IT Glossary    1_9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z   .....  A                                          

  Registry Windows 10
  Windows 10 tweaks & tricks
Tweaks & tricks
  Network settings
Windows7: General settings
  Windows7: Registry
  Windows7: Registry faq
  Windows7: Network settings
  Windows7: Security
  Windows7: Firewall
  Windows7: Compatibility Mode
  Windows7: Administrator Password
Windows NT/2K/XP/VISTAWindows NT/2K/XP/VISTA
Win 2K faqWin 2K faq
  Win 2K(kernel & MEM.managment)
  Win 2K XP (Securit)
  Win 2K XP (Boot)
  Win 2K XP (Install)
  Win 2K XP (Admin)
  Win 2K XP (File system)
  Win 2K XP (Services)
  Win 2K & XP optim & tweak
  Win XP faq
  Win XP faq #2
  Win XP faq (net)
  Win XP faq (lan)
  Win XP recover & recovery console
  WinXP & ntfs
  WinXP & game faq
  Win PE
  Win Vista
  Win Vista FAQ
  Win Server tweaks
Reg WIN2K/XP faq
Reg WIN2K/XP faq #2
Reg NT/XP: Structure
Reg XP: Restore & backup
Reg XP: Costumize XP
Reg XP: Inet
Reg: Inet & LAN
BIOS faq
BIOS recover
computer ambulance
$100,000 Bounty on Syrian Electronic Army

The US Department of Justice believes it has identified three members of the notorious Syrian Electronic Army, who have in recent years made a name for themselves with their high profile hacks against media organisations, targeted spear-phishing attacks, and redirecting well-known websites to display propaganda in support of the Syrian Government and President Bashar al-Assad.
$100,000 Bounty on Syrian Electronic Army
(Read More... )

1.5Mn Customer Records Breached at Verizon Enterprise

Verizon Enterprise Solutions has suffered the theft of 1.5 million customer contact details, including for some of the top Fortune 500 companies. The customer info was found up for sale on an underground cybercrime forum, with a price tag of $100,000.1.5Mn Customer Records Breached at Verizon Enterprise
(Read More... )

18 Million Stolen Credentials Found in Japan

Stolen usernames and passwords belonging to 18 million Internet users have been found on a server owned by a Japanese company, which is said to have provided services to Chinese hackers.18 Million Stolen Credentials Found in Japan
(Read More... )

CTB-Locker ransomware infects over 100 websites

Crypto ransomware CTB-Locker has been pushed onto users once again. A new variant of the malware now targets websites instead of Windows.
According to PC World, at least 102 websites have been infected since the campaign began on 12 February, when the British Association for Counselling and Psychotherapy website fell victim to attack.
(Read More... )

Lenovo's ShareIt has Default Password "12345678"

Lenovo has been forced to release urgent software fixes after a number of embarrassing flaws were uncovered in its products, including one that left a hard-coded password set to '12345678' by default.
Researchers at Core Security posted an advisory that listed four vulnerabilities in Lenovo's ShareIT function that could result in man-in-the-middle attacks, information leaks and the bypassing of encryption.
Lenovo's ShareIt has Default Password "12345678"
(Read More... )

How the US Government vs. Apple will have long-lasting ramifications

If you believe Hollywood, or just about any modern crime or spy fiction, hacking our cellphones and computers is trivially easy for the resident tech guy on the team. He or she just needs the right connector, and a few keystrokes, and theyre in. All of the secrets stored on the device are out in the open and at their disposal. From a law enforcement perspective, if only it were that easy! From a privacy and security perspective, thank goodness its not. From a paranoiac perspective, what if it is? To Apple, the FBI, and to many others, the question of just what can and cannot be done is highly relevant at this time.US Government vs. Apple will have long-lasting ramifications
(Read More... )

New Windows flaws allow the removal of 2FA

Following in the wake of Patch Tuesday, three additional flaws with Microsoft products have been revealed, two of which could remove the two-factor authentication (2FA) protocol from any Windows products.
(Read More... )

WordPress Sites Delivering Ransomware

A large number of websites that run on the WordPress content management system are being hacked to deliver the Teslacrypt ransomware package, which encrypts user files and demands a hefty ransom for the decryption key needed to restore them.
Malwarebytes Senior Security Researcher Jérôme Segura wrote: "WordPress sites are injected with huge blurbs of rogue code that perform a silent redirection to domains appearing to be hosting ads. This is a distraction (and fraud) as the ad is stuffed with more code that sends visitors to the Nuclear Exploit Kit."
WordPress Sites Delivering Ransomware
(Read More... )

Third Party Patch Roundup January 2016

A brand new year brings brand new opportunities and brand new challenges for all of us, and for IT professionals, it brings brand new security vulnerabilities and brand new patches. Microsoft kicked off 2016 with nine updates; in Januarys Third Party Patch Roundup list Apples five updates, Adobes, Googles and Oracles one, Mozilla officially released Firefox v.44, while Ubuntu issued 35 security advisories.Third Party Patch Roundup
(Read More... )

Cisco advises firewall users to patch critical vulnerability

Cisco warned users of a critical vulnerability in the web-based interface of its EV220W Wireless Network Security Firewall devices, which if exploited could allow remote attackers to access administrative privileges by circumventing the authentication process.
(Read More... )

computer service

May 2016 Microsoft Patch Tuesday
Microsoft released a whopping sixteen patches on May 10, most of them for Windows. Eight are rated as critical, with ten of them exploitable for the purpose of remote code execution. In addition, there are several elevation of privilege and information disclosure vulnerabilities in the mix, along with one security bypass issue.
(Read More... )
The bottom line
Ensuring that networks are secure and that compliance with regulations and industry standards can be achieved is a complex task for any organisation no matter how small or large. An organisation that tries to do everything itself will be in a constant state of catch up, which often leaves vulnerabilities exposed. As networks become increasingly open and inter-connected, with always-on availability expected from an ever-growing variety of devices, a far better strategy is to offload security needs that are either not a core competence or that are complex and costly to manage to a third party that has specialised expertise.

Home | Stop-screens | Wi-Fi faq | LAN faq | Full BIOS settings | IP faq | FTP faq | Motherboards faq | | Handbook of meta tags | Internet protocols | Internet and Security | | Protocols

Cookie policy | Sitemap

po gonn 2004