IT Security
Follow
Find
6.0K views | +0 today
IT Security
Windows IT Security News
Curated by IS Decisions
Your new post is loading...
Your new post is loading...
Scooped by IS Decisions
Scoop.it!

Microsoft Readying Real Time Hosted Threat Intelligence Feed

Microsoft Readying Real Time Hosted Threat Intelligence Feed | IT Security | Scoop.it

The software giant told an audience of law enforcement officers that it is testing a hosted, real time feed of threat data culled from its botnet takedows and global assets for use by governments, Internet service providers and the private sector.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Key IT security developments for 2012

Key IT security developments for 2012 | IT Security | Scoop.it

The most important technology trends for the coming year include virtualization, cloud computing, social networking and energy efficiency.
 

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

3 Steps To Protecting Your Company Against Data Breaches

3 Steps To Protecting Your Company Against Data Breaches | IT Security | Scoop.it

Data breaches are like lightning; they will strike, but you never know where. Some breaches result from negligence, inadvertent disclosure, but many are due to malicious activity.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft Security Advisory (2659883): Vulnerability in ASP.NET Could Allow Denial of Service

Microsoft Security Advisory (2659883): Vulnerability in ASP.NET Could Allow Denial of Service | IT Security | Scoop.it

 

Microsoft is aware of detailed information that has been published describing a new method to exploit hash tables. Attacks targeting this type of vulnerability are generically known as hash collision attacks.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Logging In With a Touch or a Phrase (Anything but a Password)

Logging In With a Touch or a Phrase (Anything but a Password) | IT Security | Scoop.it

Researchers are focusing on making passwords simpler, more secure, even automatic, like a device that can recognize your style of writing or keystroke.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Windows 8 picture password is 'Fisher-Price toy' says father of 2-factor authentication

Windows 8 picture password is 'Fisher-Price toy' says father of 2-factor authentication | IT Security | Scoop.it

The Windows 8 feature that logs users in if they touch certain points in a photo in the right order might be fun, but it's not very good security, according to the inventor of RSA's SecurID token.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Windows 8 may prompt malware attacks on hardware, McAfee predicts

Windows 8 may prompt malware attacks on hardware, McAfee predicts | IT Security | Scoop.it

Security features in Windows 8 will discourage operating-system attacks and drive hackers to develop malware that compromises hardware directly, according to McAfee's security predictions for 2012.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Cloud Security Overview

Cloud Security Overview | IT Security | Scoop.it

Security is one of the major concerns in cloud computing.

To mitigate security risks while still gaining benefits from cloud computing, organizations can choose to focus on on-premises (private cloud ) solutions. This enables the organization to move to a hybrid cloud solution in a controlled manner and extend the use of public cloud services as confidence in, and the capabilities of, the public cloud increase.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft announces security and privacy improvements for Office 365

Microsoft announces security and privacy improvements for Office 365 | IT Security | Scoop.it

Microsoft announced on Wednesday that its cloud productivity service, Office 365, is the first and only major cloud-based service to offer security standards across the U.S. and EU.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Two Zero-day Vulnerabilities Found in Flash Player

Two Zero-day Vulnerabilities Found in Flash Player | IT Security | Scoop.it

 

Two newly discovered vulnerabilities in Adobe's Flash Player can be exploited to execute arbitrary code remotely, according to advisories from the U.S. Computer Emergency Readiness Team (US-CERT) and various security research companies.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft Security Bulletin Advance Notification for December 2011

Microsoft Security Bulletin Advance Notification for December 2011 | IT Security | Scoop.it

 

 

This is an advance notification of 14 security bulletins that Microsoft is intending to release on December 13, 2011.

This bulletin advance notification will be replaced with the December bulletin summary on December 13, 2011.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Why Today Is a Very Good Day to Update Java on Your Computer

Why Today Is a Very Good Day to Update Java on Your Computer | IT Security | Scoop.it

 

A scary vulnerability in Java that was detected over the summer, and which Oracle has subsequently fixed, is being exploited by people who create the malware and crimeware that causes so many headaches for home users and corporate IT departments.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

SharePoint security should not be an afterthought

SharePoint security should not be an afterthought | IT Security | Scoop.it

Many admins and IT managers mistakenly fail to properly protect SharePoint. Here are four SharePoint security aspects that should not be overlooked.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft delivers 7 security fixes for Windows Server, Windows

Microsoft delivers 7 security fixes for Windows Server, Windows | IT Security | Scoop.it

Microsoft kicks off another year of bug squashing, delivering seven security bulletins to seal holes in Windows Server 2008 R2 and desktop versions of Windows in the first Patch Tuesday edition of 2012.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

What is Windows Defender Offline Beta?

