-
Privacy and Security Discussion
What do to protect your identity online? What's your threat model? How did you come up with your threat model? What are your primary concerns with your information being online and the online services and apps you use? How do you protect yourself online? Do you use Gmail or Protonmail? Do you...- Axel PC
- Thread
- banking blur.com data protection discussion gmail identity security information security keypass lastpass online safety online services password management privacy privacy.com proton mail security threat model tips user concerns
- Replies: 31
- Forum: Windows Security
-
J
Windows 10 Bitlocker benefits for PCs that dont leave the office?
We have a few laptops in our office that we are looking at putting some encryption on as they often leave the office. Bitlocker seems the best solution with it already on Windows 10 and free. I just wonder is Bitlocker worth putting onto the desktop PCs that are in the office and don't ever...- jase8888
- Thread
- benefits bitlocker cybersecurity data security desktop encryption encryption benefits hard drive information security it solutions laptop microsoft office office security portable privacy risk management technology windows 10 windows features
- Replies: 1
- Forum: Windows Help and Support
-
Cybersecurity and Data Protection: Learning the New Rules
Sponsored by: KeepItSafe - Date: Thursday, 12/14/17 at 2:00 PM EST Continue reading...- News
- Thread
- 12/14/17 best practices cybersecurity data security digital safety information security keepitsafe learning new rule online event privacy pro regulatory compliance risk management security awareness technology threat detection webcast webinar
- Replies: 4
- Forum: Live RSS Feeds
-
Windows 10 Anyone know anything about Duck Duck Go?
Hi I just ran across this search engine that says it doesn't track you or distribute your information. What I like it that it doesn't have the paid entries at the top of the list and a lot less advertising. It also seems to be faster then Google or the other search engines I've been using but...- MikeHawthorne
- Thread
- advertising chrome extension duckduckgo fast browsing information security privacy search engine user experience
- Replies: 4
- Forum: Windows Help and Support
-
ssd-drives vulnerable to attacks …
just wanting to run this past you guys … this post is straight from our good friends at bleepingcomputer.com … and the issue is in regards to the inherent vulnerabilities with current ssd-drives. i don't have much to say, since i do not own an ssd-drive …...- pnamajck
- Thread
- approach bleepingcomputer cybersecurity data corruption exploitation file advisory hardware information security pdf personal environment privacy research security ssd storage devices technical technical aspects user data virus scan vulnerabilities
- Replies: 4
- Forum: Windows Security
-
MS16-144 - Critical: Cumulative Security Update for Internet Explorer (3204059) - Version: 1.0
Severity Rating: Critical Revision Note: V1.0 (December 13, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...- News
- Thread
- admin rights attack critical cumulative update data security december 2016 extended security updates information security internet explorer microsoft ms16-144 patch remote code execution software security system control user account control user rights vulnerability web attack
- Replies: 0
- Forum: Security Alerts
-
MS16-148 - Critical: Security Update for Microsoft Office (3204068) - Version: 1.0
Severity Rating: Critical Revision Note: V1.0 (December 13, 2016): Bulletin published Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file...- News
- Thread
- arbitrary code critical cybersecurity december 2016 exploitation extended security updates information security malware prevention microsoft office ms16-148 patch remote code execution revision note software update system admin technical bulletin user impact user rights vulnerability
- Replies: 0
- Forum: Security Alerts
-
Security Update for Microsoft .NET Framework 2.0 SP2 on Windows 8.1 and Windows Server 2012 R2
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain access to information. Link Removed- News
- Thread
- compromise information security microsoft net framework remote access security update vulnerability windows 8.1 windows server
- Replies: 0
- Forum: Live RSS Feeds
-
J
Windows 8 Enforcing EFS at ALL TIMES on a folder
I need to enforce a permanent EFS policy on a given folder. I already know how to turn on the EFS setting on a folder, so that all files copied into it or created in it are automatically encrypted by EFS. Now, the problem is that Windows allows the user to manually disable the EFS on a file...- Justine Herrok
- Thread
- access control data security efs encryption file management information security policy enforcement windows 10 windows 11 windows security
- Replies: 1
- Forum: Windows Help and Support
-
Introduction: Chris Betz, new head of MSRC
By way of introduction, I am Chris Betz, the leader of the Microsoft Security Response Center (MSRC). I’m stepping in to fill the shoes of Mike Reavey, who has moved on to become the General Manager of Secure Operations, still within Trustworthy Computing. Since joining the MSRC, I’ve spent...- News
- Thread
- bounty program chris betz consumer protection cyber threats dedication enterprise security global team information security it professionals microsoft msrc progress report response security security incident security research technology trustworthy computing update tuesday vulnerability
- Replies: 0
- Forum: Security Alerts
-
Welcome to the Windows Forum!
