Security

LATEST

Report Uncovers Decades-Long US Hacking Effort

Security researchers at Kaspersky Lab in Russia report that they have discovered how American intelligence agencies have subverted computer hardware, software and networks in an effort to spy on other countries. The surveillance and sabotage technologies have been discovered in systems in China, Iran, Pakistan, Russia, and elsewhere. Kaspersky has a policy of not naming…

View Article

February’s Patch Tuesday is All About IE

Microsoft released a sweeping set of 56 security fixes described across nine bulletins as part of its regularly scheduled “Patch Tuesday” updates yesterday. But fully 41 of those fixes are for Internet Explorer.

View Article

Enable Tracking Protection in Internet Explorer to Improve Privacy and Speed

Russell Smith shows us how to enable Tracking Protection in Internet Explorer to improve privacy and speed up your web browsing.

View Article

Millions of Android Devices Infected by Malicious Apps

Google has pulled three adware-distributing apps from its Play Store, but only after several millions devices were infected with the malicious software.

View Article

Microsoft Outlines OneDrive for Business Data at Rest Encryption, OneDrive Support Coming Soon

Microsoft has provided some additional detail about OneDrive for Business data at rest encryption, and Microsoft says normal OneDrive users should be getting the same level of security soon.

View Article

British Man Arrested in Connection with Xbox Live, PSN Attacks

In his first news post for the Petri IT Knowledgebase, Paul Thurrott discusses the arrest of a British man in connection with of the Christmas Day 2014 DDoS attacks on Xbox Live and PlayStation Network.

View Article

A Cipher Best Practice: Configure IIS for SSL/TLS Protocol

Daniel Petri shares a tool that makes it easy to configure protocol orders and ciphers without the need for manual and tedious work.

View Article

Should You Use RDP Restricted Admin Mode?

When should you use Restricted Admin Mode for remote desktop connections? Russell Smith outlines limitations and advantages to using this mode in your environment.

View Article

Anti-Malware Solutions for Microsoft Azure Virtual Machines

Learn about different anti-malware solutions for your Microsoft Azure virtual machines.

View Article

Using the Microsoft Security Compliance Manager Tool

Learn how to get started with Microsoft’s free Security Compliance Manager (SCM) tool and how it can be used to manage security and Group Policy settings.

View Article
Go to page