ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. security
    Log in to post
    • All categories
    • steveS

      Nic Tolstoshev: Webroot on Security 2016

      Watching Ignoring Scheduled Pinned Locked Moved MangoCon webroot nic tolstoshev security antivirus malware youtube
      1
      2 Votes
      1 Posts
      843 Views
      No one has replied
    • steveS

      Scott Alan Miller: The Brave New LANless Future

      Watching Ignoring Scheduled Pinned Locked Moved MangoCon networking scott alan miller lanless lan ntg ntg lab security mangocon mangocon 2016 youtube
      1
      8 Votes
      1 Posts
      2k Views
      No one has replied
    • mlnewsM

      Synology Surveillance Station 8.0 Beta

      Watching Ignoring Scheduled Pinned Locked Moved News synology synology surveillance station security
      1
      2 Votes
      1 Posts
      769 Views
      No one has replied
    • scottalanmillerS

      IoT devices Used in DDoS Attacks

      Watching Ignoring Scheduled Pinned Locked Moved Water Closet iot security internet of things ddos bbc
      49
      4 Votes
      49 Posts
      7k Views
      nadnerBN

      Chinese electronics firm Hangzhou Xiongmai is set to recall swathes of webcams after they were compromised by the Mirai botnet.
       
      Mirai exploits the low security standards of internet-connected devices, from routers to webcams, and after enslaving them with malware uses their network connections to launch DDoS attacks, such as that hobbling Dyn's DNS services last week.

      Sauce of regret: http://www.theregister.co.uk/2016/10/24/chinese_firm_recalls_webcams_over_mirai_botnet_infection_ddos_woes/

    • DustinB3403D

      Intel CPUs having ASLR are vulnerable to attack

      Watching Ignoring Scheduled Pinned Locked Moved News intel security aslr
      3
      2 Votes
      3 Posts
      639 Views
      scottalanmillerS

      Fixed again, whatever mod is taking the plural out of CPUs and making it into a possessive CPU's, please stop.

    • gjacobseG

      ScreenConnect: Support session Security

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion screenconnect security
      1
      1 Votes
      1 Posts
      590 Views
      No one has replied
    • mlnewsM

      Indian Authorities Arrest Seventy and Question Over Six Hundred in IRS Scam Bust

      Watching Ignoring Scheduled Pinned Locked Moved News security ars technica
      6
      5 Votes
      6 Posts
      687 Views
      thwrT

      @Dashrender said in Indian Authorities Arrest Seventy and Question Over Six Hundred in IRS Scam Bust:

      Damn.

      "We had a mole go in to the call centres to verify. The best part is that they were actually recording all their calls. We have recovered 851 hard disks on which the calls were recorded, so we’re going through those now," Singh told The Guardian.

      Awesome - I wonder who paid them to do that?

      Better ask another question: Who wrote precise instructions to do so.

    • scottalanmillerS

      Non-IT High Level Survey of Famous Malware

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion malware scishow security
      3
      4 Votes
      3 Posts
      937 Views
      scottalanmillerS

      It's quite a good show, I watch it often. Good place for science news.

    • scottalanmillerS

      Yahoo Caught Giving Email Contents to Government Agencies

      Watching Ignoring Scheduled Pinned Locked Moved Water Closet yahoo security breach
      22
      3 Votes
      22 Posts
      5k Views
      scottalanmillerS

      @Dashrender said in Yahoo Caught Giving Email Contents to Government Agencies:

      Can't gmail act like a Pop3 client and go get the mail? So this really doesn't keep people from using another service like gmail.

      O365 does too. And any client like Thunderbird or Outlook would fix this too.

    • mlnewsM

      Did HP Break the Law Vandalizing Your Printer?

      Watching Ignoring Scheduled Pinned Locked Moved News hewlett-packard printers security
      22
      3 Votes
      22 Posts
      3k Views
      travisdh1T

      @scottalanmiller said in Did HP Break the Law Vandalizing Your Printer?:

      @IRJ that sums things up. We've not advanced past Okidata.

      Gah, stop with the painful (yet colorful) memories!

    • scottalanmillerS

      Yahoo Breach Hit Half Billion Users

      Watching Ignoring Scheduled Pinned Locked Moved News yahoo breach security
      10
      5 Votes
      10 Posts
      2k Views
      bbigfordB

      @scottalanmiller said in Yahoo Breach Hit Half Billion Users:

      Attack on Yahoo hit 500 million users
      http://www.bbc.co.uk/news/world-us-canada-37447016

      I was wondering when it was going to be confirmed. Yahoo kept wiping their brow and saying "Man, this is going to lower our value to Verizon... how do we spin this?"

    • ChrisLC

      Why Data Center Security is More about Detection than Prevention

      Watching Ignoring Scheduled Pinned Locked Moved Self Promotion datacenter security data
      1
      3 Votes
      1 Posts
      959 Views
      No one has replied
    • scottalanmillerS

      Cambridge Proves FBI Lied About Needing iPhone Backdoor

      Watching Ignoring Scheduled Pinned Locked Moved News iphone fbi security
      17
      3 Votes
      17 Posts
      3k Views
      NattNattN

      @scottalanmiller said in Cambridge Proves FBI Lied About Needing iPhone Backdoor:

      @NattNatt said in Cambridge Proves FBI Lied About Needing iPhone Backdoor:

      @pchiodo said in Cambridge Proves FBI Lied About Needing iPhone Backdoor:

      The goal was never to get into just one phone. They wanted a legal precedent that would allow them to force a manufacturer to assist in breaking any phone, along with the potential to use the same case to force manufacturers to provide an encryption back door.

