SNX Consulting
  • Services
    • Managed Services
      • Remote Monitoring & Management
    • Support
      • Make an Appointment
      • Remote Service Desk
  • Resources
    • Knowledge Base
    • Webinars
    • Industry Terms
    • Legal
      • Agreements
        • Managed Services Agreement
        • Service Level Agreement
        • Business Associate Agreement
        • Breach Indemnification Agreement
      • Policies
        • Acceptable Use Policy
        • Fees & Pricing Policy
        • Privacy Policy
        • Responsible Disclosure Policy
        • Support Policy
        • Security Policy
        • Trademark Policy & Guidelines
        • Terms of Service
  • Contact Us
  • Blog
Select Page
Apple Security: “Safe” Files

Apple Security: “Safe” Files

by Joseph Forbes | Mar 20, 2013 | HACKING, KnowledgeBase (KB), SECURITY, Technical Support

Apple Security: “Safe” Files Posted by Sean @ 14:22 GMT Things that Apple’s OS X 10.8.3 update patched — which may allow for arbitrary code execution — that are also on “safe” file type list used by Mac browsers: ImageIO (picture);...
Honeypot for phony waterworks gets hammered on Internet

Honeypot for phony waterworks gets hammered on Internet

by Joseph Forbes | Mar 20, 2013 | HACKING, INTERNET, Malware Reports, SECURITY, Technicals

Black Hat Europe: Trend Micro’s SCADA experiment finds 17 targeted attacks, mainly from China, US, Laos An experiment in which a Trend Micro researcher set up two instances of an Internet-based simulation of an industrial-control system (ICS) for a nonexistent...

Bruce Schneier: A Cyber Cold War Could Destabilize the Internet

by Joseph Forbes | Mar 17, 2013 | Blog Entry, DATA, HACKING, HARDWARE, INTERNET, Malware Reports, NERD NEWS, PIRACY, POLITICAL, SECURITY, Technicals, TECHNOLOGY

from the slavery-is-freedom dept. In an op-ed piece over at Technology Review, Bruce Schneier says that the cyber espionage between the U.S., China, and other nations, has been rampant for the past decade. But he also worries that the media frenzy over recent attacks...
MSRT March ’13 – Wecykler

MSRT March ’13 – Wecykler

by Joseph Forbes | Mar 13, 2013 | HACKING, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY

Wecykler is a family of worms, that shares some similarities with the Worm:Win32/Autorun family, in that it takes advantage of removable drives attached to an infected system in order to propagate to other machines. They target users’ familiarity with the...

U.S. Calls On China To End Hacking; Start Cyberspace Dialogue

by Joseph Forbes | Mar 13, 2013 | HACKING, INTERNET, NERD NEWS, SECURITY

from the subtext:-or-else dept. For the first time, the United States has mentioned the People’s Republic of China in relation to cyber crime, officially acknowledging what has been long suspected by private security experts and the U.S. business community. The...
Exploit Kit Distribution in the Wild

Exploit Kit Distribution in the Wild

by Joseph Forbes | Mar 13, 2013 | HACKING, KnowledgeBase (KB), Malware Reports, SECURITY

Have you ever wondered which exploit kits are the most prevalent? We have been tracking several exploit kits that we have identified these past few months and it’s interesting to see which gets the biggest chunk of the pie: 56% of the coverage is owned by only...
« Older Entries
Next Entries »

User Menu

  • Log in
  • Entries RSS
  • Comments RSS
  • SNX Consulting

Recent Posts

  • Spring Break – Maintenance
  • March Announcements
  • Event – March 11th – Technology Clinic!
  • Announcement – We made changes
  • Feb Announcements
  • Happy New Year 2023!

Archived Posts

  • Facebook
  • X
  • Instagram
  • RSS
Designed by SNX Consulting's WebDev Team | Powered by Insomnia and Electricity
  • 180Share on Facebook
  • 106Share on Twitter
  • 11Share on Reddit
  • 18Share on LinkedIn
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. How do we use these cookies?  A: The structure of our site, everything is parsed to their specific Db tables. And after 90 days, deleted. Fine... Privacy Policy