Security

Last Updated on 25 May 2015, Total: 72 Blog Posts

  1. What is DNS Hijacking?

    InfoSec Institute security researcher Ali Qamar describes DNS parameters that you can set in order to prevent DNS Hijacking... Read More

  2. Four Lessons Retailers Should Have Learned from the Target Security Breach

    Netwrix recommends best practices for retailers to maintain security during holiday shopping season... Read More

  3. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  4. Fix for a 19 year old bug

    The IBM X-Force Research team has identified a significant data manipulation vulnerability that affects every version of Microsoft Windows from Windows 95 onward... Read More

  5. Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1... Read More

  6. How Secure is TextSecure?

    Security researchers from the German Gortz Institute for IT Security (Ruhr University Bochum) present the first complete description of TEXTSECURE’s complex cryptographic protocol and a thorough security analysis of TEXTSECURE... Read More

  7. Nearly 3 in 4 IT Professionals Report that SIEM Solutions Don’t Reduce Security Incidents

    Netwrix survey of 800 IT professionals finds that the majority of companies still don’t have complete visibility into what is going on across their IT infrastructures... Read More

  8. Data Breaches in Europe

    Reported Breaches of Compromised Personal Records in Europe, 2005‐2014... Read More

  9. Consumers will do anything for Free Wi-Fi

    In a Europol-supported investigation, researchers found consumers recklessly exposing their personal details via public wi-fi and carelessly agreeing to outlandish terms and conditions... Read More

  10. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

Featured Links