Wednesday, September 9th, 2009
Conventional wisdom is that Web wanderers are safe as long as they avoid sites that serve up pornography, stock tips, games and the like. But according to recently gathered research from Boston-based IT security and control firm Sophos, sites we take for granted are not as secure as they appear.Among ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, September 8th, 2009
A vulnerability in Microsoft's implementation of the SMB2 protocol can be exploited via the net to crash or reboot Windows Vista and Windows 7 systems. The root of the problem is an error in how the srv2.sys driver handles client requests when the header of the "Process Id High" field ...
Posted in Internet, Networking, Security, Windows | No Comments
Monday, September 7th, 2009
A rootkit is a piece of software which, for nefarious purposes, aims to run undetected on your computer. It will hide itself from process listings and will seek to interfere with the ordinary running of your system to fulfil its own purposes.A bootkit is a particular type of rootkit which ...
Posted in Internet, Security, Windows | No Comments
Monday, September 7th, 2009
Protecting the management account for cloud services can be one of the most critical security points of a cloud-based solution. Arguably, the account is more important than instance and operating system security for cloud workloads. Amazon web services (AWS) has recently introduced a new feature, Amazon web services multi-factor authentication ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Saturday, September 5th, 2009
A stitch in time saves nine. I couldn’t sew my way out of a bag, but it’s true advice for bloggers as well — a little bit of work on an upgrade now saves a lot of work fixing something later.Right now there is a worm making its way around ...
Posted in Internet, Privacy, Security | No Comments