data security

  1. VIDEO ICYMI – Recapping Microsoft Edge at Ignite 2020

    October is National Cybersecurity Awareness month (NCSAM) and it couldn’t be more timely. Vulnerability to online threats is literally top of mind for everybody. In a Link Removed, 90% of respondents (yes, you read that right) indicated that phishing attacks have impacted their organizations...
  2. AA20-239A: FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks

    Original release date: August 26, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This joint advisory is the result of analytic efforts among...
  3. AA20-205A: NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems

    Original release date: July 23, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor techniques and mitigations. Over recent...
  4. VIDEO AA20-049A: Ransomware Impacting Pipeline Operations

    Original release date: February 18, 2020 | Last revised: June 30, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor...
  5. Everything new from Microsoft Edge at Build 2020

    Microsoft Build 2020 can be defined by a set of ‘firsts’—it’s the first Build of the new decade, the first Build that’s all-digital for 24 hours a day, and the first Build since the new Microsoft Edge launched! We’re learning a lot as we deliver Build and Microsoft Edge in new ways. Last year...
  6. Scalable infrastructure for investigations and incident response

    Traditional computer forensics and cyber investigations are as relevant in the cloud as they are in on-premise environments, but the methods in which to access and perform such investigations differ. This post will describe some of the challenges of bringing on-premises forensics techniques to...
  7. V

    Copy protect USB files

    Hello, I would like to load up USBs with songs and talks. Then I would like to copy protect them. The user should be able to see the list of songs or talks and can select the one they want to listen. But they should not be able to copy it onto their PC and then freely distribute it. I have...
  8. K

    Hide backup drives from malware

    I have implemented a method to 'hide' external USB backup drives from Windows. The process works as follows: - use Device Manager to determine the Hardware ID or Parent ID of the USB drive - label the USB drive appropriately - create a script to invoke Removedrive (freeware by Uwe Sieber) with...
  9. Can Blockchain Fix the Opioid Epidemic? Intel Wants to Find Out

    The chipmaker, working with health companies, aims to use so-called blockchain technology -- similar to the one that underpins the digital currency Bitcoin -- to better trace drugs and potentially stem the epidemic. Continue reading...
  10. J

    Windows 10 Bitlocker benefits for PCs that dont leave the office?

    We have a few laptops in our office that we are looking at putting some encryption on as they often leave the office. Bitlocker seems the best solution with it already on Windows 10 and free. I just wonder is Bitlocker worth putting onto the desktop PCs that are in the office and don't ever...
  11. December 2017 security update release

    Today, we released security updates to provide additional protections against malicious attackers. By default, Windows 10 receives these updates automatically, and for customers running previous versions, we recommend they turn on automatic updates as a best practice. More information about...
  12. Cybersecurity and Data Protection: Learning the New Rules

    Sponsored by: KeepItSafe - Date: Thursday, 12/14/17 at 2:00 PM EST Continue reading...
  13. N

    Windows 7 Securely deleting backup files

    Hello: Kinda related to a previous thread, but not the same question so..... Awhile back, I backed up my iPhone 5S to a computer. I have sensitive data on in (on the strong end, my clients personal financial data/SSN/cc numbers). I need/want to securely remove all of my phones backup data from...
  14. D

    Windows 10 Questions - Eliminating Ransomware

    I'm trying to understand the nature of virus/malware/ransomware to better apply my backup strategies. So here are some questions I have: Question Scenario #1 - Lets say I have 2 internal hard drives connected to my PC. One with Windows10 installed and the other one with Linux installed. I use...
  15. MS17-007 - Critical: Cumulative Security Update for Microsoft Edge (4013071) - Version: 1.0

    Severity Rating: Critical Revision Note: V1.0 (March 14, 2017): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge...
  16. TA16-288A: Heightened DDoS Threat Posed by Mirai and Other Botnets

    Original release date: October 14, 2016 Systems Affected Internet of Things (IoT)—an emerging network of devices (e.g., printers, routers, video cameras, smart TVs) that connect to one another via the Internet, often automatically sending and receiving data Overview Recently, IoT devices...
  17. K

    Windows Server Files Auditing - Tracking File Tampering/ Data Loss prevention

    We anticipate threats like files being deleted from servers by disgruntled employees. 1. Can someone suggest what preventive measures that can be implemented ? (DLP implementation is in pipeline, but would like to see if there are alternate measures) 2. If somehow files are deleted, we would...
  18. MS16-118 - Critical: Cumulative Security Update for Internet Explorer (3192887) - Version: 1.0

    Severity Rating: Critical Revision Note: V1.0 (October 11, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
  19. MS16-102 - Critical: Security Update for Microsoft Windows PDF Library (3182248) - Version: 1.0

    Severity Rating: Critical Revision Note: V1.0 (August 9, 2016): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted...
  20. BitLocker Discussion

    Do ya'll use Bit Locker? All NSA and Microsoft backdoor, giving the keys to the government, talk aside. I'm more interested in encrypting my drive to keep my information safer, in case it's stolen or some type of malware gets on. I'm interested in hearing people's experiences using it. Did you...