Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
On Tuesday, November 20th, routers, switches and servers across the Internet reset themselves (or attempted to reset themselves) back to the year 2000.  This sudden change was caused by a reboot of the time server at the US Naval Observatory.  Timing is ...
Blog Entry by uuallan | 26 Nov 2012 | 1 comment
Hello We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2 Metasploit: - msfupdate - Use exploit / windows / browser / ie_execcommand_uaf - Set SRVHOST 192,168 ... - Set ...
Blog Entry by Fabiano.Pessoa | 27 Sep 2012 | 0 comments
I’ve been hearing and reading about a lot of interesting comments made by various info sec professionals regarding whether or not DLP or anti-virus has outlived its usefulness.  Believe it or not, both of these important technologies are still viable ...
Blog Entry by phlphrrs | 14 Sep 2012 | 0 comments
    Many of the security issues we see with desktops and laptops today can be explained by the fact that such end-point computing devices were never designed to be connected together. It was only with the arrival of affordable network cards, then ...
Blog Entry by GregDay-SecurityCTO | 05 Mar 2012 | 1 comment
This short video provides guidance on how to configure a remote Distribution Center (based upon Windows 2008 R2) for LiveUpdate Administrator. For more information, see ...
Video by GrahamA | 06 Dec 2011 | 6 comments
The popular knowledgebase article  Configuring LiveUpdate Administrator (LUA) to download updates from another LUA Server  ( http://www.symantec.com/business/support/index?pag... )  states: "Though it is possible to configure LiveUpdate ...
Article by Mick2009 | 30 Nov 2011 | 14 comments
The word ‘Nimda’ may not be the most well remembered in the cyber-crime hall of fame but as malicious worm outbreaks go, Nimda certainly contributed to the malware landscape and was able to cause havoc on 18 September, 10 years ago in 2001. Long ...
Blog Entry by Paul Wood | 19 Sep 2011 | 0 comments
備考: このブログの寄稿者である Vivek Krishnamurthi 氏に感謝します。 繊細な心遣いが欠かせない重大行事は、常に悪用の対象として狙われています。そういった動機を前提に考えれば、スパマーが 9・11 を悪用するのも当然と言えるでしょう。あの大惨劇から 10 年目を目前に控え、スパマーは人々の心を騒がせるこの機会を最大限に利用しようとしています。 シマンテックがここ数日間に検出した例を 2 つ示します。9・11 ...
Blog Entry by Samir_Patil | 12 Sep 2011 | 0 comments
Thanks to Vivek Krishnamurthi for contributing to this blog. Every sensitive event is an opportunity to exploit. With this motive in the background, it is not surprising to see spammers exploit 9/11.  With the 10th anniversary of the tragedy ...
Blog Entry by Samir_Patil | 09 Sep 2011 | 0 comments