Security

Last Updated on 14 Dec. 2015, Total: 99 Blog Posts

  1. Open DNS Issues

    An open DNS server is a DNS server that responds to recursive queries (queries for domains that the DNS server is not authoritative for), and does so for anyone (not just clients on your local network)... Read More

  2. OpenSSL releases security fix for the alternative chains certificate forgery

    OpenSSL version 1.0.2d includes bug and security fixes... Read More

  3. PassiveDNS Tool

    PassiveDNS sniffs traffic from an interface or reads a pcap-file and outputs the DNS-server answers to a log file... Read More

  4. Patching: A Primer on Protecting an Organization’s Proprietary Information

    Guest post by Robert Brown, director of services Verismic Software... Read More

  5. Phishing Mitigation and Response Recommendations

    The United States Computer emergency readiness team (US-CERT) is aware of three phishing campaigns targeting U.S. Government agencies and private organizations across multiple sectors... Read More

  6. Police Ransomware Threat Assessment

    The European Cybercrime Centre at Europol publishes its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the European Union (EU) over the last two years... Read More

  7. Preventing insider attacks

    A Trend Micro’s Security Intelligence blog post groups prevention and mitigation techniques against insider attacks into two categories: technical and non-technical... Read More

  8. Recursive DNS Resolvers Vulnerability

    Recursive DNS resolvers may become stuck following an infinite chain of referrals due to a malicious authoritative server... Read More

  9. SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SM

    A vulnerability in the remote support functionality of Cisco WSAv, Cisco ESAv, and Cisco SMAv Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user... Read More

  10. Secret questions are insecure and easily forgotten

    Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google... Read More