You have reached a worldwide forum community for open Microsoft Windows help and support. About Us WindowsForum.com is an open community for Microsoft Windows customers and enthusiasts. It is not owned or operated by Microsoft Corporation, but the website has produced many dozens of...- News
- Thread
- backup community customer service forum history information security instructional it support microsoft migration online community partnership support tech help tutorial user engagement user experience web development windows forum
- Replies: 0
- Forum: Forum Announcements
-
W
Windows 7 random pasting of data from previous copyin one file appearing in anothe rfile
After doing a copy and paste, we have, on 3 occasions so far, found the copied data in an entirely different file. Twice data from a copy appeared in an excel spreadsheet and once a picture copied in facebook appeared in an email. The excel problem is very worrysome as it is our family budget...- wrjonespi
- Thread
- clipboard data loss email excel file management information security paste spreadsheet user experience windows issues
- Replies: 7
- Forum: Windows Help and Support
-
Windows 7 List of Site Sponsored Software
Here is a list of site sponsored software that may be useful for you if you need a solution to resolve system issues over a long-term period. We have sponsored with these sites as affiliate partners to bring to you some of the best software and hardware available for Microsoft Windows: General...- Mike
- Thread
- backup blu-ray cleanup information security microsoft store multimedia repair utility sponsored software system issues virtualization
- Replies: 1
- Forum: Windows Help and Support
-
Windows 7 Why Hackers Write Computer Viruses
Maximum PC | Why Hackers Write Computer Viruses- JMH
- Thread
- cybercrime cybersecurity data security email security hackers information security internet safety malice malware mikko hypponen mischief online risks pc viruses security tech news trojan virus virus hunting worm
- Replies: 0
- Forum: Windows Security
-
Windows 7 Understanding Encryption – What is Encryption?
What is the Definition of Encryption? How Does Encryption Work?- JMH
- Thread
- data security encryption finance data information security military strategy privacy security sensitive data
- Replies: 0
- Forum: Windows Security
-
Windows 7 Toshiba website hacked - email addresses and passwords exposed
Toshiba website hacked – email addresses and passwords exposed | Naked Security- JMH
- Thread
- compromise cybersecurity data breach electronics email exposure hacking information security password personal data phone privacy risk management sales security incident toshiba user data web server
- Replies: 0
- Forum: Windows Security
-
VIDEO The Myth of the Ethical Hacker
"From the rise of retro fashion trends, art, music, and literature (as inspired by some great 21st century works of literature like "Pride and Prejudice and Zombies" and the complete stereo remastered works of The Beatles), I explore the notion of a Hacking Renaissance taking place today and...- Mike
- Thread
- 1990s anonymous black hat cultural critique cybersecurity espionage hackers hacking information security internet lulz security malicious software nostalgia online community pop culture privacy security society white hat
- Replies: 3
- Forum: The Water Cooler
-
Hotmail and Yahoo users also victims of targeted attacks
IDG News Service - Web mail users at Yahoo and Hotmail have been hit with the same kind of targeted attacks that were disclosed earlier this week by Google, according to security software vendor Trend Micro. Trend Micro described two similar attacks against Yahoo Mail and Windows Live Hotmail...- reghakr
- Thread
- antivirus attack vector corporate network cybercrime cybersecurity data breach email threats gmail hotmail information security malware phishing security targeted attacks trend micro user protection webmail yahoo
- Replies: 2
- Forum: The Water Cooler
-
Session Hijacking
In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system. For example, when a user logs in to a web site, the user's PC is tagged with a session...- reghakr
- Thread
- access control access denied authentication cybersecurity data security encryption information security intermediary attack online threats secure connection security session hijacking session key tcp hijacking web development web security
- Replies: 2
- Forum: The Water Cooler
-
Windows 7 Web Security: Cashier-as-a-Service(Caas) and How to Shop for Free Online
Web applications increasingly integrate third-party services. The integration introduces new security challenges due to the complexity for an application to coordinate its internal states with those of the component services and the web client across the Internet. In this paper, we study the...- News
- Thread
- caas cashier-as-a-service distributed systems dynamic analysis e-commerce fraud prevention information security logic flaws merchant websites merchants online shopping payment methods payment processing research security flaw security policies static analysis third party services web security xiaofeng wang
- Replies: 0
- Forum: Live RSS Feeds