Roundup: 4 Most Interesting Infosec Articles
Limiting access to Internet resources can help in mitigate the risk of getting new malware but this will protect only to a certain point. GFI posted an article about why we need to monitor Internet usage within your organization.
There are four critical reasons to monitor Internet usage within your organization. Without having to single out any one user or play Internet Cop, these four reasons should be more than enough to convince you that at the very least, some aggregate reporting and proactive defense measures are essential to protect the organization and the employees themselves. Together with each reason, I will share my own first-hand experience that made me appreciate the use of Internet monitoring.
Read the rest of this article:
On daily network operation we may face a number of threats from attackers or misconfigurations of infrastructure or network devices, or even from simple outages. Usually reasons for the network problem may differ like Hardware problem, Software problem or misconfiguration.
The following list includes 75 of the most common reasons for compromised home network security; read through them to make sure that your own network is truly security.
Read the full article:
Anonymous group are so active and on a daily bases they are illegally conducting new crimes, this time LulzSec and Anonymous hit FBI and Nato with ManTech hack.
Hactivist groups Anonymous and LulzSec have posted nearly 400MB of documents they claim to have stolen from US government cyber security contractor ManTech International, as part of the ongoing AntiSec campaign to expose corruption and collusion in public and private sector organisations.
Read the full article:
Any modern office may not work without scanners, photocopiers and phones here Zscaler has found that security components are often unpatched or on their default settings, allowing an attacker to look up passwords and access codes from online support material.
The security firm will deliver a presentation a next week’s Black Hat conference which shows the ease with which an attacker can exploit web-enabled devices such as scanners, photocopiers and telephony equipment to steal information.
Read full article