Security

Last Updated on 21 July 2014, Total: 33 Blog Posts

  1. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

  2. Malicious Word documents & Associated Phishing campaign

    In this two-part series three security researchers present an analysis of a particular attack that combines spearphishing and exploit attempt... Read More

  3. The Balkan Computer Congress

    Balkan Computer Congress is an international hacker conference organized by LUGoNS – Linux Users Group of Novi Sad and Wau Holland Foundation from Hamburg and Berlin... Read More

  4. Still time to reduce threat from powerful malicious software

    The National Crime Agency is today reminding UK computer users that there is still time to protect themselves from the GoZeuS and CryptoLocker malicious software (malware) threats... Read More

  5. Wireshark latest security advisories

    If you are running a vulnerable version of Wireshark you should consider upgrading... Read More

  6. VMware product updates address OpenSSL security vulnerabilities

    OpenSSL libraries have been updated in multiple products to versions 0.9.8za and 1.0.1h in order to resolve multiple security issues... Read More

  7. Cyber Underground Economy – from Russia with love

    A Trend Micro Research Paper by Max Goncharov revisits the Russian cybercriminal underground market and reveals new information when compared to a 2012 report titled ‘Russian Underground 101’... Read More

  8. Open DNS Issues

    An open DNS server is a DNS server that responds to recursive queries (queries for domains that the DNS server is not authoritative for), and does so for anyone (not just clients on your local network)... Read More

  9. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  10. More security features for Amazon AWS

    Amazon AWS adds support for encryption of EBS data volumes and the associated snapshots... Read More

Featured Links