How can malware immediately infect a Windows XP computer as soon as it goes online without any user action?

This is a thing I used to hear back in the olden days of Windows XP…

People were telling me that a computer running on an out-of-date Windows XP system with no antivirus software was getting infected with malicious softwar… Continue reading How can malware immediately infect a Windows XP computer as soon as it goes online without any user action?

Full disk encryption vs home folder encryption – why should the former be chosen over the latter

Niebezpiecznik.pl, a popular and acclaimed infosec blog in my country, recommends full disk encryption (emphasis original) to all people (ie. “Average Joes”). They warn that in the opposite scenario device theft is likely to have catastrop… Continue reading Full disk encryption vs home folder encryption – why should the former be chosen over the latter

How should firewall be configured to allow using an image scanner over WiFi to avoid jeopardizing security?

I’m having a dilemma if I should post this here or on superuser, finally I decided it’s more security related so I post it here, if it’s wrong please move.

The situation: There is an Epson all-in-one device in the home that … Continue reading How should firewall be configured to allow using an image scanner over WiFi to avoid jeopardizing security?

What is the point of blocking a potentially malicious domain by binding it in the hosts file to 0.0.0.0 rather than 127.0.0.1?

tl;dr: In order to prevent a potential use of our computers to mine crytpocurrencies, I and a few other people were advised to append this: https://github.com/hoshsadiq/adblock-nocoin-list/blob/master/hosts.txt to our hosts f… Continue reading What is the point of blocking a potentially malicious domain by binding it in the hosts file to 0.0.0.0 rather than 127.0.0.1?