Tag: vulnerability

Bash or “Shellshock” vulnerability

Summary News is breaking about a major new high severity vulnerability, CVE-2014-6271 , with widespread impact. Gnu Bourne again shell (Bash) is a UNIX like command shell that is included in most distributions of Linux and also Apple OS X. The vulnerability allows an attacker to create environment variables that include malicious code before the system calls the Bash shell.

Advanced Persistent Threats: A Breakdown

It seems that lately, threats that were once were simply known as “malware” or “viruses” have been elevated to the status of Advanced Persistent Threat (APT), a term that has strategically been used to strike fear in the hearts of consumers. These days, APTs have a much more common presence in the media, and some of the most notorious have included major global threats such as Ghostnet (a botnet deployed in various offices and embassies to monitor the Dalai Lama agenda), Shady RAT (like Ghostnet but with government and global corporate targets), Operation Aurora (a threat that monitored Chinese dissidents’ Gmail accounts in 2009) and Stuxnet (an attempt to disrupt Iran’s uranium enrichment program) in 2010

April 2012 Patch Tuesday Bulletins are now Supported by Desktop Central

Microsoft April 2012 Patch Tuesday bulletins   are now supported by Desktop Central. The patch assessment team at Desktop Central has tested the patches and have updated their online patch database on April 10 , 2012 at 23:00 EST

Basic Security tips part 3 – update your software

It has become more and more difficult to identify malicious links and content on the Internet. URL shortners, ads on legitimate websites , virus downloads posing as anti-virus software and of course fake e-cards all make it harder to know where you should and should not click Having a strong network security product in place will of course prevent the installation of malicious code on our computer even if you click on one of these links

Why do government agencies need network security?

Government and municipalities are especially vulnerable to Internet attacks and face a complex set of challenges–protecting the security of data transactions, complying with regulatory mandates such as FISMA and guarding against malware and viruses, all while providing the benefits of web and network communication to employees. Attacks on smart-grids, government agencies and local municipalities demonstrate the vulnerability of government networks. In addition to protecting themselves from cybercriminals, government organizations also require technologies that allow IT administrators to create VPN connections and set up content filtering rules.