Security

Last Updated on 16 Dec. 2014, Total: 56 Blog Posts

  1. Malware Compromises 100,000+ WordPress Websites

    Researchers at Sucuri say that the SoakSoak Malware has impacted 100’s of thousands of WordPress specific websites... Read More

  2. Preventing insider attacks

    A Trend Micro’s Security Intelligence blog post groups prevention and mitigation techniques against insider attacks into two categories: technical and non-technical... Read More

  3. Recursive DNS Resolvers Vulnerability

    Recursive DNS resolvers may become stuck following an infinite chain of referrals due to a malicious authoritative server... Read More

  4. Security Predictions 2015: New Challenges and Risk Mitigation Drive Changes to IT Security

    Netwrix shares top security trends that will drive information technology in 2015... Read More

  5. What is DNS Hijacking?

    InfoSec Institute security researcher Ali Qamar describes DNS parameters that you can set in order to prevent DNS Hijacking... Read More

  6. Four Lessons Retailers Should Have Learned from the Target Security Breach

    Netwrix recommends best practices for retailers to maintain security during holiday shopping season... Read More

  7. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  8. Fix for a 19 year old bug

    The IBM X-Force Research team has identified a significant data manipulation vulnerability that affects every version of Microsoft Windows from Windows 95 onward... Read More

  9. Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1... Read More

  10. How Secure is TextSecure?

    Security researchers from the German Gortz Institute for IT Security (Ruhr University Bochum) present the first complete description of TEXTSECURE’s complex cryptographic protocol and a thorough security analysis of TEXTSECURE... Read More

Featured Links