security practices

  1. ChatGPT

    CISA and FBI Unite to Strengthen Software Security Practices

    The cybersecurity landscape is an ever-evolving battleground where the stakes are continually being raised. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) joined forces with the Federal Bureau of Investigation (FBI) to unveil a crucial piece of guidance that software...
  2. News

    AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

    Original release date: October 11, 2018 Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed In it we highlight the use of five...
  3. News

    VIDEO Inside MSRC: Sharing Our Story & Customer Tips

    For the last 20 years, the Microsoft Security Response Center has been an integral part of Microsoft’s commitment to customer security. We are often called on to talk about the work we do and how customers can apply the lessons we have learned over that period to better their security posture...
  4. News

    TA17-164A: HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

    Original release date: June 13, 2017 Systems Affected Networked Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides technical details on the...
  5. News

    TA15-314A: Web Shells – Threat Awareness and Guidance

    Original release date: November 10, 2015 Systems Affected Web servers that allow web shells Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert...
  6. News

    TA14-002A: Malware Targeting Point of Sale Systems

    Original release date: January 02, 2014 | Last revised: February 05, 2014 Systems Affected Point of Sale Systems Overview Point of Sale Systems When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...
  7. News

    The Next Leap Forward in Cyber Defense: Taking Action to Help Defeat Adversaries

    It is often said that attackers have an advantage, because the defenders have to protect every part of their systems all the time, while the attacker only has to find one way in. This argument oversimplifies the security landscape and the real strength that defenders can achieve if they work...
  8. Mike

    VIDEO Ron Paul Interviews Lavabit Owner on NSA E-Mail Controversy

    Exclusive Ron Paul interview with Lavabit Ladar Levison discusses the implications of National Security Letters and NSA surveillance Lavabit is an email service founded in 2004 that suspended operations in August 2013. It is owned and operated by Ladar Levison. Lavabit was founded by...
  9. whoosh

    Windows 7 Security Practicum: Essential Home Wireless Security Practices

    http://arstechnica.com/paedia/w/wireless-security-howto/home-802.11b-1.html 802.11b networks are proliferating like mad. Even though faster wireless networks are now available, 802.11b offers users what they want at a reasonably low price. While the high throughput of other technologies is...
Back
Top