Quantcast
Channel: Feed: Blogs
Browsing all 917 articles
Browse latest View live

South Korea’s recent cyber-attacks did not originate from China

South Korea's communications regulator admits falsely identifying an IP address linked to this week's cyber-attacks as Chinese. In fact, the source was one of the S. Korean affected companies :)

View Article



Trojan targets Macs

There’s a new Trojan in town, and it’s gunning for OS X computers, so if you have any Macs in your organization, be aware of this adware plug-in that’s called Trojan.Yontoo.1. There are several...

View Article

Lock screen vulnerability on Samsung Android phones

If you’re supporting Android phones made by Samsung, either as company-issued handsets or through your BYOD program, you need to know about a vulnerability reported this past week that can be used to...

View Article

DoD accepts CompTIA’s CASP certification

Here’s good news for those of you who have earned the CompTIA Advanced Security Practioner certification, which the company’s vice president says is the toughest technical exam related to network...

View Article

Why you should wipe the drive after a malware infection

Think you’ve completely removed all traces of that malware that infected one of your organization’s computers? Maybe not. Many types of malicious software leave behind small but important configuration...

View Article


Internet slowdown due to “biggest attack in history”

Our European friends have been experiencing a slowdown in Internet access recently, and there’s a good reason. They’re calling it the “biggest DDoS attack in the history of the Internet” and it started...

View Article

Microsoft releases updates to Sysinternals tools

A while back, I did a series here on Windowsecurity.com about how to use some of the great Sysinternals tools developed by Mark Russinovich in tracking down malware. Specifically, I talked about...

View Article

Targeted Malware: IT pros are getting nervous

According to a recent survey done by Bit9, targeted malware is the top concern of IT/security professionals once again this year. And in fact, a fourth of the respondents said their own organizations...

View Article


Stop before you plug in that USB drive

It’s a natural impulse: You find a USB stick lying around, and the first thing you want to do is find out what’s on it. But too often, those flash drives can contain malware – whether put there...

View Article


Comprehensive Study on Cybercrime

Comprehensive Study on Cyber-crime...

View Article

Recent DDoS attacks leverage open DNS resolvers

These types of DDoS attacks will only get worse until the open DNS resolvers around the Internet are closed.

View Article

Webinar - The Case for Managing ESI in the Cloud

How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the...

View Article

Email: the legal implications

There are many reasons to be concerned about email security. The mail that your employees send can contain company secrets or other confidential business information that could hurt your position in...

View Article


Top Three Browsers Defeated Again at Pwn2Own

Think the latest version of your favorite web browser is secure? Think again.

View Article

Store BitLocker Recovery Passwords in a SQL Database

You can store BitLocker recovery passwords on a SQL server instead of in Active Directory.

View Article


Microsoft Patching Routine for Modern Apps Causes Concern

Some IT pros are not happy about the new patching routine for Windows 8 Modern UI apps.

View Article

Internet Society Deploy360 Programme

The deployment of best operational practices and secure routing protocols are key factors that need to be embraced by all Internet operators to achieve a resilient and secure Internet routing...

View Article


Analysis of a PlugX variant

Analysis of a Remote Access Tool (RAT) which is usually named PlugX (also known as Gulpix, Korplug).

View Article

Patch Tuesday update cause problems!

Microsoft recommends customers to uninstall update 2823324, which is provided in Microsoft Security bulletin MS13-036.

View Article

10 Golden Rules of Information Security

You'll find plenty of guidance out there for creating an IT security program. In fact, sometimes that's the problem: there's an information overload.

View Article
Browsing all 917 articles
Browse latest View live




Latest Images