Quantcast
Channel: NSA – The Silicon Underground
Browsing latest articles
Browse All 34 View Live

Don’t e-mail yourself a list of all your passwords and bank account numbers...

So my buddy, we’ll call him Bob, runs Data Loss Prevention (DLP) for a big company. DLP is software that limits what you can do with sensitive information, in order to block it from going out of the...

View Article



SSDs, factory resets, and why you probably need encryption

After the story came out about factory resets not adequately clearing flash memory in phones and tablets, one of my college buddies asked me if a similar problem exists in SSDs. Depending on the SSD,...

View Article

Application whitelisting on Windows, even home editions

One of the very best things security measures you can take is application whitelisting–limiting the apps that are allowed to run on your computer. The Australian Signals Directorate–the Australian...

View Article

The workstation events you want to be logging in Splunk

Every once in a while the NSA or another government agency releases a whitepaper with a lot of really good security advice. This paper on spotting adversaries with Windows event logs is a fantastic...

View Article

New password advice from GCHQ

The GCHQ is the British equivalent of the NSA. They recently published a new document containing the GCHQ’s new password advice in light of the things we’ve learned in the last few years. It’s...

View Article


What the NSA can crack, and how to protect against it

Ever since the Snowden leaks, there’s been considerable speculation about what cryptography the NSA could break, and why. Finally, there’s a study that goes into deep detail about what it is the NSA...

View Article

High side vs low side

The other day I heard a reference to the “high side vs low side” of a computer system in a podcast, and the speaker didn’t stop to clarify. Worse yet is when you hear “on the low side” or “on The post...

View Article

How a dictionary attack works

A dictionary attack is a common way to steal a password. Here’s how a dictionary attack works, in layperson’s terms. More importantly, here’s how to beat the attack. A dictionary attack is a much more...

View Article


Best wireless security mode

What is the best wireless security mode? There are only four choices, and only one worth using, WPA2. But there are some other settings you have to use in order to make WPA2 secure. The best wireless...

View Article


What to do about Petya ransomware if you already deployed MS17-010

Got MS17-010 deployed? Good, that means you’re immune to the Petya ransomware. I still want you to do something. Tell your patching team that you’re immune, and they saved the company between $300 and...

View Article
Browsing latest articles
Browse All 34 View Live




Latest Images