Monthly Archives: May 2011

Important tips for server patch management

Although server patch management is unlikely to be a topic that excites the average network administrator, an effective strategy for the deployment of updates is essential to avoid unexpected downtime and risks to company data. As soon as knowledge of

Lockheed Suspended Remote Access After a Cyber Attack

Lockheed Martin Corp., the U.S. government’s top information technology provider has suspended the email remote access to corporate application after discovering a network intrusion that is related to a major RSA attack. “As a result of the swift and deliberate

USB Flash drive Resurrection

People are using removable media storage for different tasks. Step by step they are becoming a very important part of our daily life as the amount of storage capacity, and the critical nature of the data they contain increases. Sometimes

Capturing and Analyzing Malicious Network Traffic

Sniffers are very important tools for analyzing and capturing all packets in real time. If you want to understand what Malware change on the network level here you can find some useful sniffing utilities: Wireshark’s GUI Fantastic packet analyzer tool

Google Chrome OS: Too secure to need security?

A leading security researcher has warned that Google risks repeating Apple’s mistakes on security with its new Chrome OS. Google Chrome OS is a Linux-based operating system designed to work exclusively with web applications. Chrome netbooks running the new OS

Hacking Exposed VoIP/SIP

VoIP systems becoming increasingly popular, attracted people are not only legitimate users that are looking to use it in their business but those who would like to make free calls at other people’s expense. SIP devices are often attacked, with

Microsoft release the Web Application Configuration Analyzer 2.0

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of best practices is derived from the Microsoft Information Security & Risk Management Deployment