Security

Last Updated on 16 Dec. 2014, Total: 56 Blog Posts

  1. Encryption improvements for Microsoft Azure guest OS

    The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data... Read More

  2. Known issues with MS August’s security update

    After you install August’s security update, fonts that are installed in a location other than the default fonts directory (%windir%\fonts\) cannot be changed when they are loaded into any active session... Read More

  3. How do you address targeted attacks?

    TrendLabs Security Intelligence Blog published a short but very informative post on how IT administrators should strategize against targeted attacks... Read More

  4. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

  5. Malicious Word documents & Associated Phishing campaign

    In this two-part series three security researchers present an analysis of a particular attack that combines spearphishing and exploit attempt... Read More

  6. The Balkan Computer Congress

    Balkan Computer Congress is an international hacker conference organized by LUGoNS – Linux Users Group of Novi Sad and Wau Holland Foundation from Hamburg and Berlin... Read More

  7. Still time to reduce threat from powerful malicious software

    The National Crime Agency is today reminding UK computer users that there is still time to protect themselves from the GoZeuS and CryptoLocker malicious software (malware) threats... Read More

  8. Wireshark latest security advisories

    If you are running a vulnerable version of Wireshark you should consider upgrading... Read More

  9. VMware product updates address OpenSSL security vulnerabilities

    OpenSSL libraries have been updated in multiple products to versions 0.9.8za and 1.0.1h in order to resolve multiple security issues... Read More

  10. Cyber Underground Economy – from Russia with love

    A Trend Micro Research Paper by Max Goncharov revisits the Russian cybercriminal underground market and reveals new information when compared to a 2012 report titled ‘Russian Underground 101’... Read More

Featured Links