Internet Security

Skip to Main Content »

Have a Question? Call Us!
Toll Free: 877.449.5102

Welcome to NTSecurity.com

You're currently on:

20 Item(s)

per page
Set Descending Direction
Article Rating Date

Zappos (a popular, Amazon-owned, online shoe reseller) warned its employees and customers that an attacker had gained access to their internal network, and made off with a bunch of sensitive customer information. The good news? The attacker did not gain access to any customer credit card info. The bad news? He or she did steal over 24 million users’ names, addresses, phone numbers, email addresses, and encrypted or hashed passwords.

password

12/02/2012

you’ve followed security or technical news over the last few days, you’ve probably heard about the “Flame” worm. This interesting new piece of malware belongs to a class of attack called an Advanced Persistent Threat (APT), and it’s making headlines worldwide. As a result, many of you may be wondering whether or not this nasty sounding malware will affect your organization. My short answer is, “probably not,” but read on to learn more.

watchguard , antivirus

12/02/2012

Compared to the last few months, this week seems relatively quiet as far as security stories are concerned. We saw some security incidents this week, but nothing that would catch your hair on fire.

malware , watchguard

12/02/2012

Historically, APT attacks have been created by sophisticated hackers using advanced attack techniques and blended threat malware, but it is only a matter of time before “normal” malware criminals learn from these sophisticated hacks and the evolution of the APT speeds up, making organizations of every size a target.

malware , watchguard

12/02/2012

Radio Free Security (RFS) is a monthly audio podcast dedicated to spreading knowledge about network and information security, and to keeping busy IT administrators apprised of the latest security threats they face online. Here’s what to expect in April’s episode:

Radio Free Security

12/02/2012

Have you noticed more and more employees walking around with iPhones, Droids, and iPads? If so, you’re not alone, and this month’s Radio Free Security episode might help you learn how to mitigate this BYOD security problem.

Radio Free Security

12/02/2012

Many of the Media’s articles characterize this complicated TCP connection attack as, “a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection” or as a “hole” in firewalls. I’m not sure that these descriptions properly characterize this vulnerability, and I suspect many administrators may not really understand how this attack works (let alone what it does and doesn’t allow an attacker to accomplish). I hope to try and rectify that in this post.

watchguard

12/02/2012

WatchGuard now has an iOS app that can deliver WatchGuard Security Center content, and much more, directly to your Apple mobile. The app is called WatchGuard REDnews, and you can download it today from the App Store in iTunes or on your iOS device.

app

12/02/2012

These vulnerabilities affect: All current version of Microsoft Office Publisher and Visio How an attacker exploits them: By enticing you to open maliciously crafted Publisher or Visio documents Impact: An attacker can execute code, potentially gaining complete control of your computer What to do: Install the appropriate Office Publisher and Visio patches immediately, or let Microsoft’s Automatic Update do it for you.

malware , microsoft

12/02/2012

This vulnerability affects: Microsoft Visual Basic for Applications (VBA), which ships with all current versions of Office. How an attacker exploits it: By tricking one of your users into opening a malicious Office document. Impact: An attacker can potentially gain complete control of your windows computers (depending on the privileges of the user). What to do: Download, test, and install Microsoft’s update as soon as possible, or let Windows Automatic Update do it for you

Office Document

12/02/2012

This vulnerability affects: The email client shipping with any current version of Windows (whether it’s Outlook Express or Windows Mail). How an attacker exploits it: By enticing one of your users to connect to a malicious POP3 or IMAP email server (or by performing a man-in-the-middle attack). Impact: An attacker can execute malicious code, potentially gaining full control of your users computer. What to do: Download, test, and install Microsoft’s email client updates as soon as possible, or let Windows Automatic Update do it for you

Outlook

12/02/2012

DNSSEC makes some significant changes to the way typical DNS traffic “looks” to networking devices. As a result, some experts worry that certain networks and devices may not handle DNSSEC traffic properly after this change, thus potentially preventing you from accessing the Internet (using domain names). Below, we’ll list a few of the DNSSEC changes that could affect some of your networking gear. However, the main point of this alert is to inform you that WatchGuard’s Firebox and XTM appliances should handle the DNSSEC changes without problem — whether you use our packet filtered or proxied DNS policies.

Proxy , DNS

12/02/2012

These vulnerabilities affect: All current versions of Microsoft Office for Windows and Mac (specifically Word and Excel). How an attacker exploits them: Typically, by enticing you to open maliciously crafted Office documents. Impact: An attacker can execute code, potentially gaining complete control of your computer. What to do: Install the appropriate Office patches immediately, or let Windows Update do it for you.

Office Document

12/02/2012

For the new listeners out there, Radio Free Security (RFS) is a monthly podcast, dedicated to spreading knowledge about network and information security, and to keeping busy IT administrators apprised of the latest security threats they face online. WatchGuard’s LiveSecurity team started RFS back in January, 2007. However, we’ve been off the air since 2009 — but that all changes today, with our first return episode!

Radio Free Security

12/02/2012

As part of our ongoing efforts to improve the effectiveness of WatchGuard XCS appliances to protect from data loss, new viruses, and malware, and to enable organizations to customize their environments, WatchGuard is pleased to announce the availability of XCS 9.2 Update 4.

watchguard , xcs

12/02/2012

These vulnerabilities affect: The IIS FTP service running on Windows Vista, 2008, 7, and 2008 R2. How an attacker exploits them: By sending specially crafted FTP commands or accessing a local log file. Impact: In the worst case, a local attacker can learn the credentials for a local account. What to do: Deploy the appropriate IIS update at your earliest convenience.

IIS

12/02/2012

These vulnerabilities affect: Excel (and Office) 2003 through 2010 for Mac and PC (and related components). How an attacker exploits it: By enticing one of your users to open a malicious Excel document. Impact: In the worst case, an attacker executes code on your user’s computer, gaining complete control of it. What to do: Install Microsoft’s Excel updates as soon as possible, or let Microsoft’s automatic update do it for you.

Office Document

12/02/2012

These vulnerabilities affect: All current versions of Windows and the .NET Framework. How an attacker exploits them: Multiple vectors of attack, including enticing users to view malicious fonts or to open specially crafted Briefcase folders. Impact: In the worst case, an attacker can gain complete control of your Windows computer. What to do: Install the appropriate Microsoft patches as soon as possible, or let Windows Automatic Update do it for you.

.net

12/02/2012

These vulnerabilities affect: Internet Explorer (IE) 9 only. How an attacker exploits them: By enticing one of your users to visit a malicious web page. Impact: An attacker can execute code on your user’s computer, often gaining complete control of it. What to do: Install Microsoft’s Internet Explorer 9 updates immediately, or let Windows Automatic Update do it for you.

Internet Explorer

12/02/2012

It’s Microsoft Patch Day and I have a question for you. How quick are you at applying software updates? Do you jump on them within the day; a week, or are you months behind?

Windows 8

12/02/2012