by wwarren | Sep 21, 2011 | Security, Security Alerts
Cars with OnStar’s built-in technology will begin having their where-abouts monitored in December, even if their owners opt-out of the service, according to a new privacy statement issued by the vehicle navigation and emergency notification service this week. via...
by wwarren | Sep 19, 2011 | Cloud Computing, Internet, Security, Security Alerts
In order to execute their attack, Rizzo and Duong use BEAST Browser Exploit Against SSL/TLS against a victim who is on a network on which they have a man-in-the-middle position. So in order to “break” the AES component of SSL 3.0...
by wwarren | Jul 2, 2011 | Internet, Security, Security Alerts
p2p software is a great thing but highly dangerous when not properly configured. By default p2p software shares files..sometimes everything on your hard drive depending on the program used. A good gateway firewall is your best bet if you don’t have airtight...
by wwarren | Jun 30, 2011 | Internet, Security, Security Alerts
You can waste time creating a new MBR then trying to clean ALL the infected files from not just the rootkit but it’s buddies as well. Save your clients time and money and their security. Backup/format/reload. An antivirus of its own Just like Sinowal, TDL-4 is...
by wwarren | Jun 30, 2011 | Internet, Microsoft, Security, Security Alerts
I am seeing more and more infections on client computers using this rootkit. The common vector i see if either flash or IE ActiveX exploits. It is nearly time to just block flash at the firewall as well as ActiveX. ‘Indestructible’ rootkit...
by wwarren | Jun 16, 2011 | Security, Security Alerts
This is a Microsoft employee giving another examination of Stuxnet. It’s over an hour..you can see a Ted video here as well. Microsoft Analyzes Stuxnet