Home » Archive

Articles in the Defense in Depth Category

Beginning on March 1st, Microsoft will remove scareware applications. Under updated evaluation criteria, Microsoft will remove programs that display coercive…
If you have been feverishly applying Meltdown and Spectre patches, now you have one more to apply.
If you’re using a Western Digital MyCloud device for your local NAS storage, update it now.  Gluftech Research and development…
According to a recent blog post, Microsoft will be limiting access to its Advanced Notification Service. ANS provides customers with…
Credit card data breaches are be becoming more prevalent in the news. Breaches result in lost time, money, and reputation…
Sudo is the tool in Linux and Unix environments for granting administrative privileges to a normal user on a server.…
The Georgia Tech Research Institute (GTRI) has announced the launch of a new weapon to fight against industrial espionage. The…
A bastion host is a publicly accessible computer that has been hardened to protect the running services. A Linux-based bastion…
Release 7.1 of the TrueCrypt on-the-fly encryption application has been announced. The latest version is fully compatible with Mac OSX…
The Internet Storm Center is reporting a 10-fold spike in RDP traffic. The increase in RDP scans is suspected to…