Microsoft Security – Best Practices Home Page

Uncategorized Comments Off on Microsoft Security – Best Practices Home Page

Latest best practice links for corporate and home security are noted below: Microsoft Security – Best Practices Home Page http://technet.microsoft.com/en-us/library/dd366071.aspx Microsoft Best Practices Authentication for Administrative Authority Best Practices for Applying Service Packs, Hotfixes and Security Patches Best Practices for Enterprise Security Best Practices for Preventing DoS/Denial of Service Attacks Best Practices for Mitigating RPC […]

Microsoft – Best Practices for Enterprise Security

Uncategorized Comments Off on Microsoft – Best Practices for Enterprise Security

There are approximately two dozen beneficial links that tie into the four broad disciplines below: http://technet.microsoft.com/en-us/library/dd277328.aspx QUOTE: To help you evaluate and plan the security of your network, Microsoft has compiled a list of best practices for securing an enterprise. This list is not meant to replace a full security assessment of your infrastructure, but […]

Facebook – Best Practices in double locking account privacy

Uncategorized Comments Off on Facebook – Best Practices in double locking account privacy

PC Magazine shares two worthwhile privacy settings that will enhance both privacy and security in using Facebook … and most importantly always use an “air of caution” in entering any sensitive information into this environment in account settings or public comments http://securitywatch.pcmag.com/security/313078-double-lock-your-facebook-profile QUOTE: Earlier this week, TechCrunch reported that an app developer had scraped around […]

Facebook – Network traffic will be strengthened in future

Uncategorized Comments Off on Facebook – Network traffic will be strengthened in future

Facebook plans to further strenghten network message encryption beyond current HTTPS standard processing as reflected below: http://www.nbcnews.com/technology/facebook-strengthen-security-old-school-crypto-technique-6C10476610 QUOTE: Many websites support what’s called HTTPS, an encrypted version of the normal HTTP protocol used to weave together the World Wide Web. But the way it’s implemented, there’s the possibility that a hacker (or the NSA) could […]

South Korea – June 2013 cyber-attacks

Uncategorized Comments Off on South Korea – June 2013 cyber-attacks

Trend Labs documents multiple and extensive cyber-attacks, including Government web sites http://blog.trendmicro.com/trendlabs-security-intelligence/south-korean-government-dns-servers-targeted-by-ddos-attacks/ http://blog.trendmicro.com/trendlabs-security-intelligence/compromised-auto-update-mechanism-affects-south-korean-users/ QUOTE: Our investigation of the June 25 South Korea incident led us to the compromise of an auto-update mechanism attack scenario. As part of our continuous monitoring, we documented another scenario (presented in this blog entry) pertaining to a DDoS attack scenario […]

Google – New Geographic Malware Analytical site

Uncategorized Comments Off on Google – New Geographic Malware Analytical site

F-Secure shares a Google Security team blog post, reflecting a new summarized malware analysis by location http://www.f-secure.com/weblog/archives/00002571.html http://googleonlinesecurity.blogspot.fi/2013/06/transparency-report-making-web-safer.html QUOTE: Yesterday, Google announced on its Online Security Blog that it will now include Safe Browsing statistics in its Transparency Report.  The Safe Browsing Malware Dashboard is fascinating. Here’s last week’s Malware Distribution by Autonomous System, using […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in