Search Results | Malware
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT
Sort by:  Most Relevant  |  Date
Top six myths of IoT security

Blog  Security has been the subtitle for all discussions about the internet of things. But a lot of that discussion has been based on some bad assumptions and misinterpretations. IoT can be secured, but just not in a lot of the ways that are being discussed. Here are six of the most common IoT security my...

Last updated: Apr 26, 2018   3:20 PM GMT  |  Blog: IoT Agenda   |      CIA, Consumer IoT, Enterprise IoT
How to stop our smart homes from turning against us

Blog  The Internet of Things is transforming our homes into data centers before our very eyes. Yet unlike in the data center, we dont have IT professionals on call to manage, patch and secure these systems. Already in 2016, there are reports of LG Smart TVs being targeted by scareware. And just recentl...

Last updated: May 31, 2016   5:27 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, iot security
What's the Storage Capacity of an NSA Data Center?

Blog  You know how people periodically like to figure out the bandwidth of a station wagon loaded with storage media? Now we have a new one: How much storage will the NSA data center in Utah actually have? "Much has been written about just how much data that facility might hold, with estimates ranging fro...

Last updated: Aug 9, 2013   11:45 PM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery
Top 10 business steps to secure IoT ecosystems

Blog  In IoT environments where devices, applications and people are interconnected across vast and disparate ecosystems, it's imperative that security is an integral part of IoT deployments. Threats are everywhere. The attack vector is potentially limitless. IoT ecosystems encompass the network edge/per...

Last updated: Sep 14, 2017   8:40 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, Internet of Things, Inventory Management
IoT security: It takes a village

Blog  The cybersecurity landscape is in a constant state of flux. One that has advanced rapidly as cyberattackers and defenders engage in a digital arms race. Historically, cybersecurity threats were limited to computer viruses; the motivations behind them ranging from geeks in the attic writing them simp...

Last updated: Mar 9, 2017   5:19 PM GMT  |  Blog: IoT Agenda   |      Authentication, Data-security, Enterprise IoT
Macs vs PC - Which is better??

Blog   I was interviewed about Macs versus PCs. Here is what I said on price, style etc.Here is the interview in full. Q. Is it possible to summarise the main differences between Macs and PCs, the key features that set them apart? The best way to describe the difference between a Mac and a PC is that the...

Last updated: Oct 8, 2010   2:06 PM GMT  |  Blog: Inspect-a-Gadget   |      Mac, MacBook, PC
Google privacy check gives greater cause for concern

Blog   Google raised fresh cause for concern today when it offered an opt-out of its web tracking by changing the privacy settings in Gmail.I took up its offer to opt out of various schemes it has to track people's web browsing and to use the content of my email communications to tailor its advertising an...

Last updated: Aug 6, 2015   2:42 PM GMT  |  Blog: Public Sector IT   |      Uncategorized
Protecting smart technologies and IoT from cyber-kinetic attacks

Blog  Taking a smarter approach to creating "smart everything" Making physical objects or systems "smart" is all the rage today. Terms like smart houses, smart cars, smart cities, smart grids, smart refrigerators and even smart hairbrushes pop up everywhere. But there's something not smart in the way thi...

Last updated: Dec 14, 2017   4:35 PM GMT  |  Blog: IoT Agenda   |      CPS, Cybercrime, cybersecurity
Security controls must keep pace with internet-connected devices

Blog  The ability to connect devices is becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability...

Last updated: Jul 8, 2019   6:59 PM GMT  |  Blog: IoT Agenda   |      Cyber security, Cyberattacks, Internet of Things
Chrome: A shiny Web browser from Google may just be the next global platform for running Web applications

Blog  Techies and geeks returned from one last weekend of sun, sand and summer to find news of a disruptive change sweeping the online business world. Meet Chrome, Google's new Web browser. News of the announcement was leaked yesterday when Philipp Lenssen, an avid blogger of all-things-Google, received ...

