Entries by fdesir

Bad SSH Key Management Leaves Databases At Risk

A posting from Dark reading in there Database Security Section: A “gaping hole” in the way enterprises govern the use of one of IT’s least sexy but most used access control and encryption protocols is leaving many sensitive database servers and other network devices at serious risk. Secure Shell (SSH)–a Swiss army knife in the arsenal of […]

‘Activation lock’ to tighten iOS security

A posting from Cnet News in there Security and Privacy section; Apple may not be able to do anything to stop a mugger from stealing your iPhone, but changes in iOS 7 will prevent the thief from trying to sell the phone as new. At its Worldwide Developers Conference here on Monday, Apple unveiled several security enhancements. Activation Lock […]

Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac

A posting  from Naked Security: Midsummer Patch Tuesday (or midwinter, depending on your latitude) takes place on Tuesday 11 June 2013. As you probably already know, Microsoft publishes an official Advance Notification each month to give you early warning of what’s coming. These early notifications generally don’t give any details, summarising only the basics, such as: The […]

12 Endpoint Security Myths Dispelled

A posting from Dark Reading in there Endpoint  Security  section: It’s been years now since the security pundits have taken up the mantle to dispel the myth that AV alone is enough to protect the typical endpoint. And while that misconception does hang on in certain quarters, to a large degree it has been discussed ad […]

New proof-of-concept malware demonstrates virus for OS X

A posting from Cnet  News in there Security and Privacy Section: Security researchers have found a proof-of-concept attack that appears to be the first true viral malware approach for compromising OS X. The malware is called “Clampzok.A” and is a cross-platform malware package that alters the binary files on an affected system so when executed, the binary […]

Evernote offers two-factor verification in wake of hack

A posting from NBS News in there Technology Section: Popular media-saving service Evernote has stepped up its security after a recent breach in which users’ emails and passwords were leaked. The company is now offering two-factor verification to its premium users to make sure that when someone signs into your account, it’s really you. The hack, in March, did not […]

‘NetTraveler’ Cyberespionage Campaign Uncovered

An intrstuing  article from Dark Reading: A less sophisticated but long-running cyberspying program out of China aimed at high-profile targets in government, embassies, oil and gas, military contractors, activists, and universities has infected hundreds of targets across 40 nations. The so-called NetTraveler campaign revealed today by Kaspersky Lab comes from a midsize APT group out […]

Are Businesses Knowingly Infecting Their Web Visitors?

A posting from  Dark reading in there Vulnerability and Threat section: As cybercriminals have shifted their techniques to get the most efficiency out of their attack campaigns, some of their favorite methods involve two-pronged attacks to first compromise legitimate Web servers and then use them to, in turn, infect unsuspecting visitors to seemingly innocuous sites. While much […]

End user security requires layers of tools and training as employees use more devices and apps

A posting from Dark Reading in there Endpoint security section: When Meritrust Credit Union wanted to improve its endpoint security to comply with financial regulations, information security officer Brian Meyer needed to go beyond antivirus. The commonly used endpoint security typically doesn’t provide a way of tracking whether employees’ devices — the laptops, tablets and […]