ESET or Isheriff
Hi Guys ,I have no Idea which way to go regarding these two products. We currently have Trend Micro and will be moving to ESET or Isheriff . ESET anti-virus we had when I started here about 4 years...
View ArticlePassword requirements - Get with the times, government site
So I'm setting myself up on a government services website earlier and I needed to set a good password. My personal practice is use some kind of a phrase with some substitutions thrown in for good...
View ArticleHow Russian hackers stole the NASDAQ
I just saw this pretty in-depth article on how Russian hackers attacked NASDAQ.Some interesting excerpts:The hackers had used two zero-day vulnerabilities in combination. The use of one zero day...
View ArticleFileshare app with new method of privacy
In an attempt to bring solace to your filesharing endeavors, a new app has surfaced with an inventive, albeit cinematically dramatic approach to protecting your data.Digify is an app recently released...
View ArticleOpen Source Antivirus
Now, I may be wrong on this but here it goes:Found this:http://www.clamav.net/lang/en/Claims to be an open source antivirus. While I am for open source and free software, isn't it being open source a...
View ArticleSocial Media and our network
A new PR person has just joined the company. She has no idea how to turn a computer on, but insists that to do her job she has to have all of social media open to her. We currently use Websense and...
View ArticleIndividual File Encryption, Tracking, and Redeactability Products
So I've been tasked with researching a product I think the parent company is considering selling, and I was told to try to find competitors for this product and who else uses it or their competitor's...
View ArticleSecuring Linux
What the best way to secure Linux?I just setup a new box with virtualmin, myphpadmin and Wordpress.Later I will be adding some form of email.I have set strong passwords on root, my user account, mysql,...
View ArticleAnyone deploying EMET and enforcing settings via GPO?
I've been running EMET 4 on my Windows 8 workstation for a week or so now, and am starting to look at using it more broadly and utilizing GPO. The deployment part is easy, Local Update Publisher has...
View ArticleMobile banking apps
As our mobile devices have become our primary platform to do anything and everything- managing some of our most private and vulnerable banking information is done through an app.I found this article...
View ArticleDNS Redirect Hijack.CMD Malware?
Today at one of our remote sites I attempted to logon to our server remotely only to be notified the credentials were not correct (Of course they were). So then I went to cmd to ping our server only to...
View ArticleZero-Day Malware - Who Offers the Best Endpoint Protection?
Please note this post is NOT a "Which anti-virus is best?" but is instead focused on products specializing in alternative zero-day protection techniques.There are a number of ways to identify malware,...
View ArticleTrueCrypt rescued as ciphershed
They now have an actual fork, ew name and website:https://ciphershed.org/
View ArticleRecovered Items for eBay - POS
Along the lines of Avast's project ofrecovering data from wiped phonesfrom eBay, a researcher at HP did the same with a Point-of-Sale device and found the exact same results. Very sensitive information...
View ArticleMost awesome robotic suit?
I was just thinking how awesome it would be to have some robotic arms... like the ones on the power loader in Alien, with SigourneyWeaver driving...... when a co-worker pointed out that the robotic...
View ArticleScam Of The Week: MH17 Airplane Crash
Almost 300 people get shot out of the air and the only thing cyber-criminals can think of is how to exploit the disaster. What else is new. Disgusting.Scammers are now using the MH17 disaster in the...
View ArticleFile Shares with Encryption on a VM.
Anyone know the best way to encrypt file shares on a file server running in a VM. I have a 2008 R2 AD forest and a new Server 2012 R2 file server in a virtual farm. I'm looking into the best way to...
View ArticleHave mercy on the weak..
It's bad enough getting a phone call before 9:00am but this has just reached new heights for me.I got a call this morning from a user saying - "I have gone to the Twitter website and a Google Chrome...
View ArticleIpad on network.
I pretty much shut this down, already.Our pdc also serves as our file server for the network and each active directory user is mapped their own personal drive space upon login. I was asked today to let...
View ArticleSimulating a DDOS attack
I have a client who has asked us to simulate a DDOS attack on their network during off peak hours (Sunday morning) when there are no staff personnel on site but all computers would be available (about...
View Article