The USB Condom: A must have? Or just plain odd!
A common offering at conference these days is a way to charge your smart phone using USB. However, there is a danger ofjuice jacking - a way for hackers to access data on your device through USB. The...
View ArticleWho would like to purchase some NSA hacking hardware?
If you never heard of the NSA ANT catalog I would suggest you take a quick look at it. In it you find some pretty interesting hardware that is available to the NSA agents.Some security analysts decided...
View ArticleNetwork bandwidth monitor
How can i know the bandwidth used by a particular PC within a LAN ?
View Article32,000 Supermicro servers broadcast BMC admin password
ars article Unpatched BMCs in Supermicro motherboards contain a binary file that stores remote login passwords in clear text. Vulnerable systems can be detected by performing an Internet scan on port...
View ArticleTrueCrypt Alternatives for Windows
As TrueCrypt developers no longer supporting it, what are the alternatives we have? why they are suggesting only bitlocker for windows platforms?
View ArticlePrevent from downloading
Hi, my sisters are using my computer when i'm not. So i want them to stop downloading in my computer, anything. But they dont. is there any way for them to stop from downloading from my computer? pls...
View ArticleWay for parents to view security cameras
We currently have Geovision setup to allow parents access to the security cameras of our childcare center. About 16 cameras.Each parent is limited to the room that their child is assigned to.If you...
View ArticleKaspersky causing lots of problems, even when disabled...
Hey all, hopefully someone can come up with a better solution than I have to my problem. We've just moved to Kaspersky Security Center 10 with Endpoint 10 and it's been doing some really strange...
View ArticleEndpoint Security Demands Organizational Changes
Network World posted thisarticletoday about Endpoint Security, how it has changed, and whypeople think it is dead. He even included some stats of what security professionals at enterprise organizations...
View ArticleCryptowall - Block these IP networks and domains now!
Hi Spiceheads,Please see update below from our security provider in the US with actions to be taken to reduce chances of being infected.19 UPDATE: CIS received information from a trusted third party...
View ArticleWhat Do You Use for Server Patch Management?
I have roughly 60 servers and right now I'm just using WSUS, but that still means I have to manually touch each server. Â This means that some servers go months without having patches applied because I...
View ArticleAncestry.com hacked
Hate to be the bearer of bad news, but here's another hack job that has come across my radar. I guess Dominos Pizza doesn't have to feel too bad...
View ArticleCodeSpaces.com goes under after DDoS attack
Lost most of their data, can't recover.. pretty crazy. Still a good idea to have data replicated both internally and in the Cloud, I guess.http://www.pcmag.com/article2/0,2817,2459765,00.asp
View ArticleAny Free software to turn WebCam into Security Camera?
Anyone know of any good free software that would turn a webcam into a security camera? So I can record video when a motion is detected?
View ArticleEthernet over Powerlines (EoP), Security Concerns
I was recently pondering about Ethernet over Power technology (EoP). I am fairly new to this tech, but I have been using EoP adapters when setting up IP cameras at residences because it's way easier...
View ArticleWhat do you think of Zenefits security?
Just learned about a free online HR/Payroll management startup called Zenefits.com. Free is good (Spiceworks is free :)). I'm concerned about security though, since they handle names, email, birthday,...
View Articlenew open source router - letting strangers use your wi-fi is good?
I can't seem to wrap my mind around this being a good thing. It's nice that the device will give the owner priority and keep the strangers firewalled so they won't get to your network, but still... It...
View ArticleKaspersky endpoint security 10 issues with VNC and file sharing/security
Hello spiceheads,I just installed Kaspersky endpoint security on one of the PC on a remote network, I'm using VNC to install remotely; but when the installation comes up to the activation step, i...
View ArticleLarge Scale IP Camera Surveillance Software
I am looking for surveillance software that is capable of monitoring around 500 cameras or more. This is for large scale use. Possible example:...
View ArticleImprivata OneSign vs. 2FA - Experiences?
Hello guys and gals. At my org I have a project getting going to set up Citrix XenApp/XenDesktop in our environment (Healthcare org) and we have a lot of mobile staff that need to access their work...
View Article