News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About
The Broadband Guide
SG
search advanced
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.

 Username:
 Password:
Register
 forgot your password?

Security Information

This page is dedicated to security, it includes local security information, as well as a number of syndicated security feeds, alerts, tools and news from major security portals. This page aims to provide a single security information access point, helping you stay current with recent security threats. You can check the SG Security FAQ and visit the SG Security forum with any questions you might have.



SG Security Scan

The SG Security Scan is a great tool that tests a number of ports on your computer for the most common vulnerabilities.

SG Security Scanner
Vulterable Ports
Commonly Open Ports
SG Ports - comprehensive database of known TCP/UDP ports

 

SG Security Articles

General Security Guide
How To Crack WEP and WPA Wireless Networks
IRDP Security Vulnerability in Windows



Latest Threats - Symantec

Backdoor.Emdivi gen1 - (2014.10.23) Risk Level: Very Low. Type: Trojan.
Trojan.Swort - (2014.10.23) Risk Level: Very Low. Type: Trojan.
Infostealer.Injecshot - (2014.10.23) Risk Level: Very Low. Type: Trojan.
Android.Lockdroid.F - (2014.10.22) Risk Level: Very Low. Type: Trojan.
Bloodhound.Exploit.553 - (2014.10.22) Risk Level: Very Low. Type: Trojan.
Bloodhound.Flash.26 - (2014.10.20) Risk Level: Very Low. Type: Trojan.
Trojan.Plugdis - (2014.10.20) Risk Level: Very Low. Type: Trojan.
Backdoor.Vinself.C - (2014.10.20) Risk Level: Very Low. Type: Trojan.
Exp.CVE-2014-0565 - (2014.10.19) Risk Level: Very Low.
SONAR.LoadPoint gen5 - (2014.10.19) Risk Level: Very Low. Type: Trojan.

 

Latest Security Advisories (US-CERT)


Apple Releases Security Updates for QuickTime (2014.10.23)
Original release date: October 23, 2014

Apple has released QuickTime 7.7.6 for Windows 7, Vista, XP SP2 or later to address multiple vulnerabilities, some of which may allow remote attackers to execute arbitrary code or cause a denial of service.

Users and administrators are encouraged to review Apple Support Article HT6493 and apply any necessary updates.




Microsoft Releases Advisory for Unpatched Windows Vulnerability (2014.10.22)
Original release date: October 22, 2014

Microsoft has released a security advisory to provide recommended mitigations for an unpatched vulnerability, (CVE-2014-6352) which affects all Microsoft Windows releases except Windows Server 2003. This vulnerability could allow an attacker to take control of an affected system if a user opens a specially crafted Microsoft Office file.

US-CERT recommends users and administrators review the Microsoft Security Advisory and apply the recommended workarounds.




Apple Releases Security Updates for iOS and Apple TV (2014.10.20)
Original release date: October 20, 2014

Apple has released security updates for iOS devices and Apple TV to address multiple vulnerabilities, one of which could allow an attacker to decrypt data protected by SSL.

Updates available include:

  • iOS 8.1 for iPhone 4s and later, iPod touch 5th generation and later, and iPad 2 and later
  • Apple TV 7.0.1 for Apple TV 3rd generation and later

Users and administrators are encouraged to review Apple security updates HT6541 and HT6542, and apply the necessary updates.




OpenSSL 3.0 Protocol Vulnerability (2014.10.17)
Original release date: October 17, 2014

US-CERT is aware of a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. Exploitation of this vulnerability may allow a remote attacker to decrypt and extract information from inside an encrypted transaction.

US-CERT recommends users and administrators review TA14-290A for additional information and apply any necessary updates to address this vulnerability.




Apple Releases Security Update 2014-005 (2014.10.17)
Original release date: October 17, 2014

Apple has released Security Update 2014-005 to address vulnerabilities in SSL 3.0.

US-CERT recommends users and administrators review Apple Security Update HT6531 for additional details.




Drupal Releases Security Advisory (2014.10.17)
Original release date: October 17, 2014

Drupal has released a security advisory to address an application program interface (API) vulnerability (CVE-2014-3704) that could allow an attacker to execute arbitrary SQL commands on an affected system.

This vulnerability affects all Drupal core 7.x versions prior to 7.32.

US-CERT advises users and administrators review Drupal's Security Advisory and apply the necessary update or patch.




Google Releases Security Updates for Chrome and Chrome OS (2014.10.16)
Original release date: October 16, 2014

Google has released security updates to address multiple vulnerabilities in Chrome and Chrome OS, one of which could potentially allow an attacker to take control of the affected system.

Updates available include:

  • Chrome 38.0.2125.104 for Windows, Mac and Linux
  • Chrome OS 38.0.2125.108 for all Chrome OS devices except Chromeboxes

Users and administrators are encouraged to review the Google Chrome blog entries 1, and 2, and apply the necessary updates.




Ebola Phishing Scams and Malware Campaigns (2014.10.16)
Original release date: October 16, 2014

US-CERT reminds users to protect against email scams and cyber campaigns using the Ebola virus disease (EVD) as a theme. Phishing emails may contain links that direct users to websites which collect personal information such as login credentials, or contain malicious attachments that can infect a system.

Users are encouraged to use caution when encountering these types of email messages and take the following preventative measures to protect themselves:




 

top