Home » Archive

Articles in the Defense In Depth Category

keyboard The Georgia Tech Research Institute (GTRI) has announced the launch of a new weapon to fight against industrial espionage. The project will help...
Lock Panel

A bastion host is a publicly accessible computer that has been hardened to protect the running services. A Linux-based bastion host is a good tool for allowing secure remote administration. The operating system is free and can be locked down …

Gummy Worms

The Internet Storm Center is reporting a 10-fold spike in RDP traffic. The increase in RDP scans is suspected to be caused by a new work called Morto. The worms spreads by simple port scanning and brute force …

Suspected Phishing Site

Your mailbox is over quota. At least, that is what the sender wants you to believe. The email typically contains a dire warning that your email will be cutoff unless you follow the link and re-verify your account.

Unfortunately, the …

WordPress Filler Panel As WordPress grows in popularity, it becomes the target of hackers and spammers hoping to leverage the site for malicious purposes. We've compiled a short list ten popular plugins to help protect your valuable web real estate.
Internet Explorer Panel

A post on the Google security blog has stated that the MHTML vulnerability is being actively exploited. The MHTML protocol, which is unique to Internet Explorer, allow ┬áthe browser to download multiple files in a single MIME encapsulated file. …

Internet Explorer Panel

The release candidate for Internet Explorer 9 is out. Microsoft has stressed the new performance and security features of the redesigned browser.

The newly redesigned interface squeezes the top user interface into a single row including the URL field and …

ClamAV

The open-source ClamAV toolkit is officially moving into new territory- Windows. The new ClamAV 3.0 for Windows is now in open beta. ClamAV for Windows utilizes the cloud to aid with the propagation of new detection signatures. Evaluation downloads …