Smart Device Security – March 2015 Symantec research study

Uncategorized Comments Off on Smart Device Security – March 2015 Symantec research study

In an evaluation of 50 smart home based devices, this Symantec research report reveals a number of gaps in security that must be improved upon in future. http://www.symantec.com/connect/blogs/iot-smart-home-giving-away-keys-your-kingdom http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/insecurity-in-the-internet-of-things.pdf The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing […]

Windows XP – Migration Considerations for Windows 7 or 8

Uncategorized Comments Off on Windows XP – Migration Considerations for Windows 7 or 8

Both Windows 7 and 8 provide advantages in terms of support, reliability, performance and improved security as noted below: http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_MS_WhichWindows.pdf This “Crossroads for Windows XP Users: Windows 7 or Windows 8?” white paper is sponsored by Global Knowledge.  It explores the pros and cons of each option – including your options for staying with XP.  […]

Penetration Testing – Wi-Fi security strength assessment tools

Uncategorized Comments Off on Penetration Testing – Wi-Fi security strength assessment tools

This article shares Penetration Testing techniques and tools for Wi-Fi networks to assess security controls for the router and wireless protocols being used. http://www.pcmag.com/article2/0,2817,2477437,00.asp How to Hack Wi-Fi Passwords – Your intensions when cracking a Wi-Fi password are no doubt noble—we trust you—so here’s how to do it    Once you’re asked for a username/password, what do you do? […]

Network Security – ISC and Microsoft document PtH attacks

Uncategorized Comments Off on Network Security – ISC and Microsoft document PtH attacks

The Internet Storm Center features a well-written awareness document for PtH attacks. Microsoft also has a centralized high-level resource that shares awareness & mitigating controls for this popular hacking attack to gain unauthorized access into vulnerable systems. https://isc.sans.edu/forums/diary/Pass+the+hash/19479/ http://www.microsoft.com/pth Passing the hash is a form of login credential theft that is quite prevalent. In it, […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in