Posts Tagged ‘Microsoft’

NSA publish list of recommendations for Keeping Networks Secure

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected. Users are faceing lots of security issues now a days, and trying to apply all the required security measures is complicated due to the […]

Comments (1)

DHS Cyber security Watchdogs Miss Hundreds of Vulnerabilities on Their Own Network

Image via Wikipedia By Kevin Poulsen @wired.com The federal agency in charge of protecting other agencies from computer intruders was found riddled with hundreds of high-risk security holes on its own systems, according to the results of an audit released Wednesday. The United States Computer Emergency Readiness Team, or US-CERT, monitors the Einstein intrusion-detection sensors […]

Comments (1)

Microsoft Power Point 2010 Hacks and Tips

Image via CrunchBase San Francisco (GaeaTimes.com) – Microsoft Office 2010 is the latest version of Microsoft Office productivity suite. The new features of Office 2010 are its extended file compatibility and a refined user interface. Microsoft PowerPoint is one of the most important parts of the Office suite and has many advanced features. But Microsoft […]

Leave a Comment

Google attack highlights ‘zero-day’ black market

Image by Laughing Squid via Flickr By Jordan Robertson, AP The recent hacking attack that prompted Google’s threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws — and renewing debate over buying and selling information about them in the black market. Because no fix was available, the linchpin in […]

Comments (1)

Conficker C worm and April fool

Image by david ian roberts via Flickr Worm like conficker is a digital time bomb which is hard coded to trigger on April 1 (April fool’s day). Antivirus companies are doing their best to minimize the impact of conficker worm. Conficker first variant was introduced few months back and have already caused significant amount of […]

Comments (9)

Global economic insecurity and rise of insider threats

According to BBC news article by Maggie Shiels (Feb 11, 2009) the world’s biggest software maker has warned companies to expect an increase in “insider” security attacks by disgruntled, laid-off workers. Microsoft said so-called “malicious insider” breaches were on the rise and would worsen in the present downturn. Below are the high points: • With […]

Comments (1)

Network Access Control and Security

The purpose of network access control is to protect and safeguard assets attached to network from threats of unauthorized users gaining access to organization’s assets. Network Access Control (NAC) authenticate users to make sure they are authorized to login and following the policies and procedures for login before authorized to use organization assets. Some of […]

Comments (2)