Network Vulnerability Analysis – Linux and Unix audit tools

Uncategorized Comments Off on Network Vulnerability Analysis – Linux and Unix audit tools

All computers and applicable devices in a corporate environment should be periodically checked using the security audit process and applicable tools.  Some good resources are shared below to facilitate these needs for Linux and UNIX operating systems. https://isc.sans.edu/forums/diary/Quick+Audit+of+NIX+Systems/20771/ https://blog.sucuri.net/2016/02/investigating-a-compromised-server-with-rootcheck.html If you think that only computers running Microsoft Windows are targeted by attackers, you’re wrong! UNIX (used here as […]

Microsoft – Security improvements for Health care records

Uncategorized Comments Off on Microsoft – Security improvements for Health care records

Microsoft is highlighting the need for improved protection of patient health care records and will be providing assistance in the coming months. http://www.eweek.com/security/microsoft-calls-for-health-care-security-intervention.html After a seemingly nonstop series of breaches affecting health care organizations, the software giant announces plans to engage with IT security professionals in the industry.   Overflowing with sensitive personal data and payment […]

Ransomware – California Hospital network impacted

Uncategorized Comments Off on Ransomware – California Hospital network impacted

While a California hospital could have potentially went to backups to recover, they negotiated a $17,000 payment to decrypt key computers.  It was seen as the least expensive renemdy to bring systems back online without rebuilding systems and network controls. These encryption based attacks are increasing and data backups are critical along with strong malware detection […]

Leadership – Success requires good relationships within the team

Uncategorized Comments Off on Leadership – Success requires good relationships within the team

As reflected in John Maxwell’s excellent blog, our human relationships are an important ingredient for success  http://www.johnmaxwell.com/blog/how-do-you-define-success If you want to truly succeed in this life, you need to ask yourself a question: Is your pursuit of success drawing you closer to – or farther from – the most important people in your life? If […]

Social Media – Five Techniques to clean up Embarrassing Posts

Uncategorized Comments Off on Social Media – Five Techniques to clean up Embarrassing Posts

As it is always important to be careful in online media postings, there are some beneficial techniques are noted at the Learnvest site, that can help clean-up prior history:  http://www.learnvest.com/2016/02/surviving-a-social-media-disaster-at-work/ Whether it’s a celebrity Twitter feud or a corporate social media disaster, we’ve all seen how online posts can flare up into huge news. But you don’t need […]

Mobile technology – Samsung 256GB Flash memory chips

Uncategorized Comments Off on Mobile technology – Samsung 256GB Flash memory chips

Mobile technology – Samsung 256GB Flash memory chips Samsung is currently mass producing 256GB embedded flash memory chips for future phone systems and devices, as noted in article below http://www.pcworld.com/article/3038034/mobile/samsungs-256gb-flash-chips-point-to-super-sized-storage-for-future-phones.html Samsung’s 256GB flash chips point to super-sized storage for future phones.  Samsung’s latest embedded storage chip for mobile devices puts 256GB within reach of smartphones. […]

Malware – MouseJack wireless mouse and keyboard vulnerabilities

Uncategorized Comments Off on Malware – MouseJack wireless mouse and keyboard vulnerabilities

This new proof-of-concept attack requires the attacker to be physically near vulnerable workstations and for the workstation to not be password protected while user is physically away. While the are impracticalities for most attacks, this may provide conduits to inject malware into a system to weaken other security controls  http://www.networkworld.com/article/3036463/mobile-security/countless-computers-vulnerable-to-mousejack-attack-through-wireless-mice-and-keyboards.html Countless wireless mice and keyboards can […]

Security Standards – PCI DSS 3.2 update for mid-2016

Uncategorized Comments Off on Security Standards – PCI DSS 3.2 update for mid-2016

PCI DSS 3.2 will be more of an incremental than major standards update when it is later released in mid-2016. http://searchsecurity.techtarget.com/news/4500273477/PCI-DSS-32-marks-the-end-of-major-updates-to-the-standard The PCI Security Standards Council announced it will publish a new version of the PCI Data Security Standard sometime in either March or April, and PCI DSS 3.2 will be the only release for the […]

Leadership – 2016 Secrets for Success RELATIONSHIPS

Uncategorized Comments Off on Leadership – 2016 Secrets for Success RELATIONSHIPS

John Maxwell is sharing a new weekly series during 2016 called the “Secrets for Success”.  The third week focuses on building relationships with team members & other key stakeholders http://www.johnmaxwell.com/blog/secrets-of-success-week-three-relationships Welcome to week three of my Secrets of Success blog series. If this is your first time reading, I won’t keep you in suspense: the […]

Wireless Technology – New high speed 5G standard initiatives

Uncategorized Comments Off on Wireless Technology – New high speed 5G standard initiatives

Some early pioneers have 5G standard initiatives which will could materialize in a couple of years. http://www.nytimes.com/2016/02/23/technology/construction-begins-on-the-5g-wireless-dream.html http://www.nytimes.com/2016/02/22/technology/5g-is-a-new-frontier-at-mobile-world-congress.html Most people think that trying to download an entire movie to a mobile device is the act of a madman. Or the act of someone with plenty of time and money to burn. But in Europe work […]


© 2020 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in