WordPress weaknesses requires vigilence

As Forbes article discusses: Update your plugins and widgets when they are vulnerable, use complex passwords, and otherwise use good security methodologies. It is the basics that people are not doing. What is easy to use makes it less secure, thus requiring more effort by the user or administrator to make sure it is secure … Read more

Microsoft Sysinternals have been updated.

Windows Sysinternals  is updating PsExec, ProcessExplorer, and PsPing Psexec runs on port 445 and 139 which means it runs with other Microsoft programs and can hide itself within the normal funcitons of the computer. The problem with this? hackers look for tools like this to see how they can develop a next generation malware attacks. … Read more

Do you have port 5000 open?

another post by Internet Storm Center The Port 5000 (tcp) scans/attacks, are showing in logs again. Almost 70000 scans/attacks in the last few days in the logs that the storm center captures.   Check your systems – have they been scanned? Alpha scan them to see what the evil  hacker is seeing.

Wifi virus? is it possible?

RFGlobalnet  has an article about a possible Wifi virus which propagates from one AP (access point) to another. The University of Liverpool has set up a theoretical infection from one Wifi to another. If a wifi system (AP) does not have good enough encryption setup, with a sophisticated password this attack could occur. And Anti-virus … Read more

Network Vulnerability Assessments

Why perform a network vulnerability assessment or review? because there are certain individuals that will take any weakness in your computers and networks (firewalls, switches) and exploit it to their own ends. What can an enterprising evil hacker do? Minimally use your computers and networks that you have bought and paid for to attack other … Read more