Latest posts

Page 9

Sharing and storing data? File this away

How are telecommuters sharing the files, folders and communications generated in the course of collaborating? And what measures are taken to protect privacy, ensure safety and meet compliance? The answers matter.

Continue reading

Organized cybercrime: bad guys go pro, highlighting “customer service”

This increasing “professionalization” of the cybercrime industry is troubling for many reasons. Security expert, Deb Shinder looks into this.

Continue reading

UPDATE 2: Microsoft recommends uninstalling problematic updates

Microsoft has reportedly recommended to customers that they uninstall the KB2982791 (MS14-045) update, which is an update that was supposed to fix kernel-mode driver vulnerabilities. It’s also investigating additional problems with three more of the August update.

Continue reading

UPDATE: Patch problems galore – and a community-provided fix

Microsoft update causes problems for users affecting Outlook archived mailboxes and some experiencing blue screens. Community provided fix available.

Continue reading

Top 10 free tools for network monitoring and analysis [Video]

We’ve selected the top ten tools for digital forensic investigation and incorporated them in this short video. Enjoy!

Continue reading

You’ve got (malicious) mail

Unfortunately, email-based malware has gotten much more malevolent over time. And security pros should not see email as “old hat” or an outdated form of attack. Deb Shinder explains why.

Continue reading

August Patch Tuesday roundup

Nine security bulletins were released in August, addressing 37 vulnerabilities, most of them in Windows and a few in server products.

Continue reading

Are vulnerabilities really a risk or simply hype?

Vulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?

Continue reading

Microsoft bumps up security on IE after it earns title of “most exploited browser”

Microsoft is adding a new security feature to Internet Explorer. It’s called Out-of-date ActiveX Control Blocking.

Continue reading

Five great ways to stay in control of a mobile workforce

With mobile working widely expected to continue gaining in popularity, IT departments need to know how to maintain control and security of IT infrastructure. Here are five tips on how to do that.

Continue reading