Security

Last Updated on 25 Nov. 2014, Total: 50 Blog Posts

  1. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  2. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  3. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  4. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  5. Bing-IP2hosts – Enumerate hostnames for an IP using bing.com

    Bing-ip2hosts uses MS Bing’s IP feature to enumerate all hostnames which Bing has indexed for a specific IP address... Read More

  6. Buffer overflow vulnerability in Wireshark

    Wesley Neelen from Hoffmann Investigations discovered an MPEG file parser buffer overflow in Wireshark... Read More

  7. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  8. Consumers will do anything for Free Wi-Fi

    In a Europol-supported investigation, researchers found consumers recklessly exposing their personal details via public wi-fi and carelessly agreeing to outlandish terms and conditions... Read More

  9. Cover your webcam when you're not using it

    Belgium's Federal Computer Crime Unit says it's "a good precaution" to tape up or cover your computer's webcam when you are not using it... Read More

  10. Cyber Underground Economy – from Russia with love

    A Trend Micro Research Paper by Max Goncharov revisits the Russian cybercriminal underground market and reveals new information when compared to a 2012 report titled ‘Russian Underground 101’... Read More

Featured Links