Original release date: July 01, 2017
Systems Affected
Microsoft Windows operating systems
Overview
On June 27, 2017, NCCIC was notified of Petya ransomware events occurring in multiple countries and affecting multiple sectors. Petya ransomware encrypts the master boot records of infected...
Original release date: June 05, 2017
Systems Affected
SNMP enabled devices
Overview
The Simple Network Management Protocol (SNMP) may be abused to gain unauthorized access to network devices. SNMP provides a standardized framework for a common language that is used for monitoring and...
Original release date: May 12, 2017 | Last revised: May 13, 2017
Systems Affected
Microsoft Windows operating systems
Overview
According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as...
Hello again, guys. I'm wondering if running 2 VPN apps at the same time is acceptable or beneficial. I'm using the Opera browser, which has its own built-in VPN, plus I also have Tunnel Bear VPN installed, but not running at same time with Opera. I reserve Tunnel Bear for other, non secured...
browser
configuration
connectivity
data protection
encryption
internet
multiple vpns
networking
online safety
opera
performance
privacy
security
settings
software
technology
tunnel bear
user experience
vpn
windows
Original release date: March 16, 2017
Systems Affected
All systems behind a hypertext transfer protocol secure (HTTPS) interception product are potentially affected.
Overview
Many organizations use HTTPS interception products for several purposes, including detecting malware that uses HTTPS...
:andwhat:
NSA Surveillance Can Penetrate VPNs
National Security Agency's XKeyscore system can collect just about everything that happens online, even things encrypted by VPNs, according to Edward Snowden.
The National Security Agency has a system that allows it to collect pretty much...
Today, a group of eight researchers from across the security industry released a research report on SHA-1 that demonstrates for the first time, a “hash collision” for the full SHA-1 hash algorithm (called “SHAttered”). This is a significant step toward understanding this type of security issue...
Hey guys,
I have a unit with a dead motherboard but with other stuff working like the hard drive and power supply. So I decided to change the motherboard only. Then I removed the hard drive and placed in on an enclosure to back up my previous files so I can perform a clean install of windows...
advisory
best practices
cryptography
cybersecurity
encryption
guidelines
information
microsoft
network security
patch
rc4
safety
security
support
system security
tech news
tech update
update
vulnerability
windows
In September 2015, Microsoft announced the end-of-support for the RC4 cipher in Microsoft Edge and Internet Explorer 11 in 2016, as there is consensus across the industry that RC4 is no longer cryptographically secure.
Today, we are releasing KB3151631 with the August 9, 2016 cumulative updates...
browser security
ciphers
cumulative updates
cybersecurity
deprecation
edge
encryption
internet explorer
microsoft
rc4
security
support
technical advisory
tls
update
web services
web standards
windows 10
windows 7
windows 8.1
Performance and security matter to everyone. Better page load performance improves the user’s experience and influences their choice over which web pages to use. At the same time, users just expect their browsing experience to be secure and private. With TCP Fast Open, TLS False Start, and TLS...
cipher suites
data integrity
edgehtml
encryption
fast open cookie
http 2.0
insider preview
microsoft edge
network traffic
performance
privacy
round trip time
security
tcp fast open
telemetry
tls 1.3
tls false start
user experience
web browsing
web standards
It is free and encrypted.
Not a great necessity but just handy to have
My normal email address will suffice
For almost all purposes
Just my plan for World Domination might require a tad more security
I reckon by 2500 I will be well along with my plan.
Haven't spotted any obvious flaws so far...
Recently Bigbearjedi and I began a conversation in another thread about our beliefs on how ordinary users can stay protected in today's very difficult climate of ransomware and encryption laced infections so lets share our beliefs as we both have active businesses and tell everyone how we...
Revision Note: V1.0 (May 10, 2016): Advisory published.
Summary: FalseStart allows the TLS client to send application data before receiving and verifying the server Finished message. This allows an attacker to launch a man-in-the-middle (MiTM) attack to force the TLS client to encrypt the first...
Revision Note: V1.0 (May 10, 2016): Advisory published.
Summary: FalseStart allows the TLS client to send application data before receiving and verifying the server Finished message. This allows an attacker to launch a man-in-the-middle (MiTM) attack to force the TLS client to encrypt the first...
advisory
application data
cipher suites
client
downgrade attacks
encryption
falsestart
microsoft
mitm
network security
protocol
records
revision note
security
server
technet
tls
update
version 1.0
Hi. I run bitlocker on my system, so everytime I boot the system up, It requires bitlocker. However I often leave my computer with only the Windows login screen showing, which requires a password. If my laptop was seized by authorities for example, while the system was still on the login screen...
authorities
bitlocker
computer
convenience
data protection
encryption
hacking
laptop
login screen
password
privacy
safety
security
system security
user access
windows