Last updated: Sep 2, 2008   10:21 PM GMT  |  Blog: Our Latest Discovery
Steps carmakers need to make to secure connected car data

Blog  We are steadily moving toward a future where connected cars are becoming the norm. This is in large part thanks to the huge increase in consumer demand that has been fuelled by the convenience that IoT-connected vehicles can offer. This consumer demand makes sense when we consider the far-reaching ...

Last updated: Nov 12, 2018   3:25 PM GMT  |  Blog: IoT Agenda   |      Connected car, Connected vehicles, Data privacy
Is dropbox just a drop kick from an enterprise goal?

Blog  A colleague recently posted an article internally. TheYahooarticledescribed Salesforce and Dropbox and the fundamentally different ways in which these two organizations view the sales organization in the enterprise space. We have similar challenges in the SAP space at Winshuttle. As a part ...

Last updated: Mar 11, 2016   1:22 PM GMT  |  Blog: Working alongside SAP Business Suite   |      CRM, Enterprise, ERP
Some Common Sense Ideas When Designing a Virtualization Environment

Blog  This is my attempt at putting together something that every sysadmin and supervisor should have when they look at whether to take the next step in virtualization - a Common Sense (tm, patent-pending, sm, r) guide to putting virtualization in place. Truth be told, it works with any server virtualizat...

Last updated: Aug 8, 2007   1:15 AM GMT  |  Blog: The Virtualization Room
Life after the IoT botnet: Eleven key takeaways

Blog  On Friday October 21, 2016, internet infrastructure provider Dyn was the victim of a distributed denial of service attack (DDoS). Data shows that an army of compromised connected devices were mobilized to execute the attack, leveraging recently published source code for the Mirai strain of malware. ...

Last updated: Nov 8, 2016   10:08 PM GMT  |  Blog: IoT Agenda   |      Botnet, DDOS, Denial of Service
Nifty tools for tracking down that "interesting" network traffic

Blog  My previous posting was meant to help you determine the source of potentially dangerous network traffic at your network's edge. This post is meant to help you identify applications and traffic on your local network that seems to be "interesting". I define "interesting" as something that you don't kn...

Last updated: Jan 29, 2009   9:13 PM GMT  |  Blog: IT Trenches
Hardware Malware

Blog  I can't say that this is surprising, if the shoe was on the other foot they would be doing it to them. https://www.cl.cam.ac.uk/~sps32/sec_news.html#Assurance This is a clear sign that the current supply chains are a bad idea, just because it's cheaper does not mean its the best solution. A huge...

Last updated: May 28, 2012   6:57 AM GMT  |  Blog: Irregular Expressions
IoT Cybersecurity Improvement Act of 2017: The pros and cons from a hacker

Blog  Most of you have heard of the internet of things, the catchall phrase for common devices, such as routers, cameras, printers, refrigerators, door locks and so on, that have been enabled by their manufacturers to be controlled or to communicate over the internet. Most of you have also probably heard...

Last updated: Sep 26, 2017   2:01 PM GMT  |  Blog: IoT Agenda   |      Botnet, Consumer IoT, cybersecurity
VMWare Malware Lab

Blog  I am not going to cover the basic setup of a VMWare based lab, really you can use what ever you want as long as you can attempt to keep it isolated from the system. I use VMWare for a couple reasons, mainly for the ability for me to take vm's from fustion, workstation, ESXi and move them back and f...

Last updated: Aug 15, 2012   6:17 AM GMT  |  Blog: Irregular Expressions
Fun anti-malware site

Blog  I found this stumbling around the Internets. http://wam.dasient.com/wam/infection_library_index Nice little list for starting research.

Last updated: Sep 17, 2010   2:13 AM GMT  |  Blog: Irregular Expressions
Malware using extension .CFG

Answer  My virus scanner isolates files with a .CFG extension. It parks them in a subfile labeled cfgall. I understand this is another name for W97M-ORTANT.A. I can't find anything with that name or W97 anywhere on the affected computer. This computer is running Windows XP. How do I get rid of this?

Last updated: Mar 11, 2016   2:20 PM GMT   |    malware, Security, Windows XP
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: