Ubiquity Cameras
Is anyone else excited about this new set of cameras?http://uv.ubnt.com/I see a lot of potential for a fraction of the cost.
View ArticleConficker? GO Zeus? Getting on blacklists suddenly
Hello guys,A client is having issues that I deal with regularly which I originally found was infected with some variants of Conficker.However, the delicate balance to this is their environment has CNC...
View ArticleSophos shifting threat response work to India
http://www.theregister.co.uk/2014/06/04/sophos_moves_threat_response_ops/Kind of figures I guess..
View ArticlePC Infected with backdoor.necurs!kmem
Hi,We had two users within our work place who clicked the same link in a email that was malicious. We ran a full scan on both PCs and one of the PCs showed it was still infected with the...
View ArticleLanGuard OVAL:22538
I am checking out my LanGuard and I found this security errorOVAL:22538A router or firewall allows source routed packets from arbitrary hosts (CVE-1999-0510)Anybody have any thoughts pertaining to...
View ArticleThe Fiends Behind Cryptolocker Got Busted
http://www.usatoday.com/story/news/nation/2014/06/02/global-cyber-fraud/9863977/But for those of us that had to endure the agony of dealing with an infection, I doubt this is much of a...
View ArticlePhone Scam.
I have seen various scam attempts here on the forums.I had one this morning.It start out by them stating that my computer was reporting errors to them. Which they didn't even try to pretend they were...
View ArticlePros and Cons of Firewall,Antivirus and IT Policy- To our Manager.
Dear Geeks,I am failing to execute the proposal of Firewall(H/W) ,Antivirus and IT Policy.The reason is our Manager saying that " Antivirus in OK but what is this Firewall and IT Policy ? ,I cannot...
View ArticleStrange entry into a contact form on our company website
My company's website has a contact form and in that form someone entered this:TextFrom: afuuykvhij <> Subject: VThEYnSuTqUMfW Message Body: wZfwPi href="http://iyjsclmhfnpy.com/">iyjsclmhfnpy...
View ArticleHow are you preparing for the Internet of Things?
Spiceworks just published a good survey showing Spiceheads' views on IoT. - Only 29% of the IT pros surveyed are preparing for IoT today. - Of that group, 63% are investing in Security solutions to...
View ArticleSecurity issues with Spiceworks
my IT chief is putting security issues on the table.He wants me to check if SW is transmitting any info byck to the spiceworks Servers and if so which.I am thinking about blocking SW completely outside...
View ArticleSecurity stories, let's share
Stories can trigger all sorts of emotions for us, they can make us happy, sad, mad, or even more aware and cautious of plausible scenarios. I came across an interesting article that illustrates the...
View ArticleXP end of life software?
Hey all,Just wondering if anyone in here is going to preserve their XP machines. Sorry if this is a repost or in the wrong category... Please move it wherever. I'm curious what the best software to...
View ArticleCryptolocker file decryption
We had a cryptolocker infection a while ago and due to faulty backups had to pay the ransom to get our files decrypted. We have one file left over that has not been decrypted but we have the private...
View ArticleSecurity Groups and Organization of File Sharing Permissions
Hello All -Wondering if I can bounce some ideas off of you all? I have a few file shares on the network and we are getting to the point of restricting access to various items... the previous IT...
View ArticleIs physical security really that important?
If you're like me, you probably read the topic title and thought, "What? Are you kidding?" I'm playing a little bit of devil's advocate here. I'm trained in InfoSec so no one is a stronger advocate...
View ArticleAnti-Virus / Anti-Spam Endpoint and Perimeter Protection
Dear All,Please suggest an Anti-Virus / Anti-Spam software vendor that can provide reliable perimeter scan A/V-A/S device/engine & and easily manageable endpoint protection.Thanks a lot,Dimitris
View ArticleResearchers urge hackers to exploit Hyper-V's huge attack surface
From: Ms. Smith, NetworkWorld, June 3, 2014"At the Hack in the Box security conference in Amsterdam, ERNW security researchers Enno Rey, Felix Wilhelm, and Matthias Luft presented...
View ArticleAfter the Crypto locker ransomware game changer... What we did.
Nothing like testing your backup solution with a full restore to a user home drive and several mapped drives. The second round we got hit with caused a complete 'drop everything' and make the policy,...
View Article"Best to use IE8 and IE9 [With our system]" / How to upgrade browser posthaste
"You can't be serious" was the first thing that went through my mind while reading the bulletin that was released for a system we're forced to interact with. I've included some of the highlights in the...
View Article