Security

Last Updated on 19 Sept. 2014, Total: 41 Blog Posts

  1. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  2. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  3. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  4. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

  5. UK Cyber Security Challenge

    Cyber Security contains a diverse collection of disciplines across a broad spectrum of skills... Read More

  6. Encryption improvements for Microsoft Azure guest OS

    The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data... Read More

  7. Known issues with MS August’s security update

    After you install August’s security update, fonts that are installed in a location other than the default fonts directory (%windir%\fonts\) cannot be changed when they are loaded into any active session... Read More

  8. How do you address targeted attacks?

    TrendLabs Security Intelligence Blog published a short but very informative post on how IT administrators should strategize against targeted attacks... Read More

  9. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

  10. Malicious Word documents & Associated Phishing campaign

    In this two-part series three security researchers present an analysis of a particular attack that combines spearphishing and exploit attempt... Read More

Featured Links