Category: Security/Firewalls

NSA’s involvement with Microsoft Windows Vista 0

NSA’s involvement with Microsoft Windows Vista

Since the news broke about NSA’s involvement with Windows Vista, some in the media are trying to portray it as a conspiracy theory. I’ve read comments, such as “News emerged this week that top...

Protecting Network with Server and Domain Isolation 2

Protecting Network with Server and Domain Isolation

If you would like to add another layer of protection to your current security model, a server and domain Isolation solution based on Internet Protocol security (IPSec) and Active Directory can allow your network...

Windows Vista Security Guide 0

Windows Vista Security Guide

Check out the recently published Windows Vista security guide. This guide provides helpful recommendations on how you can strengthen the security of your client computers running Windows Vista in a domain environment. The guide...

Google Searchers Find Malware 0

Google Searchers Find Malware

Some visitors to the Google Italy site are getting an unwelcome surprise this week, as a look-alike site hijacks their browsers and installs malware on their machines. Researchers at IT security vendor SurfControl plc...

Microsoft Opening Up Vista Kernel To Security Vendors 0

Microsoft Opening Up Vista Kernel To Security Vendors

Microsoft also bent to demands from security vendors and the EU’s antitrust agency that it change its Vista plans for Windows Security Center, the operating system’s security dashboard. It will not entirely disable the...

White House Selects Cybersecurity Chief 0

White House Selects Cybersecurity Chief

The White House has chosen an industry information security specialist as its cybersecurity chief, an official said Monday, filling a job that has had no permanent director for a year. Greg Garcia will be...

What is Strider “HoneyMonkey”? 0

What is Strider “HoneyMonkey”?

The Strider HoneyMonkey Exploit Detection System, as the research project is code-named, was created to help detect attacks that use Web servers to exploit unpatched browser vulnerabilities and install malware on the PCs of...

Hackers Jailed for Zotob Worm Attack 0

Hackers Jailed for Zotob Worm Attack

Two Moroccan hackers have been jailed for creating and distributing the Zotob worm that squirmed through Windows 2000 networks in August 2005. According to law enforcement authorities, the online names of both men were...

Microsoft’s Family Safety Enters Public Beta 0

Microsoft’s Family Safety Enters Public Beta

After a period of internal beta testing, Microsoft today released the Family Safety service to public beta. At the same time, Microsoft announced plans to move Family Safety into the OneCare brand, along with...

Vista RC1 Disables Built-in Administrator Account 0

Vista RC1 Disables Built-in Administrator Account

Everyone (except the hackers) would agree that having a built-in Administrator account with no password is not a good idea. Therefore, Microsoft has decided to disable the built-in Administrator account under most circumstances in...

SecureWorks Finds SQL Injection Hacker Attacks on the Rise 0

SecureWorks Finds SQL Injection Hacker Attacks on the Rise

SecureWorks, a leading Managed IT Security Services Provider, announced that it has seen a dramatic increase in the number of hacker attacks attempted against its banking, credit union and utility clients in the past...

Vista Hacked at Black Hat 0

Vista Hacked at Black Hat

While Microsoft talked up Windows Vista security at Black Hat, a researcher in another room demonstrated how to hack the operating system. Joanna Rutkowska, a Polish researcher at Singapore-based Coseinc, showed that it is...

Apple Announces Patches for 26 Major Security Flaws on Macs 0

Apple Announces Patches for 26 Major Security Flaws on Macs

Not Again! On May 11, 2006 Apple Computer announced 43 Mac OS X and QuickTime security patches (Security Update 2006-003). This included 31 flaws in the Mac OS X, most of them serious enough...

U.S. Government Mandates Laptop Security 0

U.S. Government Mandates Laptop Security

The US government is giving federal civilian agencies just 45 days to comply with new recommendations for laptop encryption and two-factor authentication. The official memo (PDF) from the executive office of the U.S. president...

Enigma Project Cracks Second Code 0

Enigma Project Cracks Second Code

Online codebreaking enthusiasts working to solve a series of German World War II ciphers have cracked the second of three codes. Thousands of users around the world have joined the M4 Project, using spare...

Rootkits Get Better at Hiding 0

Rootkits Get Better at Hiding

A new Trojan horse is so good at hiding itself that some security researchers claim a new chapter has begun in their battle against malicious-code authors. The new pest, dubbed “Rustock” by Symantec and...

Top 100 Network Security Tools 0

Top 100 Network Security Tools

Insecure.org has released a 2006 survey of 3,243 people (users from the nmap-hackers mailing list) about their favorite security tools. The tools include open source as well as commercial products on any platform. The...

Microsoft “Phoning Home” Once Again…..Then Backing Down Somewhat 0

Microsoft “Phoning Home” Once Again…..Then Backing Down Somewhat

Microsoft designed Windows Genuine Advantage (WGA) to prevent software piracy. WGA consists of two components: Validation and Notification. The validation part ensures that you are using a legal copy of Windows, while the notification...

Is Microsoft’s Definition of Spyware Acceptable to Security Experts? 0

Is Microsoft’s Definition of Spyware Acceptable to Security Experts?

According to Microsoft “Broadly speaking, spyware is deceptive software that is installed on a user’s computer without the user’s consent and has some malicious purpose.” Brian Livingston of WindowsSecrets.com disagrees with Microsoft definition. He...

Protect E-mail and Collaboration Servers with Microsoft Antigen 0

Protect E-mail and Collaboration Servers with Microsoft Antigen

Microsoft recently announced the release of Microsoft Antigen e-mail security products, including Antigen for Exchange, Antigen for SMTP Gateways, Antigen Spam Manager and Antigen Enterprise Manager. These products will be available to customers on...

Using SQL Injection to Bypass Security Controls 0

Using SQL Injection to Bypass Security Controls

To demonstrate some of the security issues, Joel Helgeson of Appiant.net has posted a video that shows how he used SQL injection to bypass security controls on a college Web site. In this video...

Hackers Aiming At New Target: Instant Messages 1

Hackers Aiming At New Target: Instant Messages

Instant messaging, the quicker-than-e-mail alternative for online communication, is moving rapidly from teenagers’ bedrooms to mainstream America. Last month, the number of instant messages containing computer “malware” soared by 500 percent from the previous...

Security Feature in Windows Vista Could Drive Users Nuts 0

Security Feature in Windows Vista Could Drive Users Nuts

An annoying surprise awaits 2 million consumers expected to enthusiastically step forward in the next few weeks to help Microsoft test its new Windows Vista PC operating system. Beta 2 testers can expect to...

Microsoft Releases Updated Version of MSRT 0

Microsoft Releases Updated Version of MSRT

Microsoft has released the Microsoft Windows Malicious Software Removal Tool to help remove specific, prevalent malicious software from computers that are running Microsoft Windows Server 2003, Microsoft Windows XP, or Microsoft Windows 2000. The...

Spammer Identifies ‘Secure’ E-Mails 0

Spammer Identifies ‘Secure’ E-Mails

One spammer has managed to identify e-mail addresses on a “do-not-spam” list touted as secure, taking advantage of an obvious flaw with such lists and prompting critics to wonder what took so long. “Do-not-spam”...