Microsoft Windows

hit by “wannacry” (may be you deserve it) …

Guys Again a ransomware outbreak on the news. May I say I am not surprised at all? And may I say that the media coverage has been ridiculous and instead of presenting the event as something that should highlight the incompetent behaviour of managers targeted by this issue they claims about “cyberattack” which is a completely different thing. And yet people asking why? how come? how this can be possible? again really? We know that CyberSecurity is always a side though from most of the management no matter where. The proof, beside the claims from CEO, IT Managers and generally speaking CxO,…

2015 is Here!!!!!

Finally we are at the beginning of a new year, time for hope, time for proposals, time for planning new experiences. So what are mine? 2015 proposals 1) I will work We can say whatever we want, but the truth is that job is a gift those days. The terrible economic crisis of those years leaved a lot of people without a job, people with strong skills and experience have been fired and some have been replaced with younger and not so expensive (but less experienced) people. HP, Cisco, Microsoft a lot of people have been kicked out so have a job…

Attenzione! run di attacchi ransomware in Italia

Sono già due giorni che ricevo notifiche di aziende e soggetti colpiti da diverse versioni di Kryptoloker ed altri ransomware. Evidentemente c’è una recrudescenza di questi attacchi nel nostro paese in questi giorni. Alcune versioni sono rimaste “undetected” anche dai maggiori antivirus che stanno provvedendo a emettere patch specifiche (kudos a Sophos per la rapidità ed efficienza di intervento in un caso da me incontrato). Per i non addetti al settore, questi malware si installano in macchine ospiti infettate ed iniziano a procedere alla encryption di documenti, files e cartelle. Se la macchina ha accesso a share remoti anche questi…

Security design considerations

In the previous post (http://www.thepuchiherald.com/2014/11/19/security-and-risks-updated/)we learned that when planning a security budget we have to deal with hidden costs, assets, process and a good quote of dealing with higher management. The goal is to reach at least the mTCoS as i called it. Now the problem I pointed out is that in order to define this target value we have to asset risks and rank them to be able to make choices. This is a quite interesting topic per se, since it is still object of studies. I have seen several models to address the question, all have pro and…

Is Sandboxing technology the answer?

Most of the security solutions in the market those days leverage sandboxing technologies to deal with Advanced Persistent Threats,  “0”days vulnerability, target attack and so on. It would be interesting to analyze the good and the limits of this kind of technologies to be able to better choose our security solutions. What is a Sandbox? sandboxing means to create a “virtual”, “fake” image that can be targeted by malware attackers o unknown security problems. Monitoring the change that happen to this decoy it is possible to understand if something strange is going on. The idea basically is that since the fake machine…

Windows 8 product Key

Image via CrunchBase Ok guys I0’m back on track and start writeing again.   I just started to play with windows 8 and i have some impressions, but first of all i wanna give you a simple advise: write your product key somewhere before installing it, because changing product key on windows 8 can be frustrating. We do not have a direct link to a change Key tool, not help would be of some use, since the instructions does not lead you anywhere.   The best thing to do is quick search internet, but again there are more articles than…

Posts navigation
Stop censorship
%d bloggers like this: