Blog Posts Tagged with "Operating Systems"

B64e021126c832bb29ec9fa988155eaf

Windows 8 Security in Action: Part 3

January 16, 2013 Added by:Dan Dieterle

User training about online threats and phishing defense needs to remain in place. The standard advice of not running unknown or unsolicited attachments, or visiting suspicious websites, and all the normal Social Engineering defense training remains the same...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Windows 8 Forensics: USB Activity

December 03, 2012 Added by:Dan Dieterle

When I started working on Windows 8 USB drive forensics, I assumed it would be similar to Windows 7. I created a fresh Windows 8 VM and plugged a thumb drive into my local system. The VM recognized it as it should. I shut the VM down and opened it in EnCase to examine what happened...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Windows 8 Forensics: Recycle Bin

November 27, 2012 Added by:Dan Dieterle

The purpose of this project is to determine key differences between the Windows 7 and Windows 8 operating system from a forensic standpoint in order to determine if there are any significant changes that will be either beneficial or detrimental to the forensic investigation process...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Windows 8 Security in Action: Part 2

November 22, 2012 Added by:Dan Dieterle

I have noticed some changes in the way Microsoft handles their different service account passwords over the past few weeks. It first started a while back when using Microsoft Live mail. One day when I typed in my legitimate password to my e-mail account, I received this error message...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Windows 8 Security in Action: Part 1

November 04, 2012 Added by:Dan Dieterle

Is Windows 8 the next operating system for your enterprise? In this article, we will take a quick look at Microsoft’s new OS – Windows 8. We will see some of the new security features that make it more secure than its predecessor Windows 7...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Rethinking the consumer/enterprise operating system

October 28, 2012 Added by:Rafal Los

When Microsoft converged their kernel and made a single version of Windows most people were relieved, especially Microsoft developers and security types. It was now going to be easier to maintain the code base - but was that the right call? I think the jury may still be out...

Comments  (3)

32137b352537f11c1efe063869f00e0e

Java, Flash, and the Choice of Usability Over Security

September 10, 2012 Added by:Le Grecs

Convenience vs. Security: My goal of not installing Flash and Java on a new system didn't last more than a few hours. Yet, as infosec professionals, following the disable unnecessary services philosophy, we advise not installing these types of applications for security reasons...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Multi-Platform Backdoor Malware in the Wild

July 11, 2012 Added by:Headlines

"The JAR file checks if the user's machine is running in Windows, Mac or Linux then downloads the appropriate files... the three different platforms behave the same way. They all connect to 186.87.69.249 to get additional code to execute. The ports are 8080, 8081, and 8082 for OSX, Linux, and Windows respectively..."

Comments  (0)

F2792196079f2c16cd02be6e9ff5b3da

Why Open Source is Not Always the Best Bet

July 02, 2012 Added by:DHANANJAY ROKDE

Although open source software appears fantastic at the outset, they often come with an indirect price to pay, and it takes a lot of time for the organization to realize this. If your organization is hit by the ‘using open source to reduce costs’ wave, here are a few points you to look at before taking the leap...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

Microsoft, the CIA and NSA Collude to Take Over the Internet

June 20, 2012 Added by:J. Oquendo

The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Apple's Crystal Prison and the Future of Open Platforms

June 06, 2012 Added by:Electronic Frontier Foundation

Apps that require administrative privileges are impossible to install on an iOS device without jailbreaking it. This includes apps that let you firewall your device and secure your internet traffic with OpenVPN. Jailbreaking also helps security and privacy researchers to see if apps are leaking data...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Apple Releases OS X and Safari Security Updates

May 11, 2012 Added by:Headlines

Apple has released critical security updates for OS X and Safari to address several vulnerabilities which could allow an attacker to obtain sensitive information, execute arbitrary code, escalate privileges, conduct a cross-site scripting attack, or cause a denial-of-service...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Mobile Applications Shouldn’t Roll Their Own Security

May 01, 2012 Added by:Brent Huston

Many of the applications being designed are being done so by scrappy, product oriented developers. This is not a bad thing for innovation - in fact just the opposite - but it can be a bad thing for safety, privacy and security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple Releases Flashback Malware Removal Tool and Patches

April 17, 2012 Added by:Headlines

Apple has released a malware removal tool for the most common variant of the Flashback Trojan, as well as security updates to mitigate the vulnerability exploited by the malware for OS X Lion v10.7.3, OS X Lion Server v10.7.3. Mac OS X v10.6.8 and Mac OS X Server v10.6.8...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple: Critical Update for Java for OS X Lion and Mac OS X

April 04, 2012 Added by:Headlines

"Vulnerabilities exist in Java 1.6.0_29, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Mozilla's Boot to Gecko: Do Not Track on a Mobile OS

March 20, 2012 Added by:Electronic Frontier Foundation

There is ample evidence mobile applications are exceeding the privacy expectations of users. The first implementation of Do Not Track on a mobile OS is a big step toward ensuring users have a meaningful choice when it comes to digital tracking...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked