• Windows Live Mesh will be retired on February 13 14 Dec. 2012 George Chetcuti

    After February 13, users of Windows Live Mesh would not be able to perform remote desktop and peer-to-peer activities. "Mesh synced storage" or "SkyDrive synced storage," will no longer be available through Mesh or devices.live.com, but copies of files on the local computer will remain unaffected. Microsoft recommends users to save all their cloud-based files to their local computers. However, if users are still syncing the files between their local computers and the Mesh cloud, then the latest versions should already be on the local computers. But for those who stopped the sync process or uninstalled Mesh, then they need to follow the steps found in the link below, to access their files: Read more here - http://windows.microsoft.com/en-GB/skydrive/mesh-users

  • “Smart defense” approach 12 Dec. 2012 George Chetcuti

    Here are some rules of thumb for Strategic Cyber Warning that were extracted form a paper prepared by the Smarter Alliance Initiative which is a partnership between the Atlantic Council and IBM. The key points are: Strategic disruptive effects are incredibly difficult, far harder than are usually thought. No known attacks have been both widespread and persistent enough to have a significant prolonged international impact. Cyber adversaries are people not ones and zeros traveling down a wire. Adversaries with the capability to cause a strategic effect are not individuals but organizations, linked to nation states. Adversaries with the intent to conduct a strategic attack usually lack the capability, while those with the capability lack the intent. Nations have never launched a major disruptive or destructive attack against another nation unless during a period of significant tensions. Physical conflict begets cyber conflict. Read Atlantic Council's issue brief here - http://www.acus.org/files/publication_pdfs/403/NATO%20Cyber%20Warning%202012.pdf

  • Cyber Terrorists plan new DDoS attacks! 11 Dec. 2012 George Chetcuti

    The cyber terrorists Izz ad-Din al-Qassam plan to attack U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks, as part of their second phase of Ababil operation as they explain it on pastebin: 'Now, we acclaim that the second phase of the Ababil operation is in ahead and from this week according to the announced plan, will be performed. In new phase, the wideness and the number of attacks will increase explicitly; and offenders and subsequently their governmental supporters will not be able to imagine and forecast the widespread and greatness of these attacks.' Read more here - http://pastebin.com/E4f7fmB5

  • Cyber Security in the UK! 10 Dec. 2012 George Chetcuti

    According to Nick Hopkinson, the former head of GCHG and CESG, UK is lagging behind the US, Germany and France in its ability to respond to cyber-attacks. This is due to a "lack of cohesion" between the various organizations set up to work towards the national cyber security strategy. But according to UK's Cabinet Office one year after the Strategy was published, a great deal has already been accomplished in protecting UK interests in cyberspace and making the UK one of the safest places to do business online. Read more here - http://www.computing.co.uk/ctg/analysis/2228122/uk-cyber-security-fragmented-and-failing#ixzz2DiwY481f Read more here - http://www.parliament.uk/documents/commons-vote-office/December_2012/03-12-12/3-Cabinet-Office-UK-Cyber-Security-Strategy.pdf

  • Latest TMG and UAG tech feeds 7 Dec. 2012 George Chetcuti

    Microsoft Forefront UAG - Configuring Forefront UAG as a DirectAccess Server (Part 2) In this article the author explains how to configure Forefront UAG as a DirectAccess Server. Comprehensive Overview of Web and Server Publishing Rules in TMG 2010 (Part 10) In this article we take a look at the details of the Server Publishing Rule we created and find out about the options that are available to you for modifying this rule. Implementing Secure Remote Access with PPTP and Forefront Threat Management Gateway (TMG) 2010 (Part 2) In this article we'll look at an additional layer of protection for PPTP by configuring the Protected Extensible Authentication Protocol (PEAP) with client certificate authentication and integrating and enforcing Network Access Protection (NAP) with VPN client quarantine. Comprehensive Overview of Web and Server Publishing Rules in TMG 2010 (Part 9) In this article, we begin with a short introduction to Server Publishing Rules and discussed the differences between Web Publishing Rules and Server Publishing Rules.

Show More