encryption

  1. VIDEO Should You Encrypt Your Computer Hard Drive?

    :andwhat::up:
  2. TA17-181A: Petya Ransomware

    Original release date: July 01, 2017 Systems Affected Microsoft Windows operating systems Overview On June 27, 2017, NCCIC was notified of Petya ransomware events occurring in multiple countries and affecting multiple sectors. Petya ransomware encrypts the master boot records of infected...
  3. TA17-156A: Reducing the Risk of SNMP Abuse

    Original release date: June 05, 2017 Systems Affected SNMP enabled devices Overview The Simple Network Management Protocol (SNMP) may be abused to gain unauthorized access to network devices. SNMP provides a standardized framework for a common language that is used for monitoring and...
  4. TA17-132A: Indicators Associated With WannaCry Ransomware

    Original release date: May 12, 2017 | Last revised: May 13, 2017 Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as...
  5. Windows 10 Run 2 VPN's at Same Time?

    Hello again, guys. I'm wondering if running 2 VPN apps at the same time is acceptable or beneficial. I'm using the Opera browser, which has its own built-in VPN, plus I also have Tunnel Bear VPN installed, but not running at same time with Opera. I reserve Tunnel Bear for other, non secured...
  6. TA17-075A: HTTPS Interception Weakens TLS Security

    Original release date: March 16, 2017 Systems Affected All systems behind a hypertext transfer protocol secure (HTTPS) interception product are potentially affected. Overview Many organizations use HTTPS interception products for several purposes, including detecting malware that uses HTTPS...
  7. VIDEO The Internet Exposed: Encryption, Backdoors and Privacy – and the Quest to Maintain Trust

    :andwhat: NSA Surveillance Can Penetrate VPNs National Security Agency's XKeyscore system can collect just about everything that happens online, even things encrypted by VPNs, according to Edward Snowden. The National Security Agency has a system that allows it to collect pretty much...
  8. SHA-1 Collisions Research

    Today, a group of eight researchers from across the security industry released a research report on SHA-1 that demonstrates for the first time, a “hash collision” for the full SHA-1 hash algorithm (called “SHAttered”). This is a significant step toward understanding this type of security issue...
  9. F

    Windows 7 Cannot move encrypted files to new system.

    Hey guys, I have a unit with a dead motherboard but with other stuff working like the hard drive and power supply. So I decided to change the motherboard only. Then I removed the hard drive and placed in on an enclosure to back up my previous files so I can perform a clean install of windows...
  10. Microsoft security advisory: Update for disabling RC4

    Continue reading...
  11. RC4 is now deprecated in Microsoft Edge and Internet Explorer 11

    In September 2015, Microsoft announced the end-of-support for the RC4 cipher in Microsoft Edge and Internet Explorer 11 in 2016, as there is consensus across the industry that RC4 is no longer cryptographically secure. Today, we are releasing KB3151631 with the August 9, 2016 cumulative updates...
  12. Windows Security Hardening (SCHANNEL)

    I created this reg file to disable SSLv2, v3 and TLS 1.0 as well as disabling weak encryption cipher suites.
  13. Windows 10 BitLocker Recovery auto-shutdown in UEFI mode

    Continue reading...
  14. Building a faster and more secure web with TCP Fast Open, TLS False Start, and TLS 1.3

    Performance and security matter to everyone. Better page load performance improves the user’s experience and influences their choice over which web pages to use. At the same time, users just expect their browsing experience to be secure and private. With TCP Fast Open, TLS False Start, and TLS...
  15. COMEDY Just started to use ProtonMail

    It is free and encrypted. Not a great necessity but just handy to have My normal email address will suffice For almost all purposes Just my plan for World Domination might require a tad more security I reckon by 2500 I will be well along with my plan. Haven't spotted any obvious flaws so far...
  16. "New Product Antivirus & Malware Considerations: from some Windows Forums Pros!"

    Recently Bigbearjedi and I began a conversation in another thread about our beliefs on how ordinary users can stay protected in today's very difficult climate of ransomware and encryption laced infections so lets share our beliefs as we both have active businesses and tell everyone how we...
  17. 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0

    Revision Note: V1.0 (May 10, 2016): Advisory published. Summary: FalseStart allows the TLS client to send application data before receiving and verifying the server Finished message. This allows an attacker to launch a man-in-the-middle (MiTM) attack to force the TLS client to encrypt the first...
  18. Description of the security update for Schannel: April 12, 2016

    Continue reading...
  19. 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0

    Revision Note: V1.0 (May 10, 2016): Advisory published. Summary: FalseStart allows the TLS client to send application data before receiving and verifying the server Finished message. This allows an attacker to launch a man-in-the-middle (MiTM) attack to force the TLS client to encrypt the first...
  20. S

    Windows 10 How secure is the login screen?

    Hi. I run bitlocker on my system, so everytime I boot the system up, It requires bitlocker. However I often leave my computer with only the Windows login screen showing, which requires a password. If my laptop was seized by authorities for example, while the system was still on the login screen...