IT Security
6.1K views | +0 today
Follow
IT Security
Windows IT Security News
Curated by IS Decisions
Your new post is loading...
Your new post is loading...
Scooped by IS Decisions
Scoop.it!

Microsoft seals up Windows zero-day flaw in April Patch Tuesday

Microsoft seals up Windows zero-day flaw in April Patch Tuesday | IT Security | Scoop.it

Microsoft released 6 bulletins on Tuesday to fix a total of 11 vulnerabilities, one of which has become the target of active attacks against unpatched applications.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

10 Best Ways To Stop Insider Attacks

10 Best Ways To Stop Insider Attacks | IT Security | Scoop.it

What's the best way to spot and block insider attacks? Start by putting an insider attack prevention program in place. So says Dawn Cappelli, technical manager at Carnegie Mellon University's CERT Insider Threat Center.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

13 Free Security Tools and Resources

13 Free Security Tools and Resources | IT Security | Scoop.it

Here's a list of some of the best free security tools and services that my fellow editors and external security experts have found invaluable to help them do their jobs.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft blames security info-sharing program for attack code leak

Microsoft blames security info-sharing program for attack code leak | IT Security | Scoop.it

Microsoft confirmed that sample attack code created by the company had likely leaked to hackers from a program it runs with antivirus vendors.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

It's Microsoft Patch Tuesday: March 2012

It's Microsoft Patch Tuesday: March 2012 | IT Security | Scoop.it

Justin James gathers the information you need to make the right deploy decision when applying Microsoft’s March 2012 patches in your organization.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft Trustworthy Computing: what next?

Microsoft Trustworthy Computing: what next? | IT Security | Scoop.it

Ten years ago, Microsoft set up the Trustworthy Computing (TwC) group, but a lot has changed since then. How relevant is Microsoft's trustworthy computing mission in today's world?

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Is your free AV tool a ‘resource pig?’

Is your free AV tool a ‘resource pig?’ | IT Security | Scoop.it

I put six popular, free antivirus tools through their paces and measured their impact on startup and shutdown times, disk space, and RAM use.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft Security Bulletin Summary for February 2012

Microsoft Security Bulletin Summary for February 2012 | IT Security | Scoop.it

Microsoft released 9 patches that fix a total of 21 vulnerabilities. Of these vulnerabilities, 13 remote code execution vulnerabilities, 3 elevation of privilege vulnerabilities, and 5 information disclosure vulnerabilities were patched.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Combating The Insider Threat With Misuse Cases

Combating The Insider Threat With Misuse Cases | IT Security | Scoop.it

We focus on keeping the bad guys out with firewalls, intrusion detection, etc, but what about the bad guy is sitting in the cubicle next to you? Learn about misuse cases and how they can help combat the insider threat.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

What Can a Hacker Do with Stolen WiFi Credentials?

What Can a Hacker Do with Stolen WiFi Credentials? | IT Security | Scoop.it

Exposing the list of WiFi credentials to an unintended party or person without the user’s knowledge can have serious security implications if the former has malicious intent.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft: Worm Operator Worked at Antivirus Firm

Microsoft: Worm Operator Worked at Antivirus Firm | IT Security | Scoop.it

In a surprise filing made late Monday, Microsoft said a former technical expert at a Russian antivirus firm was the person responsible for operating the Kelihos botnet, a global spam machine that Microsoft dismantled in a coordinated takedown last year.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft's Trustworthy Computing Hits 10-Year Anniversary

Microsoft's Trustworthy Computing Hits 10-Year Anniversary | IT Security | Scoop.it

In celebration of Bill Gates' Trustworthy Computing's (TwC) decade of operation, Microsoft released a retrospective of the company's quality assurance strategy.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft BitLocker Administration and Monitoring

Microsoft BitLocker Administration and Monitoring | IT Security | Scoop.it

BitLocker is a valuable security add-on to the Windows OS. Microsoft BitLocker Administration and Monitoring can ease BitLocker deployment and management.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft leads seizure of Zeus-related cybercrime servers

Microsoft leads seizure of Zeus-related cybercrime servers | IT Security | Scoop.it

Microsoft said on Monday it and several partners had disrupted several cybercrime rings that used a notorious piece of malicious software called Zeus to steal US$100 million over the last five years.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

New variant shows Duqu attackers still in operation

New variant shows Duqu attackers still in operation | IT Security | Scoop.it

Security researchers at Symantec discover a new Duqu driver compiled in February 2012.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Exploit code published for RDP worm hole; Does Microsoft have a leak?

Exploit code published for RDP worm hole; Does Microsoft have a leak? | IT Security | Scoop.it

 

The code publication has set off alarm bells in the corridors at Redmond because there are clear signs that Microsoft’s pre-patch vulnerability sharing program has been breached or has suffered a major leak.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft to patch Windows bug called 'Holy Grail' by one researcher

Microsoft to patch Windows bug called 'Holy Grail' by one researcher | IT Security | Scoop.it

Microsoft says it would ship six security updates next week, only one critical, to patch seven vulnerabilities in Windows and a pair of for-developers-only programs.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Top 10 reasons why you shouldn’t ignore mobile device security

Top 10 reasons why you shouldn’t ignore mobile device security | IT Security | Scoop.it

With so many users relying on mobile phones and tablets for business, mobile security is a must. Here are 10 reasons why you can’t continue to overlook it.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft code not the security sieve sysadmins should be worried about

Microsoft code not the security sieve sysadmins should be worried about | IT Security | Scoop.it

Despite system administrators' efforts to keep Microsoft-supplied packages up to date, non-Redmond software is almost exclusively responsible for the growth in vulnerabilities.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

A simple framework for SMB IT risk management

A simple framework for SMB IT risk management | IT Security | Scoop.it

Don’t wait for something to go wrong before you start classifying, assessing and mitigating the risks to your IT systems.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft Readying 9 Security Bulletins for February Update

Microsoft Readying 9 Security Bulletins for February Update | IT Security | Scoop.it

While this month's Patch Tuesday will land on Valentine's Day, Microsoft will be delivering nine not-so-sweet bulletin items -- with four of them being classified as "critical" and five "important."

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Enhancing Endpoint Security for Windows Desktops

Enhancing Endpoint Security for Windows Desktops | IT Security | Scoop.it

In this article, Derek Melber discusses some of the most important aspects of endpoint security, including endpoint firewalls and endpoint password policy.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

UserLock is part of PC Mag’s Best Apps for 2012

UserLock is part of PC Mag’s Best Apps for 2012 | IT Security | Scoop.it

UserLock, a software solution that limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network, has been picked by PC Mag to be part of their “25 excellent applications for small-to-mid-sized businesses to consider in 2012”.


more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Experts: We're stuck with passwords – and maybe they're best

Experts: We're stuck with passwords – and maybe they're best | IT Security | Scoop.it

Herley and Van Oorschot say that because a succession of rival technologies going back over 20 years have failed to fulfil their potential – even password tech has not really improved during this time – memorising secret strings of characters is here to stay.

more...
No comment yet.