Security

Last Updated on 25 Nov. 2014, Total: 50 Blog Posts

  1. Still time to reduce threat from powerful malicious software

    The National Crime Agency is today reminding UK computer users that there is still time to protect themselves from the GoZeuS and CryptoLocker malicious software (malware) threats... Read More

  2. Wireshark latest security advisories

    If you are running a vulnerable version of Wireshark you should consider upgrading... Read More

  3. VMware product updates address OpenSSL security vulnerabilities

    OpenSSL libraries have been updated in multiple products to versions 0.9.8za and 1.0.1h in order to resolve multiple security issues... Read More

  4. Cyber Underground Economy – from Russia with love

    A Trend Micro Research Paper by Max Goncharov revisits the Russian cybercriminal underground market and reveals new information when compared to a 2012 report titled ‘Russian Underground 101’... Read More

  5. Open DNS Issues

    An open DNS server is a DNS server that responds to recursive queries (queries for domains that the DNS server is not authoritative for), and does so for anyone (not just clients on your local network)... Read More

  6. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  7. More security features for Amazon AWS

    Amazon AWS adds support for encryption of EBS data volumes and the associated snapshots... Read More

  8. Last Chance to register for the webinar: Choosing a Cloud Option to Manage Your Email

    Join Microsoft MVP Michael Noel and Hudson Casson from Metalogix on Wednesday, May 21, at 11am EDT to learn about the key factors organizations must take into account when considering a move to the cloud... Read More

  9. Heartbleed Extensions for Firefox & Chrome browsers

    The Heartbleed SSL vulnerability presents significant concerns for users and major challenges for site operators... Read More

  10. Webmin contains a cross-site scripting vulnerability

    Webmin 1.670, and possibly earlier versions, contains a cross-site scripting vulnerability... Read More

Featured Links