This page is dedicated to security, it includes local security information, as well as a number of syndicated security feeds, alerts, tools and news from major security portals. This page aims to provide a single security information access point, helping you stay current with recent security threats. You can check the SG Security FAQ and visit the SG Security forum with any questions you might have.
SG Security ScanThe SG Security Scan is a great tool that tests a number of ports on your computer for the most common vulnerabilities.
SG Security Scanner
Commonly Open Ports
SG Ports - comprehensive database of known TCP/UDP ports
SG Security ArticlesGeneral Security Guide
How To Crack WEP and WPA Wireless Networks
IRDP Security Vulnerability in Windows
Latest Threats - SymantecOSX.Freezer - (2014.08.26) Risk Level: Very Low. Type: Trojan.
Backdoor.Ratenjay gen3 - (2014.08.26) Risk Level: Very Low.
Backdoor.Preft - (2014.08.26) Risk Level: Very Low. Type: Trojan.
OSX.Laoshu - (2014.08.26) Risk Level: Very Low. Type: Trojan.
Downloader.Ponik gen8 - (1969.12.31) Risk Level: Very Low. Type: Trojan.
Trojan.Tubrosa - (2014.08.26) Risk Level: Very Low. Type: Trojan.
Trojan.Rincux - (2014.08.25) Risk Level: Very Low. Type: Trojan.
Trojan.FakeAV gen130 - (2014.08.25) Risk Level: Very Low. Type: Trojan.
W32.Changeup gen50 - (2014.08.24) Risk Level: Low. Type: Worm.
Backdoor.Darkmoon.G - (2014.08.25) Risk Level: Very Low. Type: Trojan.
Latest Security Advisories (US-CERT)
Google Releases Security Updates for Chrome (2014.08.27)
Original release date: August 27, 2014
Google has released Chrome 37.0.2062.94 for Windows, Mac and Linux. This update includes 50 security fixes some of which could allow a remote attacker to obtain unauthorized access or cause a denial of service.
US-CERT encourages users and administrators to review the Google Chrome release blog and apply the necessary updates.
Backoff Point-of-Sale Malware Campaign (2014.08.22)
Original release date: August 22, 2014
US-CERT is aware of Backoff malware compromising a significant number of major enterprise networks as well as small and medium businesses.
US-CERT encourages administrators and operators of Point-of-Sale systems to review the Backoff malware alert to help determine if your network may be affected.
Organizations that believe they have been infected with Backoff are also encouraged to contact their local US Secret Service Field Office.
Breach of Patient Identification Information (2014.08.18)
Original release date: August 18, 2014
US-CERT is aware of a breach of sensitive patient identification information affecting approximately 4.5 million patients and customers of Community Health Systems, Inc. As part of DHS, US-CERT is working together with the FBI and the Department of Health and Human Services to assist in sharing specific vulnerabilities and mitigations with the healthcare industry to prevent additional breaches from occurring.
US-CERT recommends that individuals who suspect they may have been victimized as a result of this breach report any incidents to the FBI's Internet Crime Complaint Center. Tips and advice to stay safe online can be found at STOP. THINK. CONNECT.
NCSC Spearphishing Security Advisory (2014.08.14)
Original release date: August 14, 2014
New Zealand’s National Cyber Security Centre (NCSC) has released Security Advisory NCSC-C-2014-17 which highlights a spearphishing campaign targeting government employees. The NCSC provides enhanced cybersecurity services to the New Zealand Government and private sector organizations against cybersecurity threats.
Apple Releases Security Update for Safari (2014.08.14)
Original release date: August 14, 2014
Apple has released security updates for Safari to address vulnerabilities which could allow an attacker to execute arbitrary code or cause an unexpected application termination.
Updates include Safari 6.1.6 and Safari 7.0.6 for OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.4.
Users and administrators are encouraged to review Apple security update HT6367 and apply the necessary updates.