BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for July, 2012

winning

July VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber July 31, 2012
Tags:
, , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
whitehouse

Capitol Hill is Moving on Cyber Security Bill

Will government intervention help reduce the number of security attacks on our nation’s infrastructure or is the proposed Cyber Security Act too restrictive on private business causing forced transparency of operations and raised costs? The Cyber Security Act 2012 Bill has been floating around for months and is now backed by President Obama. Sen. Joe…

Post by Peter McCalister July 23, 2012
Picture 3

July Patch Tuesday Assessment On Demand

Miss our live VEF webinar earlier this month? In case you did, I’ve put all of the content together for you below. Enjoy!

Post by Sarah Lieber July 22, 2012
Tags:
, , ,
new-kids-on-the-block

Create custom audits for Android devices. Come on, all the cool kids are doing it.

Have you ever wanted to root your Android device, so you could be like all the other cool kids on the block? If you did your research, you learned that it makes it easier for attackers to keep their malware on your device, if it were to be infected, through the use of a rootkit….

Post by Carter Jones July 18, 2012
Tags:
, , , , , ,
fbshare

Why Innocent Looking Facebook Photos Can Be Dangerous

Hacker attacks are far more publicized than insider attacks. In fact, according to the 2011 CyberSecurity Watch Survey conducted by CSO Magazine and Deloitte, 70 percent of insider incidents are handled internally without legal action. This begs the question – how many of those incidents are disclosed to the public? While a majority of U.S….

Post by Peter McCalister July 16, 2012
patch-tuesday

Patch Tuesday July 2012: MSXML Patched (sort of?), MDAC, IE9 (Mmm), Windows 8 glimpse

In short: Get MS12-043, MS12-045, and, if running IE9, MS12-044 patched and get back to that game of Where’s My Water? MSXML 0day fixed? This month’s Patch Tuesday bulletins bring an end to a zeroday vulnerability within MSXML that was first announced towards the beginning of June. Specifically MS12-043 has the fix that IT folks…

Post by Marc Maiffret July 10, 2012
img-android

Off the beaten Google Market

There have been a number of recent articles and blog posts around Android devices infected with various malware and malicious apps.  One recent nasty piece of malware found in many Chinese Android app stores is ‘Trojan!MMarketPay.A@Android’.   The interesting feature of this malware is that it can run up an unsuspecting user’s cell phone bill by…

Post by Jerome Diggs July 10, 2012
Tags:
, , , , , , , ,
tablets-workplace

Driving Tablets to the Workplace

The adoption of tablets in enterprise environments is gaining traction. With the release of the new Microsoft tablet and talks of an iPad Mini scheduled to be released this fall, there is new attraction to the term BYOD. There are however, underlying security risks that executives need to take into consideration. The convenience of tablets…

Post by Peter McCalister July 9, 2012
error-dns

Can’t load this page? Check your DNS settings.

DNSChanger malware is on top of everyone’s mind this week since over 270,000 systems may be effectively losing internet access next Monday because of it. What is DNSChanger malware? The criminal organization behind DNSChanger is long gone, but the effects of the malware persist. DNSChanger malware, as the name says, changes your DNS server settings…

Post by Nate Hatcher July 6, 2012
Tags:
,
2012olympics

Top Cyber Threats at the 2012 Olympics

During the 2008 Beijing Olympic Games there were 12 million cyber-attacks reported per day. While taking a closer look towards this year’s Olympic Games, it’s important to focus on the possible threats and what we can do to avoid an attack. There’s no doubt that threat landscape has grown in the past four years, and…

Post by Peter McCalister July 2, 2012