World Cup Security Team Accidentally Shares Its Awful Wi-Fi Password
Saw this earlier and thought I'd share here. What's the bigger security crime: having your Wi-Fi password displayed on a big screen, or using tired old internet speak to have "b5a2112014" as the...
View ArticleServer room door open....bad feeling
Found my server room door open. "for the past few hours, we thought you were cooling us off"No one saw who did it and no one knows exactly when it happened. Only that it was a few hours ago.What...
View ArticleCaptured my own password...
I was just going from day shift to graveyard (still have the file saved too :) ) and I noticed on a site I was using to study for certifications, paid through the agency I am going through mind you,...
View ArticleReal-time map of hacks around the world
Well, I think I'm going to trash my electronic devices, retreat to the woods and lead that nomadic lifestyle I've always dreamed of.The security firm Norse created thisreal time mapof hacks in progress...
View ArticleHi guys i have ssh server under linux machine, i need to monitor ssh session
Hi guys i have ssh server under linux machine connected to other machines, i need to monitor ssh sessions , or "logging ssh sessions" any one have any idea about this please.
View ArticleImprivata OneSign vs. 2FA - Experiences?
Hello guys and gals. At my org I have a project getting going to set up Citrix XenApp/XenDesktop in our environment (Healthcare org) and we have a lot of mobile staff that need to access their work...
View ArticleHow do you guys restrict flash drives/external hard drives?
We're looking for a way to restrict all flash drives and external drives on our network to just our approved drives. We need to ban all personal drives from being plugged into our desktops on our...
View Articlesoftware to see what shares are open, and who is logged on
Hi,I'm doing a lot of work, implementing ACL's on shares that were previously untouched. :)one thing i'm looking for, is a piece of software to tell me if the share that i'm currently setting up the...
View ArticleCryptowall - Block these IP networks and domains now!
Hi Spiceheads,Please see update below from our security provider in the US with actions to be taken to reduce chances of being infected.19 UPDATE: CIS received information from a trusted third party...
View ArticleSecurity Audit
I was approached by our internal audit committee and they are wanting me to perform and IT audit. This can be performed by a 3rd party or a member of my staff. Any ideas or recommendations?
View ArticleCloud Managed Full Disk Encryption option?
Ok, part of my next projects is to strengthen our laptop and external drive encryption tools.We at the moment use Truecrypt for the Windows 7 systems and Bitlocker for the Windows 8Both are nice and...
View ArticleMultiple Alienvault warnings a day from our DC
I'm getting concerned here. It used to be only 1 or 2 a week, but I've seen 3 alerts just today already! They are the "DC has been communicating with suspicious IP..." warnings. Our ISP manages our...
View ArticleThe USB Condom: A must have? Or just plain odd!
A common offering at conference these days is a way to charge your smart phone using USB. However, there is a danger ofjuice jacking - a way for hackers to access data on your device through USB. The...
View ArticlePWM- opensource password reset
http://code.google.com/p/pwm Anyone played with this yet? Looks pretty cool.
View ArticleURL filtering for mobile users?
Kind of as subject I guess.We have some really good protection (fingers crossed) for anyone behind our perimeter but when people are offsite there's a massive dependence on the endpoint product.What...
View ArticleIs PC Bloatware a security risk or just a Nuisance?
What Up Fellow Spiceheads.In your opinion (or experience) is Bloatware - that comes pre-installed on PCs simply just a nuisance and resource hog, or is there proof that it can cause actual security...
View ArticlePublishing certificates to inspect SSL connections and browser trusted root cert
Hi All, I am not very knowledgeable in certificates so any help or advice much appreciated. We are using a fortigate firewall and would like to use SSL inspection where the firewall intercepts SSL...
View ArticleKaspersky Endpoint Security 10 reports wrong information
KES10; Server 2008R2. KES10 sends reports that contain incorrect information. This time it was claimed that two PCs had AV protection off. After checking KES Center console, both computers show in...
View ArticleSnort
I installed snort, and acid. Snort is working but not reporting anything in acid. Acid says there are 0 sensors. If you look in mysql server the sensor table is empty. I am using Ubuntu. How do I fix...
View Articledetect keylogger installed
I was running a scan of s&d antispyware on one desktop and caught a glimpse on the scan- perfect keylogger. Just came up to my mind, in general, what are your ways of detecting if a machine has a...
View Article