There is a new threat in town when it comes to malware; it attacks without prejudice and it’s got cross-platform power. The same strain of a particular malware and virus, if it has cross-platform ability, can hit multiple OS such as Windows, Mac and Linux etc., simultaneously. It is exceedingly harmful because it has the ability to not just infiltrate multiple OS, but also transfer infection.
Cryptolocker is malware that is categorized as ransomware. Accrdoing to Wikipedia, “Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed” (Wikpedia). Cryptolocker is dangerous because if you are infected with the malware, you are in danger.
PYTHON AS A POWER TOOL When I talk with Network Engineers and Operations teams about automation, often times the response is: “I am not a programmer, so I can’t do this”. Worse yet are folks in the blog-o-sphere saying that if networking folks don’t become a programmers, they will become obsolete. This is all rubbish. Have you ever used Linux, and.
Introducing Kali Linux The creators of BackTrack have released a new, advanced penetration testing Linux distribution named Kali Linux. BackTrack 5 was the last major version of the BackTrack distribution. The creators of BackTrack decided that to move forward with the challenges of cyber security and modern testing a new foundation was needed. Kali Linux was born and released March 13th.
The F-Bomb was a highly destructive virtual weapon developed for use over the internet when frustrated users were extremely annoyed by a certain webpage, explaining why Wikipedia was usually its target. Over time, the design of the F-Bomb developed from a manual website filter to the Biggest (and most awesome) Weapon of Mass Destruction. A group of internet savvy students came together to.
We live in an era of increasingly complex threats: IT-related, financial… even geo-political. Personnel forms the bedrock of security in any organization, so how do we ensure that the recruiting process keeps security risks in check? In my latest novella The Candidate, headhunter Nick Thorneycroft works for a tech firm in Luxembourg. Nick is trying to recruit a high-flying executive for.
Joey Muniz, wrote an excellent article on Metasploit on his website http://www.thesecurityblogger.com/ The original post can be found HERE. Metasploit is one of the most popular open source penetration testing frameworks available today. It offers tons of tools that range from scanning utilities to easy to launch exploits that include encoders used to bypass common security defenses. I’ll.
A great post posted on the Last Watchdog (http://lastwatchdog.com/) (Editor’s note: In this guest post, Dan Hubbard, Chief Technology Officer for OpenDNS, outlines how Big Data is destined to make bigger contributions to a safer Internet.) The growing sophistication of computer malware, especially its ability to morph and assume different forms, is making traditional approaches to security.
Cisco ISE vs Cisco NAC Appliance Cisco NAC Appliance Overview With Cisco NAC Appliance (formerly Cisco Clean Access), security professionals can use an organization’s network infrastructure to enforce security policy compliance on all devices that attempt to gain access. Your network administrators can use the Cisco NAC Appliance to authenticate, authorize, evaluate, and remediate wired,.
Mac OS X users can effortlessly join existing networks that use Microsoft Active Directory, Open Directory, or other LDAP services for enterprise policies for strong authentication and password-protected access to network resources. No additional software is needed, and the features are built directly into the Mac’s operating system. Configuring a Mac to Connect to a Network Account Server.