Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Matthew Pascucci

PGP keys: Can accidental exposures be mitigated?

Posted on January 29, 2018 by Matthew Pascucci

Recently, security researcher Juho Nurminen attempted to contact Adobe via their Product Security Incident Response Team (PSIRT) regarding a security bug he wanted to report. Instead, he stumbled across something much more vulnerable.
It turns out that… Continue reading PGP keys: Can accidental exposures be mitigated?→

Posted in Security Bloggers Network

VMware AppDefense: How will it address endpoint security?

Posted on January 29, 2018 by Matthew Pascucci

VMware recently added a new service called AppDefense to their cybersecurity portfolio that aims to lower false positives and utilize least privilege in order to secure endpoints living on the host. VMware also has NSX to create microsegmentation on th… Continue reading VMware AppDefense: How will it address endpoint security?→

Posted in Security Bloggers Network

Killer discovery: What does a new Intel kill switch mean for users?

Posted on January 29, 2018 by Matthew Pascucci

Recently, security researchers from Positive Technologies discovered a way to disable the Intel Management Engine that referenced a National Security Agency (NSA) program.

Over the years, the Intel ME has caused controversy while being touted as a bac… Continue reading Killer discovery: What does a new Intel kill switch mean for users?→

Posted in Security Bloggers Network

WireX botnet: How did it use infected Android apps?

Posted on January 29, 2018 by Matthew Pascucci

WireX was recently taken down by a supergroup of collaborating researchers from Akamai Technologies, Cloudflare, Flashpoint, Google, Oracle, RiskIQ and Team Cymru. This group worked together to eliminate the threat of WireX and, in doing so, brought to… Continue reading WireX botnet: How did it use infected Android apps?→

Posted in Security Bloggers Network

How should security teams handle the Onliner spambot leak?

Posted on January 29, 2018 by Matthew Pascucci

A list of 711 million records stolen by the Onliner spambot was recently discovered, and it’s utterly staggering to think of the sheer size of this data set. To put things into perspective: the United States only has 323 million people. Even if everyon… Continue reading How should security teams handle the Onliner spambot leak?→

Posted in Security Bloggers Network

Monitoring employee communications: What do EU privacy laws say?

Posted on January 29, 2018 by Matthew Pascucci

According to the European Court of Human Rights, employers must inform their users if their business-related communications are being monitored while working for the organization. The court informed individuals that there must be a clear distinction of… Continue reading Monitoring employee communications: What do EU privacy laws say?→

Posted in Security Bloggers Network

How does the Ursnif Trojan variant exploit mouse movements?

Posted on January 29, 2018 by Matthew Pascucci

As security researchers and vendors improve the security within their products, malicious actors are continually looking for ways to bypass them and continue their efforts. This cat and mouse game continues to play out, and is best seen in how malware … Continue reading How does the Ursnif Trojan variant exploit mouse movements?→

Posted in Security Bloggers Network

Flash’s end of life: How should security teams prepare?

Posted on January 29, 2018 by Matthew Pascucci

Whether you’re a fan of Adobe Flash or not, it has been a building block for interactive content on the web, and we must acknowledge what it has accomplished before talking about its eventual removal from the internet. These plug-ins helped usher in a … Continue reading Flash’s end of life: How should security teams prepare?→

Posted in Security Bloggers Network

How does a private bug bounty program compare to a public program?

Posted on January 29, 2018 by Matthew Pascucci

It really depends on what you’re looking to offer and receive out of your bug bounty program. There are differences between a public and private bug bounty; normally, we see programs start as private, and then work their way into public. This isn’t alw… Continue reading How does a private bug bounty program compare to a public program?→

Posted in Security Bloggers Network

WoSign certificates: What happens when Google Chrome removes trust?

Posted on January 29, 2018 by Matthew Pascucci

The certificate authority WoSign and its subsidiary StartCom will no longer be trusted by Google with their Chrome 61 release. Over the past year, Google has slowly been phasing out trust for StartCom and WoSign certificates, and as of September 2017, … Continue reading WoSign certificates: What happens when Google Chrome removes trust?→

Posted in Security Bloggers Network

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Is AI Cannibalizing Human Intelligence? A Neuroscientist’s Way to Stop It April 26, 2026
  • Quantum Computers Are Not a Threat to 128-bit Symmetric Keys April 26, 2026
  • I’ve tested Sony headphones for years, and these tweaks get me the best audio – always April 26, 2026
  • Trump Fires All 24 Members of America’s National Science Board April 26, 2026
  • Australia’s Teen Social Media Ban Isn’t Working. Half Their Teens Still Have Access, Survey Finds April 25, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up