OS & Software

E595c1d49bf4a26f8e14ce59812af80e

7 Security Threats You May Have Overlooked

November 11, 2014 Added by:Patrick Oliver Graf

In today’s business environment, the list of overlooked network security threats is endless. Information security professionals are modern-day gladiators, tasked with defending corporate data and networks against both known and unknown threats, but no matter how skilled they are, there will always be new threats to their networks.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

New Zero-day in Microsoft OLE Being Exploited in Targeted Attacks

October 22, 2014 Added by:Pierluigi Paganini

Security experts at Google and McAfee have discovered a new zero-day vulnerability in Microsoft OLE being exploited in targeted attacks.

Comments  (1)

Default-avatar

iWorm The First OSX Bot To Use Reddit For CnC: Expect Mac malware to surge

October 07, 2014 Added by:Cyphort

Nowadays, as half of newly issued computers in the enterprise are Macs, OSX malware is also becoming more prevalent.

Comments  (3)

766e428d1e232bbdd58664b41346196c

Poisoning the Well: Why Malvertising is an Enterprise Security Problem

September 18, 2014 Added by:Elias Manousos

While customers won’t know or care which ad network delivered a malicious ad, they will blame the organization that owns the website or placed the ad that attacked them.

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

Improving Microsoft Patching

September 02, 2014 Added by:Tripwire Inc

We frequently work with customers who use patch management solutions and are missing patches. The reason? I don’t think anyone fully understands the Microsoft Patching process and the third-parties don’t always get it right either.

Comments  (0)

Default-avatar

Windows Meets Industrial Control Systems (ICS) Through HAVEX.RAT – It Spells Security Risks

July 31, 2014 Added by:Cyphort

Since the first report on Havex RAT’s involvement with Industrial Control Systems (ICS) emerged last month, ICS operators were reminded to what extent malware authors will go to intrude their systems.

Comments  (1)

219bfe49c4e7e1a3760f307bfecb9954

Software Security: An Imperative to Change

June 05, 2014 Added by:Rohit Sethi

Attention-grabbing exploits are becoming the norm. We hear about bugs like Heartbleed and IE 0days almost every week. Understandably the public is concerned about insecure technology. Yet for those of us who work in information security, this isn’t news at all. We have long known that insecure software is the root cause of most breaches.

Comments  (1)

B1c4090e84dcfac820a2b8ebe6eee82b

New Insights into Email Spam Operations

June 01, 2014 Added by:Gianluca Stringhini

Recently, we have been working on gaining a better understanding of spam operations and of the actors involved in this underground economy. We believe that shedding light on these topics can help researchers develop novel mitigation techniques, and identifying which of the already-existing techniques are particularly effective in crippling spam operations, and should therefore be widely deployed.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Proactively Hardening Systems: Application and Version Hardening

May 20, 2014 Added by:Tripwire Inc

If configuration hardening settings are “conditional,” meaning they must find and keep that balance between security and productivity, hardening against known vulnerabilities in applications and versions is much more black-and-white.

Comments  (0)

Fafdf1720f4df1d41c6eacbd2429a06b

A Windows Authentication Flaw Allows Deleted/Disabled Accounts to Access Corporate Data

May 06, 2014 Added by:Tal Be'ery

Since Kerberos authentication and authorization is based solely on the ticket – and not on the user’s credentials, it means that disabling the user’s account has no effect on their ability to access data and services.

Comments  (0)

23712318a400454a2c049f165106d985

Windows XP End of Life: What Your Organization Can Expect

April 09, 2014 Added by:Scott Montgomery

Whether you want to acknowledge it or not, the Windows XP and 2003 applications and servers in your estate are going to be at significant risk in a few weeks.

Comments  (0)

Fafdf1720f4df1d41c6eacbd2429a06b

Remote Desktop’s Restricted Admin: Is the Cure Worse Than the Disease?

April 01, 2014 Added by:Tal Be'ery

One of the new security features in the latest Windows release (Windows 8.1) is the “Restricted Admin mode for Remote Desktop Connection”. This measure is meant to enhance Windows credential protection against attacks such as Pass-the-Hash and Pass-the-Ticket. However, it appears that cure might be worse than the disease as the new “Restricted Admin mode” opens a new attack surface for the...

Comments  (0)

37c1b0270687e8148e56508e805f8b8e

The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Is the Agent.btz malware the link between Snake and Red October?

March 13, 2014 Added by:Pierluigi Paganini

The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Zero Trust and the Age of Global Connectivity

February 27, 2014 Added by:Simon Moffatt

The internal 'trusted' network no longer exists. Employees often pose the biggest threat to information assets, even though they are trusted with legitimate accounts on protected internal machines. Zero Trust is a recent security approach that looks to move away from network segmentation and focus more on data and resources and who can access them, when and from where.

Comments  (0)

094983f35f079e5bd15fdc2f9ce9297c

ZeroAccess – The Sleeping Threat

February 20, 2014 Added by:Edward Jones

ZeroAccess, also known as Sirefef, is one of the most robust and durable botnets in recent history. It was first discovered back in July 2011 and has since infected almost 2 million Windows computers all over the world and cost online advertisers over £1.6 million each month through fraudulent clicks!

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »