Quantcast
Channel: General IT Security
Browsing all 13445 articles
Browse latest View live

Preparation for mock security audit

My org is having a mock security audit tomorrow.  Anyone here have advice as to how I should prepare?  Should I have any reports ready for the security group or should I just let them lead the way?...

View Article


Old viruses gaining new life thanks to the Internet of Things

Excerpts fromSoftpedia coverage: A company called iPower Technologies has discovered that body camerassold by Martel Electronics come pre-infected with the Conficker worm. In terms of malware,...

View Article


MDM - What do you do with yours?

We're looking for an MDM solution that supports iOS, Android, and Windows Phone.For both company phones and to allow access to a secure mail container on personal handsets.Having rolled out a trial...

View Article

Microsoft removes ransomware from 24,000 computers

Microsoft todayannouncedthat it has removed ransomware from 24,000 Windows machines this yearwith the Microsoft Malicious Software Removal Tool (MSRT), a virus removal tool built into the Windows...

View Article

Access Authorization Automation and Tracking

Hi All,I could really use your help. I am looking for a way to automatically track access authorization for new users and transferring employees. There are certain systems and resources in our...

View Article


Tech Support scam uses LogMeIn

I got a call today from someone whose husband clicked on a tech support scam link, called the phone number, gave them a credit card before she came in and got suspicious. She called me, I said it was a...

View Article

Penetration Testing on a single computer

Hi all. I am new to Spiceworks and hope someone can help me. I am looking for a tool to do penetration tests on a single computer not the entire network. I need to know what ports are open, patches...

View Article

Securing a "new to me" remote site

So not sure where to post this so I ended up here. My company has purchased another company. I have done some preliminary research and am finding some pretty large concerns regarding software licensing...

View Article


Legal Obligation to Disclose Data Breach to Affected Parties? (UK)

Its is not as bad as the title might suggest: I am currently working on an Incidence Response Plan for my UK based employer and want to make sure we have procedures covered if any incident of data...

View Article


One huge burrito, hold the infosec...

This may be my favorite Krebs article of all time for so many reasons. Not the least of which is that Chipotle has no clue as to why sending emails from a domain YOU DO NOT OWN is a bad thing... or...

View Article

Thotcon - Anyone been to it? Worth attending?

Chicago's Thotcon InfoSec conference was recently brought to my attention and, to my surprise, it's been running for a few years and I'd never once heard of it.Has anyone been to this conference?  If...

View Article

Microsoft Improves Security Practices with a Holistic Approach

Microsoft CEO Satya Nadella gave a keynote speech in Washington, D.C. today about the future of computers and cyber security. He spoke of anew holistic approach that is going to bring about enhanced...

View Article

UAC Won't Come Out Of Disabled Mode

I have one Windows 8.1 machine that is giving me a headache.  I cannot get UAC out of "Disabled" aka: Never Notify mode.I have reset it to the default value and rebooted.  This failed.  I have checked...

View Article


Need help - which product to buy?

Hello,I am trying to find out which product/suite I should go with?Details:3 Windows users on laptopsNeed to encrypt outbound emails and the whole hard drive.I am looking at Symantec Drive Encryption,...

View Article

Image may be NSFW.
Clik here to view.

Ransomware News Roundup November 2015

DecryptorMax 24-hour deadlineRansomware strains use different ways to pressure victims into paying, varying from 7 days after which the ransom doubles, to threatening to publish files on the Internet...

View Article


Image may be NSFW.
Clik here to view.

usage of storage.googleapis.com

Hi there,Just now, someone called me saying his pc reporting a keylogger installed, apparently detected by Internet Defender bearing the Windows logo.The strange thing is, it's coming from one of...

View Article

Image may be NSFW.
Clik here to view.

Security vs. Trust – It’s all about Behavior

I was looking over the definition of secure the other day and found the following entry:v. fix or attach (something) firmly so that it cannot be moved or lostAnd then I applied it to security...

View Article


Stopping the lanmanserver service with FSRM/File Screens

Hello,Among several other layers of security, I have a File Screen setup in FSRM with particular file names to alert me if those file names are written to a shared folder in the event that a ransomware...

View Article

Image may be NSFW.
Clik here to view.

Security and Compliance Issues Expected to Use One-Third of IT Budgets

Some say, "It's not a question IF your network will be breached, the only question is WHEN." (http://yourdailytech.com/2015/11/09/security-and-compliance-issues-expected-to-use-one-third-of-it-b...) 

View Article

Interesting article on LastPass security

http://www.martinvigo.com/even-the-lastpass-will-be-stolen-deal-with-it/Fascinating read even if I don't understand all of it - nothing is perfect and it's encouraging to see the comments on how...

View Article
Browsing all 13445 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>