SMSMS

Unveiling an Indian Cyberattack Infrastructure

The report below details a cyber attack infrastructure that appears to be Indian in origin. This infrastructure has been in operation for at least three years, more likely close to four years. The purpose of this framework seems predominantly to be a platform for surveillance against targets of national security interest (such as Pakistan). The report also shows how it has been used for industrial espionage against the Norwegian telecom corporation Telenor and other civilian corporations.

Download the report from here – http://normanshark.com/pdf/Unveiling%20an%20Indian%20Cyberattack%20Infrastructure-23_FINAL_052013.pdf

Share

Be the first to comment - What do you think?  Posted by George - August 13, 2013 at 11:59 am

Categories: Security   Tags: , , ,

Malware Prevention and Handling Guide

This publication provides recommendations for improving an organization’s malware incident prevention measures and handling for Desktops and Laptops. It also gives extensive recommendations for enhancing an organization’s existing incident response capability so that it is better prepared to handle malware incidents, particularly widespread ones.

Download the complete guide from here – http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf

Be the first to comment - What do you think?  Posted by George - August 2, 2013 at 12:06 pm

Categories: Security   Tags: , , ,

5 Essential Tips for Windows 8 Networking

5 important tips about Windows 8 networking that will make your life easier as a Windows 8 user.

Read more…

Be the first to comment - What do you think?  Posted by George - July 25, 2013 at 12:40 pm

Categories: Windows 8   Tags: , ,

Using nmap scripts to enhance vulnerability assessment results

There is an alternative to perform vulnerability assessments to SCADA devices less risky and with good result information. You can use nmap scripting engine to add vulnerability scanning functionality.

Read more here – https://isc.sans.edu/diary/Using+nmap+scripts+to+enhance+vulnerability+asessment+results/16090

Be the first to comment - What do you think?  Posted by George - July 10, 2013 at 11:43 am

Categories: Security   Tags: , ,

Risks of Free Apps and Rooted Devices

McAfee June’s Consumer Mobile Trends Report explores some of the threats posed by free Apps where free Apps and rooted devices may abuse permissions to deliver profits to criminals. Under the camouflage of “free” apps games, personalization, tools, music, and adult content—criminals get consumers to download apps with invasive permissions.

Read more…

Be the first to comment - What do you think?  Posted by George - July 5, 2013 at 11:39 am

Categories: Security   Tags: , , , , , ,

Removal Guide for Ramsomware

In case your computer gets infected with the ubiquitous ransomware that pretends to be some form of action by the Department of Justice, Department of Homeland Security, or the FBI and that states child pornography was detected on your computer, then make sure that you have a copy of this removal guide at hand! The Your computer has been locked Ransomware is a computer infection that prevents you from accessing your Windows desktop, files, or applications until you pay a $300 ransom to the malware developers.

Get the full guide from here – http://www.bleepingcomputer.com/virus-removal/remove-your-computer-has-been-locked-ransomware

Be the first to comment - What do you think?  Posted by George - June 19, 2013 at 4:02 am

Categories: Security   Tags: , , ,

Free DNS Sniffer utility

A free Windows utility from NirSoft allows you to capture and display DNS traffic on your system. The utility called DNSQuerySniffer is capable of displaying the Host Name, Port Number, Query ID, Request Type (A, AAAA, NS, MX, and so on), Request Time, Response Time, Duration, Response Code, Number of records, and the content of the returned DNS records.

Read more…

Be the first to comment - What do you think?  Posted by George - June 14, 2013 at 7:57 am

Categories: Uncategorized   Tags: , , ,

« Previous PageNext Page »