Baanboard.com

Go Back   Baanboard.com > News > RSS Newsfeeds > Sources

User login

Frontpage Sponsor

Main

Google search


Poll
How big is your Baan-DB (just Data AND Indexes)
0 - 200 GB
17%
200 - 500 GB
26%
500 - 800 GB
3%
800 - 1200 GB
9%
1200 - 1500 GB
11%
1500 - 2000 GB
14%
> 2000 GB
20%
Total votes: 35

Baanboard at LinkedIn


Reference Content

 
SANS Internet Storm Center
Syndicate content SANS Internet Storm Center, InfoCON: green
SANS Internet Storm Center - Cooperative Cyber Security Monitor
Updated: 36 weeks 3 days ago

I'm All Up in Your Blockchain, Pilfering Your Wallets, (Thu, Dec 21st)

December 22, 2017 - 12:01am
With the latest “gold rush” in cryptocurrency, many people are investing (or speculating, depending on your perspective) in Bitcoin and various other currencies. Many of these people are not the same tech-savvy people who have been mining for years, they are chasing big rates of returns. While the economic risks are its own discussion, this post will talk about some observations in how to protect the security of your cryptocurrency.
Categories: Security

Guest Diary (Etay Nir) Kernel Hooking Basics, (Wed, Dec 20th)

December 20, 2017 - 6:24pm
A note from HOD: We are recruiting, Etay is mostly through the roadmap. If you are interested in becoming a handler please check out our handler roadmap!
Categories: Security

Example of 'MouseOver' Link in a Powerpoint File, (Tue, Dec 19th)

December 19, 2017 - 8:51am
I really like Microsoft Office documents... They offer so many features that can be (ab)used to make them virtual bombs. Yesterday, I found a simple one but nicely prepared Powerpoint presentation: Payment_copy.ppsx (SHA256:7d6f3eb45c03a8c2fca4685e9f2d4e05c5fc564c3c81926a5305b6fa6808ac3f). It was still unknown on VT yesterday but it reached now a score of 1/61![1]. It was delivered to one of my catch-all mailboxes and contained just one slide. 
Categories: Security

Phish or scam? - Part 2, (Mon, Dec 18th)

December 18, 2017 - 8:03am
We continue the MSG analysis of yesterday.
Categories: Security

Phish or scam? - Part 1, (Sun, Dec 17th)

December 17, 2017 - 9:35am
Reader Carlos Almeida submitted an email with a .docx attachment.
Categories: Security

Microsoft Office VBA Macro Obfuscation via Metadata, (Sat, Dec 16th)

December 16, 2017 - 8:44am
Often, malicious macros make use of the same functions to infect the victim's computer. If a macro contains these strings, it can be flagged as malicious or, at least, considered as suspicious. Some examples of suspicious functions are:
Categories: Security

All times are GMT +2. The time now is 19:07.


©2001-2018 - Baanboard.com - Baanforums.com