Nov 302014
 

http://www.informationsecuritybuzz.com/diverting-cyber-monday-security-storm/

Nov 282014
 

Here is an article from Microsoft on how to setup a wireless network with authentication.  It has all the links to get you setup using a RADIUS server with certificate ideas and all.  Quite a good resource.  Now a days, it is a good idea to run a RADIUS server as wireless networks are pretty easy to break into without one of these systems.  Most routers on the market today have the feature to become a RADIUS client and that is the first hardware step to creating one of these secure wireless networks.  However, as the saying goes…”There is no such thing as a secure wireless network”…maybe just more secure than your neighbor.
http://technet.microsoft.com/en-us/library/dd283093(v=ws.10).aspx

Nov 272014
 

With so many people wanting to shop on Black Friday, Thanksgiving and Cyber Monday, it is important to remember that that there are many scams to look out for.  Last year yielded a few scams.  Here are 4 listed in this article.  Happy Thanksgiving!

http://thehackernews.com/2014/11/black-friday-and-cyber-monday-4-scams_26.html

Nov 272014
 

Running an Outlook server takes some expertise, but it takes just a bit more to secure it.  In this article, it shows some good methods to secure the server.  Some are simple , such as, encrypting all connections, but some are like using high end application firewalls with features such as grammatical analyzation and suspicious user tracking and mitigation. 

http://www.denyall.com/securityblog/securing-outlook-web-access/

Nov 262014
 

This is a great example of how to do a social engineering attack.  All it takes is a determined individual with the information that is freely available on the internet that most of us provide.
http://resources.infosecinstitute.com/social-engineering-a-hacking-story/

Nov 252014
 

Pablos Holman makes a great video and a talk about how insecure most everything is in the world around us.  He includes everything from bluetooth devices to cars to TVs in hotel rooms.

Nov 242014
 

This year has been quite a year of breaches, bugs, and flaws.  This article from CSO of Australia compares the predictions with the actual turn out.

http://www.cso.com.au/article/559652/how-did-last-year-security-predictions-pan/

WordPress Appliance - Powered by TurnKey Linux