Replace pre-installed antivirus on your Black Friday laptop deal

Replace pre-installed antivirus on your Black Friday laptop deal, , http://blog.avast.com/2014/11/27/replace-pre-installed-antivirus-on-your-black-friday-laptop-deal/, Black Friday and Cyber Monday abound with deals on laptops. When you purchase a new laptop one of the first...

Defaced websites leading to Dokta Chef Exploit Kit and CVE-2014-6332

Defaced websites leading to Dokta Chef Exploit Kit and CVE-2014-6332, , http://research.zscaler.com/2014/11/defaced-websites-leading-to-dokta-chef.html, Defacing websites has been the main stay for hacktivist groups to spread their message.  During recent research, we found...

Four Fresh Perspectives on Protecting the World’s Information

Four Fresh Perspectives on Protecting the World’s Information, , https://www.pkware.com/Blog/2014/11/26/four-fresh-perspectives-on-protecting-the-world-s-information, As we move along in the “year of encryption” – and it feels more like the “year of the...

JoomDonation Compromised

JoomDonation Compromised, , http://blog.sucuri.net/2014/11/joomdonation-compromised.html, We are receiving reports from many users of the popular JoomDonation platform that they received a very scary email from someone that supposedly hacked into JoomDonation. The emails went to...

XKCD, Red Rover

XKCD, Red Rover, , http://xkcd.com/1449/, via Randall Munroe, at XKCD.Permalink, Security Bloggers Network, Marc Handelman, , Like this:Like Loading...

The Experimental API Search Engine [What Could Go Wrong…]

The Experimental API Search Engine [What Could Go Wrong…], , http://www.infosecurity.us/blog/2014/11/21/what-could-go-wrong-the-experimental-api-search-engine, Behold, Ladies and Gentlemen, Girls and Boys, a newly minted experimental search engine, this time targeting APIs looses...

Change is inevitable – Time to re-write the playbook

Change is inevitable – Time to re-write the playbook, , http://www.securitybistro.com/?p=9023, Hopefully most of you in the industry have noticed that the approach to DDoS protection has changed dramatically over the last few years. What was once considered a good defensive...

Configuration Manager Connection to Intune

Configuration Manager Connection to Intune, , http://windowsitpro.com/azure/configuration-manager-connection-intune, Learn some key points for System Center Configuration Manager to Intune connectivity and functionality. read more, Security Bloggers Network, Windows IT Pro, ,...

The cloud security rules: Five factors to consider with the cloud

The cloud security rules: Five factors to consider with the cloud, , http://feedproxy.google.com/~r/kairoer/~3/M4PxD3gyLWY/, Cloud services is a sector that is still growing strong. As part of the Information Security Buzz question for the Expert Panel in October, I looked into...
%d bloggers like this: