Home » Archive

Articles in the Defense In Depth Category

The Georgia Tech Research Institute (GTRI) has announced the launch of a new weapon to fight against industrial espionage. The project will help...

A bastion host is a publicly accessible computer that has been hardened to protect the running services. A Linux-based bastion host is a good tool for allowing secure remote administration. The operating system is free and can be locked down …

The Internet Storm Center is reporting a 10-fold spike in RDP traffic. The increase in RDP scans is suspected to be caused by a new work called Morto. The worms spreads by simple port scanning and brute force …

Your mailbox is over quota. At least, that is what the sender wants you to believe. The email typically contains a dire warning that your email will be cutoff unless you follow the link and re-verify your account.

Unfortunately, the …

As WordPress grows in popularity, it becomes the target of hackers and spammers hoping to leverage the site for malicious purposes. We've compiled a short list ten popular plugins to help protect your valuable web real estate.

A post on the Google security blog has stated that the MHTML vulnerability is being actively exploited. The MHTML protocol, which is unique to Internet Explorer, allow ┬áthe browser to download multiple files in a single MIME encapsulated file. …

The release candidate for Internet Explorer 9 is out. Microsoft has stressed the new performance and security features of the redesigned browser.

The newly redesigned interface squeezes the top user interface into a single row including the URL field and …

ClamAV 3.0 for Windows Open Beta

The open-source ClamAV toolkit is officially moving into new territory- Windows. The new ClamAV 3.0 for Windows is now in open beta. ClamAV for Windows utilizes the cloud to aid with the propagation of new detection signatures. Evaluation downloads …