Posted By Carl Engelbrecht

 
Posted By Carl Engelbrecht

"Have you ever made a connection to a potentially compromised remote machine using a privileged domain account and wondered if there was any chance that your privileged credentials could be revealed in some way to the attacker? I have. After wondering and worrying about it, the curiosity (and paranoia) finally got to me and so I set off on a journey to research attacks against domain credentials, and in particular, their implication for incident responders. I've presented on this topic a few times and now I will (finally) take the time to document my findings. This is the first article in what will be a multi-part series on this research."

preview.tinyurl.com/82qcjdz


 
Posted By Carl Engelbrecht

"An estimated half million users of compromised computer systems risk losing their Internet connection next month unless a federal judge extends a court order authorizing a California not-for-profit to operate a network of surrogate domain-name-system servers."

preview.tinyurl.com/6ryy8ju


 
Posted By Carl Engelbrecht

"GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research."

preview.tinyurl.com/76927o5


 
Posted By Carl Engelbrecht

"Facebook, Twitter, Instagram, Foursquare, Foodspotting, Yelp, and Gowalla are among a smattering of iOS applications that have been sending the actual names, email addresses and/or phone numbers from your device’s internal address book to their servers, VentureBeat has learned. Several do so without first asking permission, and Instagram and Foursquare only added permissions prompts after the Path flare-up."

preview.tinyurl.com/7zmuzl8


 
Posted By Carl Engelbrecht

"Juniper Networks today released its 2011 Mobile Threats Report which showed a 155 percent increase in mobile malware across all mobile platforms in 2011, and a whopping 3,325 percent increase in malware specifically targeting the Android platform in the last seven months of 2011 alone."

preview.tinyurl.com/7pygap8


 
Posted By Carl Engelbrecht

"Within the first three hours of this malware campaign, some 60,000 Facebook users had been duped into visiting the malicious link."

preview.tinyurl.com/7dta7y9


 
Posted By Carl Engelbrecht

"Companies and home users whose computers or routers are infected by the DNSChanger Trojan risk being unable to access the Web come March 8, 2012, when the FBI unplugs the legitimate DNS servers it set up to replace the rogue DNS servers that were forwarding victims to malicious sites. The removal of the fed's band aid could impact a substantial number of users, too, as half of Fortune 500 companies and government agencies are infected with the malware, according to a new report."

preview.tinyurl.com/6mr27cw


 
Posted By Carl Engelbrecht

"Following the release of new versions of its open source Firefox web browser, Thunderbird email client and SeaMonkey suite, Mozilla has detailed the security fixes included in each of the updates. According to the project's Security Center page for Firefox, version 10.0 closes a total of 8 security holes in the browser, 5 of which are rated as "Critical" by Mozilla."

preview.tinyurl.com/7k4pr4l


 
Posted By Carl Engelbrecht

"Security watchers have uncovered a new highly targeted email-borne attack that uses a supposed conference invitation as a lure - and disguises extracted data as Microsoft Update traffic."

preview.tinyurl.com/88g8r9w


 
Posted By Carl Engelbrecht

Should an industry have a chat about Social Media ROI without a serious mention of risk management and the cost of Social Networking? Evidence proves this will get ugly with a claim from all of technical ignorance. Shhh…let the audits begin!

"While the basic risks of social media are well known to most enterprise security managers, there are many dark corners of social media that can be just as dangerous or even more so. Here are three ways that social media can sneak malware and exploits across your corporate firewalls, and ways that you can pay attention and hopefully prevent their misuse. The biggest issue is that many corporate executives don't really know what is going on across their networks, and don't have any visibility into the traffic patterns and potential exploits."

preview.tinyurl.com/7vquuks


 
Posted By Carl Engelbrecht

"Only half of IT professionals believe that their organization made its best effort to protect customer and consumer information, according to a survey by credit reporting firm Experian and research from the Ponemon Institute."

preview.tinyurl.com/74hl3bd


 
Posted By Carl Engelbrecht

"Most government employees do not consider their usernames and passwords to be hot commodities, but that attitude began to change with a network attack on security contractor HBGary Federal."

preview.tinyurl.com/73tkltv


 
Posted By Carl Engelbrecht

"New Ponemon-Experian study highlights organizations' top priorities following a data breach"

preview.tinyurl.com/777bont


 
Posted By Carl Engelbrecht

Telnet...Really?

"Cisco has warned of a vulnerability in the telnet server used in its IronPort Email Security Appliances (ESA) and IronPort Security Management Appliances (SMA) monitoring solutions. The vulnerability could be exploited by an attacker to remotely execute code on a system by sending a specially crafted command to the telnet daemon (telnetd)."

preview.tinyurl.com/ 6v9ooy l


 


 
Google

User Profile
Carl Engelbr...
Male
Holly Spring...

 
Archives
 
Visitors

You have 2213786 hits.