Security Flaws in UPNP
Apologies if this has been posted already... Looks like some major security flaws have been discovered in UPNP by Rapid 7. Edit: For those who can't be bothered reading the articles - they believe the...
View ArticleStudent classroom passwords
We are setting up a video editing classroom with iMacs, to teach video editing using Final Cut X and Adobe Premier. The instructor we've hired comes from the public school system, and has taught these...
View ArticleMalwarebytes Enterprise Free Evaluation + T-Shirt!
Hi SpiceHeads, I wanted to let you in on an exclusive promotion for just for YOU! Submit your information here http://community.spiceworks.com/lg/malwarebytes_enterprise_eval and Malwarebytes will...
View ArticleHow to update BIOS on a full encrypted disk (Winmagic)?
Hi Guys, I have a clients laptop that has had full disk encrytion added a few months ago by some other IT guys from a place they deal With (Guardian) that required they have it. I was left out of this...
View ArticleHas anyone heard if the report by Rapid7, on UPnP protocol is on the up and up?
Here's one link to a press release, from yesterday:https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play I am wondering if this is...
View ArticleChinese Hackers Infiltrate New York Times Computers
For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees. FTA, "To run...
View ArticleFacility Security / Access Control
Hey guys, our building has 4 employee entrances and I am now in charge of security for it. Goal is for employees to enter the facility by either swiping a card or using a key fob with proximiy sensor...
View ArticleCracking a password
First let me say thanks for the help. I need to crack a co-worker's daughter's laptop password. She was unfortunately murdered a little over a week ago. He wants to try and use her laptop to put her...
View ArticleAre Your Databases Audit-Ready?
http://www.darkreading.com/database-security/167901020/security/news/240147285/are-your-databases-audit-ready.html.htmlSome of the most common database compliance errors
View ArticleApple nukes Java (again)
http://www.slashgear.com/apple-says-no-to-java-7-blocks-browser-plug-in-31267667 I wasn't aware Apple had this power to be honest, but blocking future versions of the software and without notice or...
View ArticleHave you read Cisco's 2013 Security Report?
Just released yesterday: http://www.cisco.com/en/US/prod/vpndevc/2013-annual-security-report.pdf Data point from Cisco report: "Java exploits comprised 87 percent of total web exploits. Additionally,...
View ArticleSchneier: possible backdoor in IPMI, iDRAC, IMM@, iLO
I did not know this. Schneier on Security: The Eavesdropping System in Your Computer Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management...
View ArticleRandom computers on the network
I am new here and I know the old IT person allowed personal equipment on the network, so I am trying to find a way to track down devices and see what they are. I have some machines showing up in DHCP...
View ArticleThink someone is trying to Hack our network
Several times (20+ so far today) a day I get the following message from our Sonic Firewall: # Time Priority Category Message Source Destination Notes Rule 1 01/31/2013 13:57:29.096 Alert Intrusion...
View ArticleLegacy Program Permissons
We are using a industry specialized software and I need help with the permissions. The program wants full access to its local client program files and full access to the server files as well (as per...
View ArticleVirus:win32\Expiro.bc
SO, here's the issue. We have a campus with about 200 machines running Windows xp/7 mostly. Today we appear to have a new virus. I first found it in a network share and Microsoft Security Essentials...
View ArticleGoogle Bids to Make Passwords Obsolete
Wired writes that Google has come up with a hardware-based authentication process that it thinks is both easy enough to use and powerful enough that people will actually adopt it. Hardware-based...
View ArticleDo you use the same admin UN and PWD for different systems on small/medium LANs?
Hello, I would like to know what people do when working on small to medium LANs in regards to their admin UNs and PWDs. Do you use the same administrative un and pwd for everything? For (for example)...
View ArticleADFS in DMZ risks
Hi All, We are looking into migrating over to O365 with SSO. Are there any security risks I should consider with having an ADFS server in the DMZ for SSO? Cheers
View ArticleLooking for a network access control system
I am looking to find a good network base access control system, where I can have cards, and pin codes in a few spots. Our facility is spread out over 450,000 sq ft, I will want the system to handle up...
View Article