Energy Bill Spam Campaign Serves Up New Crypto Malware
Bon soirmes amis de l'épice!Another day...another scam where folks try to separate you from your hard earned personal data. This one is another variation on Cryptolocker with a catchy twist: it looks...
View ArticleDoes anyone else have DVR computers on their network?
I have several computers that are dedicated DVRs (Digital Video Recorders) and they are only used for the sole purpose of capturing camera footage. The scan obviously shows that they are LOW on disk...
View ArticleXP end of life software?
Hey all,Just wondering if anyone in here is going to preserve their XP machines. Sorry if this is a repost or in the wrong category... Please move it wherever. I'm curious what the best software to...
View Articleiboss vs websense or any other web-filtering tool - yay or nay?
What do you guys think, is iboss better than websense? We are currently using websense and their customer service is horrible. Tool is all-right, however, we recently participated in an iboss...
View ArticleSpoofing attack
Hi All,From where we able to get the spoofing actual address in order to block at the smtp level?ThanksVC
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticlePUM.hijack....
So we had a PC in our environment acting strange (not able to close programs or connect to network drives), so I scanned it with Malwarebytes. It came back with 2 questionable entries: PUM.hijack.run...
View ArticleKaspersky Application Vulnerability Scans
Do any of you using Kaspersky allow the security center to fix application vulnerabilities? I ask because my security center shows a ton of vulnerabilities (2 Microsoft and 76 others (Adobe, Mozilla,...
View ArticleAlternative ways to do a clean uninstall for new programs/applications?
Hey spicefam!I am trying to download some new games from the internet and since the internet can contain a lot of malware and unwanted stuff. I want to try out some new games and some new software for...
View ArticleSecurity Groups and Organization of File Sharing Permissions
Hello All -Wondering if I can bounce some ideas off of you all? I have a few file shares on the network and we are getting to the point of restricting access to various items... the previous IT...
View ArticleRecommendations for Best Secure Configurations Mgmt. and Privilege user Mgmt.?
We are researching for suitable and cost effective solutions for Secure Configurations Mgmt. and Privilege user identity and access Mgmt. on our IT Infrastructure including AD, domain servers,...
View ArticleMy CryptoWall story
Looking today i see at least 3 new posts about Cryptolocker/wall. Well you can add my story to the list.Yesterday at around 2pm our office was hit with Cryptowall, We had a user who was reporting...
View ArticleHow do you track and manage your IT passwords?
Curious how everyone tracks their passwords that are typically shared with others for administrative purposes. Passwords for say admin server accounts, switches, web portals, etc. We currently use a...
View ArticleTruecrypt: Not dead yet!
According to Softpedia, a new team of developers plans to fork Truecrypt and continue development. They're soliciting feedback at truecrypt.ch.
View ArticleWhich encryption do you use?
Hi Guys,We are currently using HP's Winmagic Securedoc which comes with HPs Probooks and Elitebooks. The encryption does its job the only problem is if something goes wrong with the OS eg. BCD you cant...
View ArticleHeartbleed Removal Tool...not so much.
Hey all Spiceheads,Been a while since I've posted much on Heartbleed but our Security Response team has recently uncovered a sneaky little spam campaign designed to lure users to download a Heartbleed...
View ArticleLarge Scale IP Camera Surveillance Software
I am looking for surveillance software that is capable of monitoring around 500 cameras or more. This is for large scale use. Possible example:...
View ArticleKaspersky Key Usage Is Driving Me Bonkers
I keep running into this same problem and I can't seem to figure out how to correct it, maybe you can help?? Whenever I push install Kaspersky onto a new machine it shows "Not Activated" for up to a...
View ArticleBlock IP or lock account after multiple failed log in attempts
We have a terminal server that is exposed to the internet. Bad idea, I know, but it was this way before I started and I've been trying to convince them to change it for some time now. Anyway,...
View ArticleWhatsApp in School
Evening everyone.One more topic tobe solvedon the bucket list today...To cut to the chase, we are reluctantly enabling WhatsApp for pupils to access in our schools through Smoothwall (our firewall) and...
View Article