ICloud disabled for security reasons
Hello,can evryone help me pls.Apple has stoping my icloud account email doesnt came to me for reset password and i have forgot security answer and i cant activate my Iphone 4...dipiertoluigi@icloud.com
View ArticleTruecrypt is dead?
Spotted on /r/sysadminhttp://truecrypt.sourceforge.net/I didn't realise this was happening?
View ArticleMXGuarddog IP address flagged by AlienVault
Received an AlienVault warning in Spiceworks that my mailserver is communicating with a suspicious address 66.85.178.50, which is the IP of our Anti-Spam service,...
View ArticleSecurity Audit Remediation help
I am new to the whole security remediation thing. However I have 4 clients that need them for small to medium sized networks. So I need to get up to speed on this. I plan on spending time here on...
View ArticleWorld Cup streaming
Does anyone have a handy list of streaming sites to block?With World Cup coming up, I need to block streaming lest my people stream the network into oblivion.On that note - anyone have recommendations...
View ArticleProtection from ransomware
Recently my workplace has come across Cryptolocker, which crippled the production network with file corruption/encryption. After reading tons of posts and trying various solutions. We had to restore...
View ArticleLogon quandry maybe a intrusion?
I am definetly not a security expert so i must ask for help.I noticed a session open in server manager (win srvr 2003 r2) of a username(mark) on a machine he does not use(04W6JXV) Today i asked this...
View ArticleCryptowall Attack Experience
Hello fellow Spiceheads. I’d just like to relate a little story to you in case it may help you out in the future.We’ve just been hit with the Cryptowall virus/malware/nasty bug/whatever. This nasty is...
View ArticleReceive suspicious activity on webserver
Every so often there is a suspicious file that makes it's way over to our webserver. This time it was an index.php file that is known for identity theft. I usually delete the file and then change the...
View ArticleWe fought a cryptovirus (and the virus won)
This is the 315th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View ArticleHow to prevent users installing any toolbars?
Hi AllAnyone got any clever ideas to stop our 400 users installing toolbars only?Thanks
View Articletalk about Bit9, why do you use bit9?, why don't you use Bit9?
We are investigating Bit9 for a potential security software in our company. Would you please share us your experiences (negative or positive) in using Bit9. What is special in Bit9 that make you select...
View ArticleNew Ransomware CryptoWall Comes With Nasty Twist
There is a new ransomware strain called CryptoWall hitting organizations.Late April, the cyber criminals who developed the CryptoDefense ransomwarereleased a new variant called CryptoWall. This strain...
View ArticleKaspersky security center 10 with windows 2012 r2
hi guysAny one having issues with Kaspersky security center 10 with windows 2012 r2?I do see after install on server2012 vm environment hyper replication does not work.Not sure Kaspersky even...
View ArticleApple Wi-Fi MAC address tracing prevention
Like most good ideas, this is nice and simply, and before you all post "but it still gets your real address" re-read it, thats not what it's trying to do, you can afterall spoof MAC addresses very...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleFinally Some Good News iPhone Ransomware Gang Busted
Finally some good news for a change. John Zorabedian at Sophosreportedthe following:"The mystery of the ransom messages from "Oleg Pliss," and the iDevice locking attack that popped up in Australia and...
View ArticlePolicies and Tasks for Kaspersky
Attached I have an image showing how I have my KES console broken down. Once I created my structure I moved the policies and tasks to the servers and the workstations containers, made them active, told...
View ArticleLooking for network camera suggestions
We need to purchase a networked IP camera for security purposes for our home. It doesn't have to be anything fancy. I would like it to either record to an SD card or my networked NAS.This will be...
View ArticleUse Your Head: Do Not Fall For FIFA World Cup Scams
Okay...so we can probably file this one under Duh...We're uh...IT PROs remember?BUT...you never know. PLUS...you guys have to deal with sales and marketing types who tend to click things. Our intrepid...
View Article