distributed systems quoted Security Spam & Phishing

Some thoughts about the spam attack sent through InternetOfThings (Proofpoint)

http://www.proofpoint.com/about-us/press-releases/01162014.php More than 750,000 Phishing and SPAM emails Launched from “Thingbots” Including Televisions, Fridge Note: An article about this has been published by Richard Adhikari in TechNewsWorld.   A general comment on the entire story. Security researchers usually use spamtraps (an email address that receive nothing else than pure spam) to collect these emails and […]

published-external Security

Protect individuals and their devices within an organisation, not just their desktops

The classic approach to secure a company is to secure its assets against all attack vectors: laptops, workstations, servers, storage entities and programmes. The standard attack methods are usually: infections through files carried on USB sticks, memory cards, mobile hard drives, downloaded files network attacks (spoofing, DOS) vulnerabilities that get exploited in common software   […]

Security

Protect business information outside your organisation

Credits:http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/business-information European Cyber Security Month an EU advocacy campaign that takes place in October Protect business information outside your organisation Ensure you keep sensitive information secure: When you are outside your organisation, ensure you keep sensitive information and equipment secure at all times to prevent theft or loss. In particular when you are in public […]

Security

Protect your personal information and identity

Credits:http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/personal-information-identity European Cyber Security Month an EU advocacy campaign that takes place in October Protect your personal information and identity Use a strong password: Your password is the equivalent of the lock and key to your house on the Internet. Passwords are a major defence, and developing good password practices will help keep your sensitive […]

Security

Protect your personal computer (PC) and portable devices

Credits: http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/pc-portable-devices   European Cyber Security Month an EU advocacy campaign that takes place in October Protect your personal computer (PC) and portable devices   PC Use a firewall: Firewalls protect your network some viruses and hackers Install anti-virus software: Anti-virus software prevents virus infections from spreading on your computer Get the latest security updates: […]

Security

The sad state of Java security

I wrote many times about Java, their vulnerabilities, how to disable it… Just search in this blog for the term Java.         I’ve been asked many times why do I think that we are seeing these zero day vulnerabilities. The problem The problem of Oracle is that they bought a technology that was […]

Security

The three most common web based attacks and how to protect against them

Cybercriminals increasingly are attacking enterprises at their weakest point: the end user device. New forms of malware and social engineering attacks threaten your users every day, and even more so as they expand their use of Web-based applications. 1. Drive-by downloads. Users are visiting known websites that have a good reputation and don’t even think that it […]