      But they already have that? The smurf toolset gives all of that anyways doesn't it...?

      Yes, but they'd have to admit having it. So mostly this was probably an attempt to get people to think (And it worked too) that they didn't have a capability that they already clearly have. It wasn't just about getting legal power, it was about trying to hide their actual toolsets.

      It's not called Smurf in the US, but we buy Smurf from the UK and rebrand it, I'm told.

      Yeah, the good old Snowden leak gave away far more than they ever wanted to be known...

      Yeah, I knew it's a joint op between GCHQ and the NSA, wasn't sure as to which side "made" more of it etc

    • StrongBadS

      Seagate Sued by Own Employees Over Security Breach

      Watching Ignoring Scheduled Pinned Locked Moved News seagate security breach spiceworks
      10
      0 Votes
      10 Posts
      2k Views
      IRJI

      @travisdh1 said in Seagate Sued by Own Employees Over Security Breach:

      @IRJ said in Seagate Sued by Own Employees Over Security Breach:

      @scottalanmiller said in Seagate Sued by Own Employees Over Security Breach:

      Tagging @stus

      I read the Knowbe4 Blog Daily. I love it!

      I saw this attack on there this morning.

      I signed up for the email summaries. Great blog site.

      I love how their blog articles are technical, but also include a summary for non-technical people.

    • nadnerBN

      Sophos False Positive with WinLogon.EXE

      Watching Ignoring Scheduled Pinned Locked Moved News sophos security antivirus
      15
      3 Votes
      15 Posts
      4k Views
      StrongBadS

      @Dashrender said in Sophos False Positive with WinLogon.EXE:

      @StrongBad said in Sophos False Positive with WinLogon.EXE:

      @Dashrender said in Sophos False Positive with WinLogon.EXE:

      other than webroot, who's had more false positives at my one client who uses them than panda that I have been running for 10+ years.

      I'm not understanding your statement. This feels like only part of a sentence. Is this a question?

      It's a statement - I'll re-word.

      Webroot has had more false positives in the 3 years a client of mine has been using Webroot, than I have had in the 10+ years another client has been using Panda AV.

      So while I love Webroot (primarily the journaling), it does require more support than other options I have/do use.

      I see, thanks for the clarification. That's not what I had read you to mean at all. That makes more sense.

    • mlnewsM

      Flip Feng Shui Attacks KVM Memory Deduplication in Cloud Hosts

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ars technica kvm virtualization deduplication memory deduplication cloud computing security flip fend shui rowhammer malware
      1
      1 Votes
      1 Posts
      890 Views
      No one has replied
    • mlnewsM

      Network+ N10-006 Video Training by Prof. Messer - VPN Protocols

      Watching Ignoring Scheduled Pinned Locked Moved IT Careers prof messer networking vpn security protocols comptia network+ youtube certification
      2
      0 Votes
      2 Posts
      1k Views
      scottalanmillerS

      I think that he skips mentioning that PPP, the Point to Point Protocol is not a VPN protocol. Even in the 1990s it was not considered that as it is not virtually private, as a VPN is. It's useful to have mentioned here and the Network+ might require it and it is certainly good to know and understand, but he lists it along with VPN protocols and I didn't hear him ever point out that it isn't a VPN Protocol even though it was the first one mentioned in the VPN Protocol list.

    • Deleted74295D

      Cylance Questions

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion cylance security antivirus
      49
      3 Votes
      49 Posts
      11k Views
      BRRABillB

      @Richard_Cylance said in Cylance Questions:

      FTFY - Sold = Lost. Exec = guru

      This reminded me of the following Simpsons clip:
      Youtube Video

    • DustinB3403D

      RDP support for VMs or Console only Access

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion xenserver rdp windows security vmware
      6
      1 Votes
      6 Posts
      1k Views
      scottalanmillerS

      @DustinB3403 said in RDP support for VMs or Console only Access:

      Opening up RDP access (not necessarily from the Internet) but in general just opens more ports, more firewall changes etc.

      Sure, but granting unnecessary access to the console does that, too. You need access to the VMs from far more places than you need it to the console.

    • travisdh1T

      Talking security during the server talk, question for you all.

      Watching Ignoring Scheduled Pinned Locked Moved MangoCon chkrootkit rkhunter linux security
      6
      4 Votes
      6 Posts
      1k Views
      travisdh1T

      @DustinB3403 said in Talking security during the server talk, question for you all.:

      Are you going to be discussing Kali linux, or just touching on it?

      Security is a very broad subject matter.

      As this is supposed to be server, just talking about the basics to secure a Linux server. I'm thinking just cover the basics of "I've got my widget configured, what should I do before exposing it to the world?"

      Kali would be bullet point, something like "Run the Kali hacking tools on it"

    • 1
    • 2
    • 14
    • 15
    • 16
    • 17
    • 18
    • 31
    • 32
    • 16 / 32