IT security and control firm Sophos is advising computer users to be on their guard after it uncovered evidence that spammers are exploiting the popular video website YouTube in order to promote their own goods and online stores. View full post on computer worm – Yahoo! News Search Results View…
ISC Feature of the Week: Presentations and Papers, (Wed, Mar 21st)
Overview ISC’s https://isc.sans.edu/presentations/ is a informative list of detailed presentations and papers written by ISC handlers or written about the ISC and DShield. Note that not all of them are hosted on this site. Features Webcasts / Podcasts – https://isc.sans.edu/presentations/#casts ISC Monthly Threat Updates webcasts on SANS’ Webcast archive Latest webcast…
FEATURE: Resident Evil: The Story So Far
A run through the RE lore. Note: Because it’s currently unclear exactly how the plot of RE: Revelations ties into the larger RE mythos (aside from taking place before RE5), this narrative focuses on the adventures of Jill Valentine and Chris Redfield, who founded the BSAA and are the main…
Microsoft announce “security feature bypass” for Patch Tuesday
One of the seven updates was tagged “critical,” the highest threat ranking in Microsoft’s four-step system, while the others were marked “important,” the second-highest rating, even though some of them could conceivably be exploited by attackers to plant malware on users’ PCs. View full post on could security – Yahoo!…
ISC Feature of the Week: How to Submit Firewall Logs, (Tue, Jan 3rd)
Each week, usually on Tuesday, we are going to highlight an ISC/DShield site feature so all our users become more aware of all the great functionality that is available! This week’s ISC/DShield feature is How To Submit Your Firewall Logs To DShield and can be found at https://www.dshield.org/howto.html Much of…
Most Wi-Fi routers susceptible to hacking through security feature
Researchers have published a paper showing how a feature implemented in modern Wi-Fi routers intended to make securing them easier, in fact makes them insecure by default. View full post on Naked Security – Sophos View full post on National Cyber Security