential aspect of Windows. If you do not have Windows Updates enabled, your PC will become out of date, as software bugs are discovered[...]