Security

Last Updated on 12 Feb. 2015, Total: 63 Blog Posts

  1. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  2. What is PoS malware?

    PoS terminals are among the most vulnerable spots in retailers’ infrastructure for a number of technical reasons... Read More

  3. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  4. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  5. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  6. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

  7. UK Cyber Security Challenge

    Cyber Security contains a diverse collection of disciplines across a broad spectrum of skills... Read More

  8. Encryption improvements for Microsoft Azure guest OS

    The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data... Read More

  9. Known issues with MS August’s security update

    After you install August’s security update, fonts that are installed in a location other than the default fonts directory (%windir%\fonts\) cannot be changed when they are loaded into any active session... Read More

  10. How do you address targeted attacks?

    TrendLabs Security Intelligence Blog published a short but very informative post on how IT administrators should strategize against targeted attacks... Read More

Featured Links