White Hat Computer Consulting

Solutions are only the beginning

Internet Storm Center

Subscribe to Internet Storm Center feed Internet Storm Center
Updated: 2 hours 32 min ago

This is not a test/typo: Support for Windows 8.1 Ends in a month!, (Thu, May 8th)

Mon, 05/12/2014 - 19:46

It hasn't really been reported much, but just after Microsoft sort of stopped releasing patches f ...(more)...

Beefing up Windows End Station Security with EMET, (Mon, May 12th)

Sun, 05/11/2014 - 18:31

After my post last week on things a System Administrator can do to protect against zero days in y ...(more)...

Microsoft May Patch Pre-Announcement, (Sat, May 10th)

Fri, 05/09/2014 - 21:02

Microsoft released its pre-announcement for the upcoming patch Tuesday. The summary indicates a t ...(more)...

Heartbleed, IE Zero Days, Firefox vulnerabilities - What's a System Administrator to do?, (Fri, May 9th)

Fri, 05/09/2014 - 07:20

With the recent headlines, we've seen heartbleed (which was not exclusive to Linux, but was predo ...(more)...

SNMP: The next big thing in DDoS Attacks?, (Thu, May 8th)

Thu, 05/08/2014 - 07:47

It started with DNS: Simple short DNS queries are easily spoofed and the replies can be much larg ...(more)...

New DNS Spoofing Technique: Why we haven't covered it., (Wed, May 7th)

Wed, 05/07/2014 - 08:15

The last couple of days, a lot of readers sent us links to articles proclaiming yet another new f ...(more)...

And the Web it keeps Changing: Recent security relevant changes to Browsers and HTML/HTTP Standards, (Tue, May 6th)

Tue, 05/06/2014 - 06:24

As we all know, web standards are only leaving "draft" status once they start becoming irrelevant ...(more)...

Coin Mining DVRs: A compromise from start to finish., (Mon, May 5th)

Mon, 05/05/2014 - 07:36
The Infection

We talked before about DVRs being abused as bitcoin (or better Litecoin ...(more)...

Verizon 2014 Data Breach Report, (Sun, May 4th)

Sat, 05/03/2014 - 18:29

Verizon have released their 2014

Observations from Key-logged Passwords, (Sat, May 3rd)

Sat, 05/03/2014 - 10:23

I recently had the opportunity to look at a sample of key-logged passwords collected from comprom ...(more)...

Pages