Security

Last Updated on 14 Dec. 2015, Total: 99 Blog Posts

  1. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

  2. Email authentication latest threats

    Authentication solves several specific issues related to email, but other problems are completely out of scope. Attackers know this, and have designed some of their attacks accordingly. Perversely, they are actually using authentication to improve the quality of their campaigns... Read More

  3. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

  4. Encryption improvements for Microsoft Azure guest OS

    The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data... Read More

  5. Enterprise Risk Management Simplified

    SimpleRisk is a free and open source web application, released under Mozilla Public License 2.0, and is extremely useful in performing risk management activities... Read More

  6. Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1... Read More

  7. File synchronization services can be easily turned into an infrastructure for endpoint compromise

    Security researchers from the Imperva Hacker Intelligence Initiative demonstrate a new type of attack referred to as “Man in the Cloud” (MITC)... Read More

  8. Firefox browsers block vulnerable Flash Player Plugin

    Flash Player Plugin 18.0.0.203 (click-to-play) has been blocked for your protection... Read More

  9. Fix for a 19 year old bug

    The IBM X-Force Research team has identified a significant data manipulation vulnerability that affects every version of Microsoft Windows from Windows 95 onward... Read More

  10. Four Lessons Retailers Should Have Learned from the Target Security Breach

    Netwrix recommends best practices for retailers to maintain security during holiday shopping season... Read More