background preloader

Security

Facebook Twitter

OSSIM (Open Source Security Information Management) Security for You, Powered by All.

OSSIM (Open Source Security Information Management)

Join Us Today! Join OTX Now Leverage the Power of OTX to Stop Threats. About Open Threat Exchange AlienVault created the Open Threat Exchange (OTX™) in order to put good security measures within the reach of all businesses and organizations, but especially mid-market organizations that often cannot afford the tools and threat intelligence information that are available to large enterprises and federal governments. Through the Open Threat Exchange, security professionals on the front lines of cyber security defense and incident response now have access to free resources, projects, services and threat intelligence sourced by participants from around the world. AlienVault OTX is an open information sharing and analysis network that provides access to real-time, detailed information about incidents that may impact you, allowing you to learn from, and work with, others who have already experienced them.

Reference

Password. Anonymous. Cert. Cookies. Siem. SIT - Security Test Lab - Fraunhofer SIT. The Fraunhofer Institute for Secure Information Technology SIT develops innovations that protect information, devices, services and networks.

SIT - Security Test Lab - Fraunhofer SIT

Secure IT solutions are moreover a vital prerequisite not only of a functioning society but also for managing disasters, combating terrorism and fighting organised crime. The Institute’s goal in all its activities is to design security concepts that are as user-friendly as possible by placing human beings in the focus. After all, it is they who must be masters of the technology and not the other way round. As a specialist in IT security, SIT covers a wide spectrum of relevant technologies and topics. And because the digital world is rapidly converging, IT security questions additionally impact many other IT domains. Fraunhofer SIT Main Website. Elektronische Rechnung und Langzeitarchivierung mit digitaler Signatur. NeSSi² GRC - Governance, Riskmanagement, Compliance with the Software Framework risk2value®

Hands on: Securing Apple's Open Directory. Logfile Scanner. Daten Shredder von CBL Datenreettung. Als weltweiter Anbieter von Datenrettungdienstleistungen aller Art ist es Erfahrungsgemäß nur allzu leicht, Dateien mit persönlichen Informationen wie Bankkontodaten, Kreditkartennummern, Korrespondenz usw. wiederherzustellen, die schon seit Jahren für gelöscht gehalten werden.

Daten Shredder von CBL Datenreettung

Dass diese Daten zuverlässig vernichtet werden, ist allein durch das Formatieren einer Festplatte nicht zu gewährleisten. Durch handelsübliche Softwareprodukte, die gelöschte Dateien zum Teil automatisch wiederherstellen können, hat sich die Gefährdung weiter erhöht. Was durch das Löschen auf Dateiebene und das Formatieren von Partitionen nicht möglich ist, können Sie jedoch mit dem CBL Datenschredder erreichen: Bei sachgemäßer Verwendung, löscht das Programm den gesamten Inhalt einer Festplatte, so dass dieser weder mit gegenwärtigen noch mit zukünftigen Recovery- Programmen wieder hergestellt werden kann.

Löschmethoden Wie funktioniert der CBL Datenschredder Windows 1. 2. Security Response - Symantec Corp. Threat Spotlight: Trojan.Ransomlock Trojan.Ransomlock is a detection for Trojan horse programs that lock the desktop of a compromised computer making it unusable.

Security Response - Symantec Corp.

The threat may arrive on the compromised computer by various means, such as visiting malicious sites, by opening untrusted links or advertisement banners, or by installing software from untrusted sources. These programs attempt to convince the user to pay money in order to have their computer unlocked and use a variety of different techniques in order to encourage the user to pay the ransom. More information on Trojan.Ransomlock is available in the threat family writeup. RUS-CERT - Home. Top 100 Network Security Tools.

DFN-CERT: Homepage. Advisories. Note: CERT/CC advisories have become part of the US-CERT National Cyber Awareness System.

Advisories

The 2003 CERT/CC Advisories are part of a collection that contains the following files. CA-2003-28: Buffer Overflow in Windows Workstation Service November 11, 2003 A buffer overflow vulnerability exists in Microsoft's Windows Workstation Service (WKSSVC.DLL). A remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service. CA-2003-27: Multiple Vulnerabilities in Microsoft Windows and Exchange October 16, 2003 There are multiple vulnerabilities in Microsoft Windows and Microsoft Exchange, the most serious of which could allow remote attackers to execute arbitrary code.

CA-2003-26: Multiple Vulnerabilities in SSL/TLS Implementations October 2, 2003 There are multiple vulnerabilities in different implementations of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Macintosh Security Site - Security for Mac Platform MacOS X SecurityFirewalls Desktop Network Security secure mac os x Virus Encrpytion PGPmacosx.