Starting yesterday (October 11), Microsoft began rolling out a new way to patch Win7, Win 8.1, Server 2008 R2, Server 2012, and Server 2012 R2 systems. Instead of releasing a bunch of individual updates, they will be pushing out monthly...
Category: Security
What’s Wrong with SMS Authentication?
Back at the end of July, quite a bit of media buzz was generated by reports that the NIST was recommending, in the draft of their new publication addressing digital authentication methods, that using SMS text messages as a second...
Using File Sync & Share to Help Fight Ransomware
We’ve written a lot about security in general and ransomware in particular, because your security is a major concern to us - and we hope your own organization’s security is a major concern to you as well – and because...
ESET Adds Data Leakage Protection
ESET recently announced the addition of Safetica Data Loss Prevention (“DLP”) products to its Technology Partner Alliance. These are tools that are designed to prevent the accidental (or intentional) transmission or leakage of sensitive data outside the enterprise network. If...
Beware of DOCM File Attachments
In a blog post dated August 17, FireEye is reporting a huge increase in “Locky” ransomware distribution via maliciously-crafted .DOCM email file attachments (macro-enabled Word files). The health care industry seems to be the hardest-hit in this campaign, and the...
Citrix Secure Browser Service Delivers Web Apps Quickly and Simply
According to Gartner, over fifty percent of corporate applications are now delivered via the browser. Unfortunately, many Web applications, especially legacy applications, require a specific version of Internet Explorer, and/or require Flash or Java functionality that may or may not...
Beating Malware by Disrupting Command and Control
One of the key strategies in modern warfare is disrupting the enemy’s command & control infrastructure. It can also be an effective strategy in the ongoing war against malware. One of the first things that usually happens when a PC...
ESET Introduces Hardware-Encrypted USB Drive
It seems that data security is a never-ending battle, and it has become obvious that we need multiple layers of protection to deal with the proliferation and constant evolution of security threats. Today’s security topic is the ubiquitous USB “thumb...
The Great Superfishing Expedition of 2015
In a move that will probably end up in the top ten technology blunders of the year, Lenovo decided, starting in September 2014, to pre-install Superfish VisualDiscovery software on some of their PCs. (Fortunately for most of the readers of...
What’s Your Password?
Earlier this month, we posted a couple of articles on the state of cyber security. Of course, one of the biggest problems with cyber security is that too many people don’t take it seriously enough. Don’t believe me? Take a...