Archive for the ‘network security’ Category

Remove Rogue Antivirus Defense Center (defcnt.exe)

Monday, July 19th, 2010

I haven’t tried this myself, so I’m not sure if it really works or not, but it definitely sounds helpful …

Rogue antivirus programs like Defense Center look on first glance as valid security software that protects a computer system from threats. On second glance though they usually displays non-existing infections deliberately, usually to convince the user to upgrade to a premium version to remove those infections or to buy another software that cleans them.

Defense Center is just one of the many rogue antivirus available on the Internet. The interface looks like that of legit security programs, displaying security status, firewall, antivirus and antispyware protection, and more.

(more…)

Microsoft warn of Windows Shell Critical Vulnerability

Monday, July 19th, 2010

Again? When it comes to vulnerability, Windows seems to lead the pack …

Microsoft have warned of a critical vulnerability in Windows Shell, caused when parsing .lnk shortcuts that can automatically launch a malicious program through use of a specially crafted shortcut.

The vulnerability affects all versions of Windows including XP and Windows 7.   On Windows 7 the exploit can bypass the operating system’s security as it does not require administrative privileges to run.

(more…)

Mozilla Removes And Blocks 2 Firefox Add-ons

Friday, July 16th, 2010

Remember three or four years ago, when Mozilla had such a small share of the browser market, that nobody was bothering to write malware for it?

It has not happened often in the past that Mozilla had to pull the plug on add-ons hosted at the official Firefox add-on repository. The developers of the popular Firefox web browser have some tools at their disposal to deal with add-ons that are either malicious in nature or insecure.

A recent blog post on the Mozilla Add-ons blog revealed that the developers had to deal with two add-ons falling in those two categories recently.

(more…)

How Can an Invalid Access Lockout Alarm Protect Access to your Console Server?

Thursday, July 15th, 2010

Managing a network or a data center is a complicated task that involves many different devices and sometimes many different people. One of the key components of network management is the serial console server, which is used to manage network devices and switches. The more people who have access to the console server management functions, the bigger the risk there is to the security of the attached equipment and the console server itself. Therefore it is vital to have appropriate security features on your console equipment.

(more…)

BlackBerry Launches Protect. Service Finds Lost Handsets, Saves Data

Monday, July 12th, 2010

This is a great idea; it would be kind of foolish to use a PDA for business purposes without something like this …

Research In Motion today introduced a limited beta of BlackBerry Protect, a free service to protect personal data in the case of a lost handset. With BlackBerry Protect, a consumer can remotely wipe data, lock the device, add contact information to the home screen or activate the handset’s ringer to help find the device. Consumers can also use the service to backup or restore data to or from the handset over Wi-Fi or to transfer data to a new BlackBerry.

(more…)

Almost Half of Workplace IT Admit to Spying on Workers

Friday, July 9th, 2010

You can’t even trust your friendly, local IT guy anymore …

IT spy on workers

Take this as yet another reason to be careful about what you say and do at work. Chances are that your IT guys are digging a little deeper than they should. A survey conducted by Cyber-Ark Software found that 41-percent of IT pros admitted to “abusing” their administrative privileges. This means using passwords to access HR records and customer databases and finding other confidential information.

(more…)

Disgruntled security researchers take aim at Microsoft

Thursday, July 8th, 2010

It seems like it would be better for Microsoft it they’d listen to their customers when security flaws are found …




Displeased with the way Microsoft handled the disclosure of a security flaw last month, a group of anonymous researchers has decided to take a more aggressive stance against the company. The group, calling itself the Microsoft-Spurned Researcher Collective (a mockery of Redmond’s Microsoft Security Response Center), will perform anonymous full disclosure of any security flaws that it discovers.

(more…)

Facebook applications request permission to steal your data

Wednesday, July 7th, 2010

Maybe the first example really was an IQ test … anybody who fell for it, failed the IQ test.

Facebookers advised to be vigilant, as rogue applications plague users of the social-networking site

The world of Facebook can be a dangerous place, as two separate incidents this week have proven.

(more…)

Secure Modem Access with Dialback Security

Tuesday, July 6th, 2010

Networks and data centers are often the very heart and soul of a business organization; the most critical, vulnerable parts of your corporate structure which must be protected at all costs. Most companies restrict access to their networks and data centers to just a small number of qualified personnel. In some cases, companies with higher security concerns might even restrict access to a single person, such as a network administrator.

Since a console switch is designed to provide an effective means for remote/out-of-band access to vital network devices, it is critical that a console switch or serial switch includes sufficient security measures to ensure that access to these important network devices is limited to only authorized personnel, and that crucial network functions remain secure.

(more…)