cyber security

  1. News

    Taste of Premier: How to Mitigate Pass-the-Hash and Other Forms of Credential Theft

    Lex Thomas welcomes Mark Simos, an Architect for the Cyber, Security and Identity team here at Microsoft, to discuss tools, techniques and services that are available to help mitigate “Pass-the-Hash” and other forms of cyber credential theft. Tune in as they give us an in-depth overview of the...
  2. News

    Vulnerability in TCP Protocol Could Allow Denial of Service - Version: 1.0

    Severity Rating: Important Revision Note: V1.0 (June 10, 2014): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a sequence of specially crafted packets to the...
  3. News

    The Next Leap Forward in Cyber Defense: Taking Action to Help Defeat Adversaries

    It is often said that attackers have an advantage, because the defenders have to protect every part of their systems all the time, while the attacker only has to find one way in. This argument oversimplifies the security landscape and the real strength that defenders can achieve if they work...
  4. MikeHawthorne

    Windows 8 Belarc Advisor, tells you everything about your computer!

    Hi I was going to add this to a post from someone who didn't have any COA sticker on their computer telling them what their Windows 8 registration number was, but I thought that other people might be interested too. I know that most of the people here are familiar with Belarc Advisor but this...
  5. News

    TA13-024A: Content Management Systems Security and Associated Risks

    Original release date: January 24, 2013 | Last revised: February 06, 2013 Systems Affected Web-based Content Management Systems, specifically Joomla! installations. Overview This Alert was developed as a collaborative effort between Public Safety Canada and the U.S. Link...
  6. S

    Windows 7 Software for monitoring children

    So I'm no parent or anything and I can't give details but we got a foster child in the house now who has to be closely monitored using the computer. As most of us know you don't want to sit there and monitor your child while they use the computer, you got better things to do, right? Well for me...
  7. whoosh

    VIDEO New Computer Virus "Flame" Most Sophisticated & Complex Cyber Weapon to Date

    :confused:
  8. JMH

    Windows 7 The cyber crime tide is turning

    Link Removed
  9. reghakr

    With Anonymous and LulzSec, is anyone believable?

    For several months, hackers have been having a heyday taking down Web sites and leaking data from compromised servers with victims ranging from the CIA and U.S. Senate to Sony, Citigroup and the Turkish government. A 19-year old was arrested Tuesday but they can't confirm he's part of either...
  10. kemical

    IE8 Released today

    Today Microsoft Corp. announced the availability of WindowsLink Removed Internet Explorer 8, the new Web browser that offers the best solution for how people use the Web today. It can be downloaded in 25 languages at Link Removed starting at noon EDT on March 19. Internet ExplorerLink Removed 8...
Back
Top