I’m confident that any and all security-related incidents would be impossible to prevent or work through without the guidance of a system administrator who knows his network like the back of his hand.
I’m confident that any and all security-related incidents would be impossible to prevent or work through without the guidance of a system administrator who knows his network like the back of his hand.
We recently discovered a new breed of the bootkit Rovnix that introduces a private TCP/IP stack. It seems this is becoming a new trend for this type of malware.The implementation of the private stack is based on an open-source TCP/IP project and it can be accessed from both kernel and user modes.It works like this: […]
A hazard of cloud-based services is reputation hijacking — using the cover of a legitimate cloud service to do bad things. For example, you can’t block the domain “Google.com”, because it has legitimate purposes. So a network administrator is left in a difficult quandrary. As an example, Google Docs (specifically, Spreadsheets), is a playpen for […]
Latest Comments