General

Last Updated on 23 Oct. 2015, Total: 168 Blog Posts

  1. Windows Patch Management Considerations

    There are certain times when organizations decide not to deploy a software update solution and use Windows native functionality – Microsoft Update, as their main solution. This may be the best approach when organizations have dispersed offices around the globe with a small number of standalone computers. It is simpler to enable automatic updates on these clients' computers rather than... Read More

  2. Windows Servers 2008 outbound traffic

    Managing outbound traffic has become very crucial in determining computer infections. Malware infects computers and then tries to send out stolen data to perpetrators. Viruses seek to replicate themselves by attempting to send packets to infect other computers. Users might use unapproved applications which may result in the transmission of confidential data. Therefore, it is appropriate to review your Windows... Read More

  3. Windows Servers Hardening

    A highly recommended best practice in securing Windows Servers is to stop unnecessary services and disable unused functionality. A brief checklist containing high level definitions of tasks to be performed would help administrators reduce the attack surface of their servers. A typical checklist would include: Stopping and disabling all unnecessary services and applications Renaming the Administrator account Creating a new... Read More

  4. Wireless mobile phone repeaters hacked by security experts

    The two researchers will give a demonstration about the femtocells hack at the Black Hat and Def Con hacking conferences in Las Vegas... Read More

  5. Your writing style can give you away!

    Researchers have found a technique based on linguistics that could track down users... Read More

  6. iCloud apparent flaw

    An apple user sells his MacBook Air and finds out that he can still track the device using Apple's "Find My Mac" feature, even though the laptop's hard drive has been completely erased. An apparent flaw in Apple's iCloud, allows owners of second-hand Apple devices to be tracked by the original owner, who can also remotely wipe all the data... Read More

  7. iCloud security and privacy overview

    Apple’s iCloud is built with industry-standard security practices and employs strict policies to protect users’ data... Read More

  8. “Smart defense” approach

    Here are some rules of thumb for Strategic Cyber Warning that were extracted form a paper prepared by the Smarter Alliance Initiative which is a partnership between the Atlantic Council and IBM. The key points are: Strategic disruptive effects are incredibly difficult, far harder than are usually thought. No known attacks have been both widespread and persistent enough to have... Read More