Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

Ubiquity Cameras

Is anyone else excited about this new set of cameras?http://uv.ubnt.com/I see a lot of potential for a fraction of the cost.

View Article


Conficker? GO Zeus? Getting on blacklists suddenly

Hello guys,A client is having issues that I deal with regularly which I originally found was infected with some variants of Conficker.However, the delicate balance to this is their environment has CNC...

View Article


Sophos shifting threat response work to India

http://www.theregister.co.uk/2014/06/04/sophos_moves_threat_response_ops/Kind of figures I guess.. 

View Article

PC Infected with backdoor.necurs!kmem

Hi,We had two users within our work place who clicked the same link in a email that was malicious. We ran a full scan on both PCs and one of the PCs showed it was still infected with the...

View Article

LanGuard OVAL:22538

I am checking out my LanGuard and I found this security errorOVAL:22538A router or firewall allows source routed packets from arbitrary hosts (CVE-1999-0510)Anybody have any thoughts pertaining to...

View Article


The Fiends Behind Cryptolocker Got Busted

http://www.usatoday.com/story/news/nation/2014/06/02/global-cyber-fraud/9863977/But for those of us that had to endure the agony of dealing with an infection, I doubt this is much of a...

View Article

Phone Scam.

I have seen various scam attempts here on the forums.I had one this morning.It start out by them stating that my computer was reporting errors to them. Which they didn't even try to pretend they were...

View Article

Pros and Cons of Firewall,Antivirus and IT Policy- To our Manager.

Dear Geeks,I am failing to execute the proposal of Firewall(H/W) ,Antivirus and IT Policy.The reason is our Manager saying that " Antivirus in OK but what is this Firewall and IT Policy ? ,I cannot...

View Article


Strange entry into a contact form on our company website

My company's website has a contact form and in that form someone entered this:TextFrom: afuuykvhij <> Subject: VThEYnSuTqUMfW Message Body: wZfwPi href="http://iyjsclmhfnpy.com/">iyjsclmhfnpy...

View Article


How are you preparing for the Internet of Things?

Spiceworks just published a good survey showing Spiceheads' views on IoT.  - Only 29% of the IT pros surveyed are preparing for IoT today.  - Of that group, 63% are investing in Security solutions to...

View Article

Security issues with Spiceworks

my IT chief is putting security issues on the table.He wants me to check if SW is transmitting any info byck to the spiceworks Servers and if so which.I am thinking about blocking SW completely outside...

View Article

Security stories, let's share

Stories can trigger all sorts of emotions for us, they can make us happy, sad, mad, or even more aware and cautious of plausible scenarios. I came across an interesting article that illustrates the...

View Article

XP end of life software?

Hey all,Just wondering if anyone in here is going to preserve their XP machines. Sorry if this is a repost or in the wrong category... Please move it wherever. I'm curious what the best software to...

View Article


Cryptolocker file decryption

We had a cryptolocker infection a while ago and due to faulty backups had to pay the ransom to get our files decrypted. We have one file left over that has not been decrypted but we have the private...

View Article

Security Groups and Organization of File Sharing Permissions

Hello All -Wondering if I can bounce some ideas off of you all? I have a few file shares on the network and we are getting to the point of restricting access to various items... the previous IT...

View Article


Is physical security really that important?

If you're like me, you probably read the topic title and thought, "What?  Are you kidding?"  I'm playing a little bit of devil's advocate here.  I'm trained in InfoSec so no one is a stronger advocate...

View Article

Anti-Virus / Anti-Spam Endpoint and Perimeter Protection

Dear All,Please suggest an Anti-Virus / Anti-Spam software vendor that can provide reliable perimeter scan A/V-A/S device/engine & and easily manageable endpoint protection.Thanks a lot,Dimitris

View Article


Researchers urge hackers to exploit Hyper-V's huge attack surface

From: Ms. Smith, NetworkWorld, June 3, 2014"At the Hack in the Box security conference in Amsterdam, ERNW security researchers Enno Rey, Felix Wilhelm, and Matthias Luft presented...

View Article

After the Crypto locker ransomware game changer... What we did.

Nothing like testing your backup solution with a full restore to a user home drive and several mapped drives. The second round we got hit with caused a complete 'drop everything' and make the policy,...

View Article

Image may be NSFW.
Clik here to view.

"Best to use IE8 and IE9 [With our system]" / How to upgrade browser posthaste

"You can't be serious" was the first thing that went through my mind while reading the bulletin that was released for a system we're forced to interact with. I've included some of the highlights in the...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>