Security

Last Updated on 18 March 2015, Total: 67 Blog Posts

  1. Email authentication latest threats

    Authentication solves several specific issues related to email, but other problems are completely out of scope. Attackers know this, and have designed some of their attacks accordingly. Perversely, they are actually using authentication to improve the quality of their campaigns... Read More

  2. Malware Compromises 100,000+ WordPress Websites

    Researchers at Sucuri say that the SoakSoak Malware has impacted 100’s of thousands of WordPress specific websites... Read More

  3. Preventing insider attacks

    A Trend Micro’s Security Intelligence blog post groups prevention and mitigation techniques against insider attacks into two categories: technical and non-technical... Read More

  4. Recursive DNS Resolvers Vulnerability

    Recursive DNS resolvers may become stuck following an infinite chain of referrals due to a malicious authoritative server... Read More

  5. Security Predictions 2015: New Challenges and Risk Mitigation Drive Changes to IT Security

    Netwrix shares top security trends that will drive information technology in 2015... Read More

  6. What is DNS Hijacking?

    InfoSec Institute security researcher Ali Qamar describes DNS parameters that you can set in order to prevent DNS Hijacking... Read More

  7. Four Lessons Retailers Should Have Learned from the Target Security Breach

    Netwrix recommends best practices for retailers to maintain security during holiday shopping season... Read More

  8. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  9. Fix for a 19 year old bug

    The IBM X-Force Research team has identified a significant data manipulation vulnerability that affects every version of Microsoft Windows from Windows 95 onward... Read More

  10. Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1... Read More

Featured Links