Baanboard.com

Go Back   Baanboard.com > News > RSS Newsfeeds > Sources

User login

Frontpage Sponsor

Main

Poll
As a Customer What would do to keep your ERP Implementation intact
Proactively define Business Process-- Take the Project Ownership
50%
Handover everything to System Integrator from drawing BP till implementation of ERP
0%
Hire more inhouse skilled & capable IT Resource to work directly with SI
50%
Rely on SI Architects/Consultants
0%
Total votes: 4

Baanboard at LinkedIn


Reference Content

 
SANS Internet Storm Center
Syndicate content SANS Internet Storm Center, InfoCON: green
SANS Internet Storm Center - Cooperative Cyber Security Monitor
Updated: 2 years 13 weeks ago

I'm All Up in Your Blockchain, Pilfering Your Wallets, (Thu, Dec 21st)

December 22, 2017 - 12:01am
With the latest “gold rush” in cryptocurrency, many people are investing (or speculating, depending on your perspective) in Bitcoin and various other currencies. Many of these people are not the same tech-savvy people who have been mining for years, they are chasing big rates of returns. While the economic risks are its own discussion, this post will talk about some observations in how to protect the security of your cryptocurrency.
Categories: Security

Guest Diary (Etay Nir) Kernel Hooking Basics, (Wed, Dec 20th)

December 20, 2017 - 6:24pm
A note from HOD: We are recruiting, Etay is mostly through the roadmap. If you are interested in becoming a handler please check out our handler roadmap!
Categories: Security

Example of 'MouseOver' Link in a Powerpoint File, (Tue, Dec 19th)

December 19, 2017 - 8:51am
I really like Microsoft Office documents... They offer so many features that can be (ab)used to make them virtual bombs. Yesterday, I found a simple one but nicely prepared Powerpoint presentation: Payment_copy.ppsx (SHA256:7d6f3eb45c03a8c2fca4685e9f2d4e05c5fc564c3c81926a5305b6fa6808ac3f). It was still unknown on VT yesterday but it reached now a score of 1/61![1]. It was delivered to one of my catch-all mailboxes and contained just one slide. 
Categories: Security

Phish or scam? - Part 2, (Mon, Dec 18th)

December 18, 2017 - 8:03am
We continue the MSG analysis of yesterday.
Categories: Security

Phish or scam? - Part 1, (Sun, Dec 17th)

December 17, 2017 - 9:35am
Reader Carlos Almeida submitted an email with a .docx attachment.
Categories: Security

Microsoft Office VBA Macro Obfuscation via Metadata, (Sat, Dec 16th)

December 16, 2017 - 8:44am
Often, malicious macros make use of the same functions to infect the victim's computer. If a macro contains these strings, it can be flagged as malicious or, at least, considered as suspicious. Some examples of suspicious functions are:
Categories: Security

All times are GMT +2. The time now is 05:10.


©2001-2018 - Baanboard.com - Baanforums.com