information security

  1. MikeHawthorne

    Windows 10 Anyone know anything about Duck Duck Go?

    Hi I just ran across this search engine that says it doesn't track you or distribute your information. What I like it that it doesn't have the paid entries at the top of the list and a lot less advertising. It also seems to be faster then Google or the other search engines I've been using but...
  2. pnamajck

    ssd-drives vulnerable to attacks …

    just wanting to run this past you guys … this post is straight from our good friends at bleepingcomputer.com … and the issue is in regards to the inherent vulnerabilities with current ssd-drives. i don't have much to say, since i do not own an ssd-drive …...
  3. News

    MS16-144 - Critical: Cumulative Security Update for Internet Explorer (3204059) - Version: 1.0

    Severity Rating: Critical Revision Note: V1.0 (December 13, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
  4. News

    MS16-148 - Critical: Security Update for Microsoft Office (3204068) - Version: 1.0

    Severity Rating: Critical Revision Note: V1.0 (December 13, 2016): Bulletin published Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file...
  5. News

    Security Update for Microsoft .NET Framework 2.0 SP2 on Windows 8.1 and Windows Server 2012 R2

    A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain access to information. Link Removed
  6. J

    Windows 8 Enforcing EFS at ALL TIMES on a folder

    I need to enforce a permanent EFS policy on a given folder. I already know how to turn on the EFS setting on a folder, so that all files copied into it or created in it are automatically encrypted by EFS. Now, the problem is that Windows allows the user to manually disable the EFS on a file...
  7. News

    Introduction: Chris Betz, new head of MSRC

    By way of introduction, I am Chris Betz, the leader of the Microsoft Security Response Center (MSRC). I’m stepping in to fill the shoes of Mike Reavey, who has moved on to become the General Manager of Secure Operations, still within Trustworthy Computing. Since joining the MSRC, I’ve spent...
  8. News

    Welcome to the Windows Forum!

    You have reached a worldwide forum community for open Microsoft Windows help and support. About Us WindowsForum.com is an open community for Microsoft Windows customers and enthusiasts. It is not owned or operated by Microsoft Corporation, but the website has produced many dozens of...
  9. W

    Windows 7 random pasting of data from previous copyin one file appearing in anothe rfile

    After doing a copy and paste, we have, on 3 occasions so far, found the copied data in an entirely different file. Twice data from a copy appeared in an excel spreadsheet and once a picture copied in facebook appeared in an email. The excel problem is very worrysome as it is our family budget...
  10. Mike

    Windows 7 List of Site Sponsored Software

    Here is a list of site sponsored software that may be useful for you if you need a solution to resolve system issues over a long-term period. We have sponsored with these sites as affiliate partners to bring to you some of the best software and hardware available for Microsoft Windows: General...
  11. JMH

    Windows 7 Why Hackers Write Computer Viruses

    Maximum PC | Why Hackers Write Computer Viruses
  12. JMH

    Windows 7 Understanding Encryption – What is Encryption?

    What is the Definition of Encryption? How Does Encryption Work?
  13. JMH

    Windows 7 Toshiba website hacked - email addresses and passwords exposed

    Toshiba website hacked – email addresses and passwords exposed | Naked Security
  14. Mike

    VIDEO The Myth of the Ethical Hacker

    "From the rise of retro fashion trends, art, music, and literature (as inspired by some great 21st century works of literature like "Pride and Prejudice and Zombies" and the complete stereo remastered works of The Beatles), I explore the notion of a Hacking Renaissance taking place today and...
  15. reghakr

    Hotmail and Yahoo users also victims of targeted attacks

    IDG News Service - Web mail users at Yahoo and Hotmail have been hit with the same kind of targeted attacks that were disclosed earlier this week by Google, according to security software vendor Trend Micro. Trend Micro described two similar attacks against Yahoo Mail and Windows Live Hotmail...
  16. reghakr

    Session Hijacking

    In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system. For example, when a user logs in to a web site, the user's PC is tagged with a session...
  17. News

    Windows 7 Web Security: Cashier-as-a-Service(Caas) and How to Shop for Free Online

    Web applications increasingly integrate third-party services. The integration introduces new security challenges due to the complexity for an application to coordinate its internal states with those of the component services and the web client across the Internet. In this paper, we study the...
  18. cybercore

    Can data stored on an SSD be secured?

    Study finds the task to be very difficult; overwriting or crypto-erasure seem the best methods for sanitizing SSDs Until a university study emerged last week, few experts suspected that it's more difficult to erase data stored on solid-state drives (SSD) than that on hard disk drives (HDDs)...
  19. News

    Windows 7, Macs and HTML5 at risk in 2011

    Phil Muncaster, V3.co.uk , Tuesday 14 December 2010 at 12:08:00 Panda Security announces its predictions for the coming year Threats targeting Windows 7, Mac and HTML5 are likely to keep information security professionals busy in 2011, with hactivism and state-sponsored attacks also set to...
  20. Captain Jack

    Windows 7 Hackers Access McDonald's Customer Data

    An unknown number of Link Removed after authorities discovered that hackers broke into one of the company's business partner's databases and stole information. Computerworld quotes a McDonald's spokeswoman as saying: We have been informed by one of our long-time business partners, Arc...
Back
Top