Kevin Mitnick demonstrates a Microsoft Word document exploit

Did you know that most successful computer exploits that we encounter are because the user simply clicked a link, or opened a document without giving it a second thought? I think we’re all guilty of receiving an email from someone we know, or assume we know, then opening the email and following that link. I know I have done it, …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Microsoft FixIt for Word / Office should be applied without hesitation

Yesterday’s Microsoft Security Advisory announced a vulnerability in Microsoft Word which could permit remote code execution. The summary of this advisory simply states that people are being exploited due to a vulnerability. It happens when someone opens, or even previews an RTF in email using Microsoft Word as the email viewer. While Microsoft has not released a full patch at …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Is your video surveillance system being used to watch you?

An article caught my eye the other day, where a hacker had gained access to the video baby monitor a family had deployed. In doing so, they harassed the family a bit by saying their child’s name and moving the camera. If your video surveillance system is configured to where you have remote access, you could be allowing someone to …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Even just allowing employees to install iTunes on their machines exposes the organization to Safari/WebKit vulnerabilities

Apple Products Not Hacker Proof?   An article over on CRN on March 15 entitled “Apple Safari Patch Shows Products Not Hacker Proof” is sure to get some people’s panties in a wad, but it does correctly post the facts, though it will fall short of educating the misled public that Apple products are not hacker proof. This particular issue …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter
1

What do you say if someone wants to plug something into your network?

Let’s assume you are a business owner and a man walks in wearing a jumpsuit with an official looking badge, and tells you that he is from the power company, sent there to plug a device into your outlet that will monitor and potentially save you money. What do you do?  Let’s assume they say they are from DHEC and …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter