Source: Sophos Naked Security If you are a user of the social networking site you are going to want to read this article. Do you value your Facebook account? Have you linked your phone number to your Facebook account? You could lose access to it if you aren’t careful, according to James Martindale, who discovered a worrisome Facebook authentication… Read More »
As everyone know all Microsoft OS systems come with the administrative shares turned on by default. If you are a domain admin you can access the drive of another computer in the network by doing \\<computer name>\C$. If you are an admin working on hardening the security of your network servers you might go to the registry and… Read More »
Source: NetworkWorld A cyberespionage group has been discovered using a new remote access Trojan, dubbed Trochilus, whose detection rate was very low among antivirus products. The malware was discovered by researchers from Arbor Networks while investigating attacks in Myanmar that were launched from compromised government websites. The researchers linked the compromises to a sophisticated group of attackers known… Read More »
Source: Network World By Layer 8 For every 1,000 lines of code, one to five bugs are introduced. And getting those bugs out of the millions of lines of software code that run today’s complex systems is costly and only performed by highly specialized researchers with deep knowledge of software and mathematical theorem-proving techniques.
Source: Microsoft Patterns & Practices Introduction This guide shows you how to improve security for your WCF services. It also shows you how to effectively design your authentication, authorization, and communication strategies for Microsoft® Windows Communication Foundation. The information in this guide is based on practices learned from customer feedback and product support, as well as experience gained… Read More »