Video Screencast Help

Search

Search results

You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
A small compilation from the Symantec Portfolio including Data Sheets of several Symantec Security Products.   - Symantec™ Endpoint Protection 12.1.2 (10/12) http://www.symantec.com/endpoint-protection/data-s... - Symantec Endpoint ...
Blog Entry by SebastianZ | 02 Feb 2013 | 0 comments
On Tuesday, November 20th, routers, switches and servers across the Internet reset themselves (or attempted to reset themselves) back to the year 2000.  This sudden change was caused by a reboot of the time server at the US Naval Observatory.  Timing is ...
Blog Entry by uuallan | 26 Nov 2012 | 1 comment
In today's BYOD times, every single employee typically has a phone, tablet, PDA or other device which is routinely connected to the office network either for transfer of business data or just to recharge.  (This can be a huge security hole and is ...
Idea by Mick2009 | 19 Nov 2012 | 2 comments
Hello We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2 Metasploit: - msfupdate - Use exploit / windows / browser / ie_execcommand_uaf - Set SRVHOST 192,168 ... - Set ...
Blog Entry by Fabiano.Pessoa | 27 Sep 2012 | 0 comments
I’ve been hearing and reading about a lot of interesting comments made by various info sec professionals regarding whether or not DLP or anti-virus has outlived its usefulness.  Believe it or not, both of these important technologies are still viable ...
Blog Entry by phlphrrs | 14 Sep 2012 | 0 comments
    Many of the security issues we see with desktops and laptops today can be explained by the fact that such end-point computing devices were never designed to be connected together. It was only with the arrival of affordable network cards, then ...
Blog Entry by GregDay-SecurityCTO | 05 Mar 2012 | 1 comment
Crowne Plaza (600 Metro Place North. Dublin, Ohio 43017) Thu, 11 October, 2012 - 12:00 - 16:00 EDT ...
Event by Jonathan Brain | 22 Feb 2012 | 0 comments
インターネットを検索すると、過去数年、その年が「モバイルマルウェアの年」になると明言していた記事が多く見つかります。逆に言えば、それ以外の年はモバイルマルウェアの年になりえないということです。さらに、この検索結果は 10 年近く前までさかのぼったものです。このような予言的な文句が大胆かつ挑戦的である理由は、大抵の場合において、その記事が年初に書かれているからかもしれません。年初には、誰にもその年に何が起こるかわからないわけですから。   しかし、2011 ...
Blog Entry by Irfan Asrar | 20 Jul 2011 | 0 comments