Home » Archive

Articles in the Defense In Depth Category

Defense In Depth | Posted 11 Jan 2015 | Comments Off on Microsoft Limits Advanced Notifications | 1,149 views
Microsoft Windows Logo

According to a recent blog post, Microsoft will be limiting access to its Advanced Notification Service. ANS provides customers with a heads up of the upcoming patches, which allows them to schedule changes and maintenance windows. Chris Betz wrote …

Defense In Depth | Posted 28 Dec 2014 | Comments Off on Ready for PCI DSS 3.0? | 1,035 views
Lock Panel

Credit card data breaches are be becoming more prevalent in the news. Breaches result in lost time, money, and reputation for everyone except the hacker. Vigilance is critical.

Vendors have until January 1st to be compliant with the latest PCI …

Defense In Depth | Posted 9 May 2014 | Comments Off on A Poor Use of Sudo | 2,024 views
keyboard

Sudo is the tool in Linux and Unix environments for granting administrative privileges to a normal user on a server. The beauty of sudo is that the user does not need to know the root password. Their own password grants …

Defense In Depth | Posted 30 May 2012 | Comments Off on GTRI Launches Titan | 4,836 views
keyboard The Georgia Tech Research Institute (GTRI) has announced the launch of a new weapon to fight against industrial espionage. The project will help...
Defense In Depth | Posted 9 Sep 2011 | Comments Off on Remote Admin With A Linux Bastion Host | 2,553 views
Lock Panel

A bastion host is a publicly accessible computer that has been hardened to protect the running services. A Linux-based bastion host is a good tool for allowing secure remote administration. The operating system is free and can be locked down …

Defense In Depth | Posted 30 Aug 2011 | Comments Off on RDP Defenses | 1,270 views
Gummy Worms

The Internet Storm Center is reporting a 10-fold spike in RDP traffic. The increase in RDP scans is suspected to be caused by a new work called Morto. The worms spreads by simple port scanning and brute force …

Defense In Depth | Posted 27 Aug 2011 | Comments Off on Your Mailbox Is Over Quota | 1,632 views
Suspected Phishing Site

Your mailbox is over quota. At least, that is what the sender wants you to believe. The email typically contains a dire warning that your email will be cutoff unless you follow the link and re-verify your account.

Unfortunately, the …

Defense In Depth | Posted 15 Apr 2011 | Comments Off on 10 Plugins To Secure WordPress | 2,767 views
WordPress Filler Panel As WordPress grows in popularity, it becomes the target of hackers and spammers hoping to leverage the site for malicious purposes. We've compiled a short list ten popular plugins to help protect your valuable web real estate.