What is Windows Defender Offline Beta? | IT Security | Scoop.it

Learn about Windows Defender Offline Beta and how it helps remove malicious and malicious and other potentially unwanted software.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft Ruins Perfect Record with Out-Of-Band Patch

Microsoft Ruins Perfect Record with Out-Of-Band Patch | IT Security | Scoop.it

It was so close. Microsoft made it 363 days in 2011 without releasing an update outside of the monthly Patch Tuesday cycle. It was also 48 hours away from finishing 2011 in double-digits for security bulletins.

But, on December 29, Microsoft pushed out an out-of-band patch -- MS11-100.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Five security risks introduced with smartphones in the enterprise

Five security risks introduced with smartphones in the enterprise | IT Security | Scoop.it

Scott Lowe discusses five smartphone security issues that should be at the top of every CIOs mind.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

A simple HTML tag will crash 64-bit Windows 7

A simple HTML tag will crash 64-bit Windows 7 | IT Security | Scoop.it

An unpatched critical flaw in 64-bit Windows 7 leaves computers vulnerable to a full 'blue screen of death' system crash.

The memory corruption bug in x64 Win 7 could also allow malicious kernel-level code to be injected into machines.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Probably the Best Free IT Security Software List in the World

Probably the Best Free IT Security Software List in the World | IT Security | Scoop.it

This huge list of free computer security products and services has been compiled over several years and is continuously updated.

The purpose of the list is to provide a comprehensive documentation of the security products available rather than specific recommendations.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Enterprise iPhone security issues and how to address them

Enterprise iPhone security issues and how to address them | IT Security | Scoop.it

iPhone security issues pose various threats to the enterprise, but IT can take some steps to keep sensitive corporate data secure.

There are several ways in which the iPhone -- or corporate data on the iPhone -- can be compromised. Understanding enterprise iPhone security risks in corporate IT infrastructure can help administrators prevent breaches.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Windows 8 identity protection features detailed

Windows 8 identity protection features detailed | IT Security | Scoop.it

The threat of identity theft is certainly one that everyone that uses a PC or any device that connects to the Internet, has to be aware of.

Microsoft's upcoming Windows 8 operating system will have some new security features that will help with protecting a person's own digital identity.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

A look into Microsoft Security Essentials 2012

A look into Microsoft Security Essentials 2012 | IT Security | Scoop.it

Scott Lowe takes a detailed view into the Microsoft Security Essentials latest build, still in beta, noting some of the changes and performing some basic testing.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Microsoft plans 20 patches next week, will fix Duqu and BEAST bugs

Microsoft plans 20 patches next week, will fix Duqu and BEAST bugs | IT Security | Scoop.it

Among the 20 patches announced by Microsoft today will likely be ones to plug the hole used by the Duqu intelligence-gathering Trojan, and to fix the SSL (secure socket layer) 3.0 and TLS (transport layer security) 1.0 bug popularized three months ago by the BEAST, for "Browser Exploit Against SSL/TLS," hacking tool, security experts said.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Cloud Computing: Virtual Cloud Security Concerns

Cloud Computing: Virtual Cloud Security Concerns | IT Security | Scoop.it

Virtualization is transitioning from the technology that drives server consolidation and datacenter operations to a key ingredient in creating a flexible, on-demand infrastructure—another way of describing cloud computing.

While there are certain issues to address when adopting virtualization in any environment, there are additional security concerns that arise when using virtualization to support a cloud environment.

more...
No comment yet.
Scooped by IS Decisions
Scoop.it!

Wi-Fi Best Practices

Wi-Fi Best Practices | IT Security | Scoop.it

In this article, I take a look at the current wireless standards and discuss some common-sense best practices related to radio spectrum bands, channel selection, and security that you can begin implementing today to enhance the security, reliability, and availability of your Wi-Fi setup.

more...
No comment yet.