Home » Archive

Articles in the Defense In Depth Category

Microsoft Windows Logo

According to a recent blog post, Microsoft will be limiting access to its Advanced Notification Service. ANS provides customers with a heads up of the upcoming patches, which allows them to schedule changes and maintenance windows. Chris Betz wrote …

Lock Panel

Credit card data breaches are be becoming more prevalent in the news. Breaches result in lost time, money, and reputation for everyone except the hacker. Vigilance is critical.

Vendors have until January 1st to be compliant with the latest PCI …

keyboard

Sudo is the tool in Linux and Unix environments for granting administrative privileges to a normal user on a server. The beauty of sudo is that the user does not need to know the root password. Their own password grants …

keyboard The Georgia Tech Research Institute (GTRI) has announced the launch of a new weapon to fight against industrial espionage. The project will help...
Lock Panel

A bastion host is a publicly accessible computer that has been hardened to protect the running services. A Linux-based bastion host is a good tool for allowing secure remote administration. The operating system is free and can be locked down …

Gummy Worms

The Internet Storm Center is reporting a 10-fold spike in RDP traffic. The increase in RDP scans is suspected to be caused by a new work called Morto. The worms spreads by simple port scanning and brute force …

Suspected Phishing Site

Your mailbox is over quota. At least, that is what the sender wants you to believe. The email typically contains a dire warning that your email will be cutoff unless you follow the link and re-verify your account.

Unfortunately, the …

WordPress Filler Panel As WordPress grows in popularity, it becomes the target of hackers and spammers hoping to leverage the site for malicious purposes. We've compiled a short list ten popular plugins to help protect your valuable web real estate.