Security

Last Updated on 22 Sept. 2014, Total: 42 Blog Posts

  1. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  2. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  3. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  4. Bing-IP2hosts – Enumerate hostnames for an IP using bing.com

    Bing-ip2hosts uses MS Bing’s IP feature to enumerate all hostnames which Bing has indexed for a specific IP address... Read More

  5. Buffer overflow vulnerability in Wireshark

    Wesley Neelen from Hoffmann Investigations discovered an MPEG file parser buffer overflow in Wireshark... Read More

  6. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  7. Cover your webcam when you're not using it

    Belgium's Federal Computer Crime Unit says it's "a good precaution" to tape up or cover your computer's webcam when you are not using it... Read More

  8. Cyber Underground Economy – from Russia with love

    A Trend Micro Research Paper by Max Goncharov revisits the Russian cybercriminal underground market and reveals new information when compared to a 2012 report titled ‘Russian Underground 101’... Read More

  9. Does your organisation still use certificates with an RSA key-length of at most 1024 bits?

    The Dutch National Cyber Security Centre (NCSC) publishes a factsheet about certificates that contain RSA keys which are being phased-out. This provides you with more information and perspectives for action... Read More

  10. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

Featured Links