News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About
The Broadband Guide
SG
search advanced
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.

 Username:
 Password:
Register
 forgot your password?

Security Information

This page is dedicated to security, it includes local security information, as well as a number of syndicated security feeds, alerts, tools and news from major security portals. This page aims to provide a single security information access point, helping you stay current with recent security threats. You can check the SG Security FAQ and visit the SG Security forum with any questions you might have.



SG Security Scan

The SG Security Scan is a great tool that tests a number of ports on your computer for the most common vulnerabilities.

SG Security Scanner
Vulterable Ports
Commonly Open Ports
SG Ports - comprehensive database of known TCP/UDP ports

 

SG Security Articles

General Security Guide
How To Crack WEP and WPA Wireless Networks
IRDP Security Vulnerability in Windows



Latest Threats - Symantec

Backdoor.Miniduke gen4 - (2014.09.15) Risk Level: Very Low. Type: Trojan.
SONAR.SuspInject gen1 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.IRCbotng gen7 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.IRCbotng gen6 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.LowSec gen3 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.Ponik gen3 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.Ratenjay gen1 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.Cridex gen2 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.Necurs gen2 - (2014.09.14) Risk Level: Very Low. Type: Trojan.
SONAR.PUA gen3 - (2014.09.14) Risk Level: Very Low.

 

Latest Security Advisories (US-CERT)


Cisco Integrated Management Controller Vulnerability (2014.09.11)
Original release date: September 11, 2014

Cisco has released an advisory to address a vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers that could allow an unauthenticated, remote attacker to cause a denial of service condition. Migration to release 2.3.1 is available for Cisco IMC Software versions 1.0.1, 1.0.2, 2.1.0, and 2.2.0.

Users and administrators are encouraged to review the Cisco Advisory and apply the necessary updates.




Google Releases Security Update for Chrome (2014.09.10)
Original release date: September 10, 2014

Google has released Chrome 37.0.2062.120 for Windows, Mac and Linux. This update addresses multiple vulnerabilities one of which could potentially allow an attacker to cause a denial of service.

US-CERT encourages users and administrators to review the Google Chrome release blog and apply the necessary updates.




Adobe Releases Security Updates for Flash Player and Air (2014.09.09)
Original release date: September 09, 2014

Adobe has released security updates to address multiple vulnerabilities in Adobe Flash Player and Air for Windows, Macintosh and Linux. Exploitation of these vulnerabilities could potentially allow an attacker to take control of the affected system.

Users and administrators are encouraged to review Adobe Security Bulletin APSB14-21 and apply the necessary updates.




Microsoft Releases September 2014 Security Bulletin (2014.09.09)
Original release date: September 09, 2014

Microsoft released updates to address vulnerabilities in Windows, .NET Framework, Internet Explorer and Lync Server as part of the Microsoft Security Bulletin Summary for September 2014. Some of these vulnerabilities could allow remote code execution, elevation of privilege, or denial of service.

US-CERT encourages users and administrators to review the bulletin and apply the necessary updates.




WordPress Releases Security Update (2014.09.04)
Original release date: September 04, 2014

WordPress 3.9.2 has been released to address multiple vulnerabilities, one of which could allow a possible denial of service issue in PHPs XML processing. WordPress 3.7.3 or 3.8.3 users will be updated to 3.7.4 or 3.8.4. Users operating older, unsupported versions of WordPress are encouraged to upgrade to 3.9.2.

US-CERT recommends users and administrators review the WordPress Maintenance and Security Release blog and apply the necessary updates.




Mozilla Releases Security Updates for Firefox and Thunderbird (2014.09.03)
Original release date: September 03, 2014

The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox and Thunderbird. Exploitation of these vulnerabilities may allow an attacker to cause an exploitable crash or execute arbitrary code.

The following updates are available:

  • Firefox 32
  • Firefox ESR 24.8
  • Firefox ESR 31.1
  • Thunderbird 31.1
  • Thunderbird 24.8

Users and administrators are encouraged to review the Security Advisories for Firefox, Firefox ESR and Thunderbird to determine which updates should be applied to mitigate these risks.




Google Releases Security Updates for Chrome (2014.08.27)
Original release date: August 27, 2014

Google has released Chrome 37.0.2062.94 for Windows, Mac and Linux. This update includes 50 security fixes some of which could allow a remote attacker to obtain unauthorized access or cause a denial of service.

US-CERT encourages users and administrators to review the Google Chrome release blog and apply the necessary updates.




Backoff Point-of-Sale Malware Campaign (2014.08.22)
Original release date: August 22, 2014

US-CERT is aware of Backoff malware compromising a significant number of major enterprise networks as well as small and medium businesses.

US-CERT encourages administrators and operators of Point-of-Sale systems to review the Backoff malware alert to help determine if your network may be affected.

Organizations that believe they have been infected with Backoff are also encouraged to contact their local US Secret Service Field Office.




 

top