Home » Archive

Articles in the Defense In Depth Category

Defense In Depth | Posted 11 Jan 2015 | Comments Off on Microsoft Limits Advanced Notifications | 1,854 views
Microsoft Windows Logo

According to a recent blog post, Microsoft will be limiting access to its Advanced Notification Service. ANS provides customers with a heads up of the upcoming patches, which allows them to schedule changes and maintenance windows. Chris Betz wrote …

Defense In Depth | Posted 28 Dec 2014 | Comments Off on Ready for PCI DSS 3.0? | 1,374 views
Lock Panel

Credit card data breaches are be becoming more prevalent in the news. Breaches result in lost time, money, and reputation for everyone except the hacker. Vigilance is critical.

Vendors have until January 1st to be compliant with the latest PCI …

Defense In Depth | Posted 9 May 2014 | Comments Off on A Poor Use of Sudo | 2,205 views

Sudo is the tool in Linux and Unix environments for granting administrative privileges to a normal user on a server. The beauty of sudo is that the user does not need to know the root password. Their own password grants …

Defense In Depth | Posted 30 May 2012 | Comments Off on GTRI Launches Titan | 4,999 views
keyboard The Georgia Tech Research Institute (GTRI) has announced the launch of a new weapon to fight against industrial espionage. The project will help...
Defense In Depth | Posted 9 Sep 2011 | Comments Off on Remote Admin With A Linux Bastion Host | 2,759 views
Lock Panel

A bastion host is a publicly accessible computer that has been hardened to protect the running services. A Linux-based bastion host is a good tool for allowing secure remote administration. The operating system is free and can be locked down …

Defense In Depth | Posted 30 Aug 2011 | Comments Off on RDP Defenses | 1,422 views
Gummy Worms

The Internet Storm Center is reporting a 10-fold spike in RDP traffic. The increase in RDP scans is suspected to be caused by a new work called Morto. The worms spreads by simple port scanning and brute force …

Defense In Depth | Posted 27 Aug 2011 | Comments Off on Your Mailbox Is Over Quota | 1,747 views
Suspected Phishing Site

Your mailbox is over quota. At least, that is what the sender wants you to believe. The email typically contains a dire warning that your email will be cutoff unless you follow the link and re-verify your account.

Unfortunately, the …

Defense In Depth | Posted 15 Apr 2011 | Comments Off on 10 Plugins To Secure WordPress | 2,971 views
WordPress Filler Panel As WordPress grows in popularity, it becomes the target of hackers and spammers hoping to leverage the site for malicious purposes. We've compiled a short list ten popular plugins to help protect your valuable web real estate.