News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About
The Broadband Guide
SG
search advanced
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.

 Username:
 Password:
Register
 forgot your password?

Security Information

This page is dedicated to security, it includes local security information, as well as a number of syndicated security feeds, alerts, tools and news from major security portals. This page aims to provide a single security information access point, helping you stay current with recent security threats. You can check the SG Security FAQ and visit the SG Security forum with any questions you might have.



SG Security Scan

The SG Security Scan is a great tool that tests a number of ports on your computer for the most common vulnerabilities.

SG Security Scanner
Vulterable Ports
Commonly Open Ports
SG Ports - comprehensive database of known TCP/UDP ports

 

SG Security Articles

General Security Guide
How To Crack WEP and WPA Wireless Networks
IRDP Security Vulnerability in Windows



Latest Threats - Symantec

Trojan.Gen.SMH.2 - (1969.12.31) Risk Level: Very Low. Type: Trojan.
Trojan.ADH.SMH.2 - (1969.12.31) Risk Level: Very Low. Type: Trojan.
Backdoor.Korgapam - (2014.07.20) Risk Level: Very Low. Type: Trojan.
Linux.Kaiten - (2014.07.18) Risk Level: Very Low. Type: Trojan, Virus.
Packed.Generic.463 - (1969.12.31) Risk Level: Very Low. Type: Trojan.
Infostealer.Bankeiya.C - (2014.07.16) Risk Level: Very Low. Type: Trojan.
Trojan.Pittyger gen1 - (2014.07.16) Risk Level: Very Low. Type: Trojan.
PUA.Downloader - (2014.07.16) Risk Level: Very Low.
Trojan.Cryptolocker.G - (2014.07.15) Risk Level: Very Low. Type: Trojan.
Trojan.Pittyger - (2014.07.15) Risk Level: Very Low. Type: Trojan.

 

Latest Security Advisories (US-CERT)


Vulnerabilities in LZO and LZ4 compression libraries (2014.07.21)
Original release date: July 21, 2014

Recently disclosed vulnerabilities in the LZO and LZ4 compression libraries could allow remote code execution under certain circumstances. While these libraries are used by a large number of platforms and applications, not all programs may be vulnerable to exploitation. 

US-CERT recommends that all developers who either implement or import the LZO or LZ4 libraries into their software check for susceptibility to CVE-2014-4608, CVE-2014-4715, and CVE-2014-4611.

Users and administrators should apply software security updates as they become available.


This product is provided subject to this Notification and this Privacy & Use policy.




Cisco Addresses Wireless Residential Gateway Vulnerability (2014.07.16)
Original release date: July 16, 2014

Cisco has released an advisory to address a vulnerability in the web server used in multiple Wireless Residential Gateway products that could allow an unauthenticated, remote attacker to crash the web server and execute arbitrary code with elevated privileges.

  • Cisco products affected by this vulnerability include:
  • Cisco DPC3212 VoIP Cable Modem
  • Cisco DPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
  • Cisco EPC3212 VoIP Cable Modem
  • Cisco EPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
  • Cisco Model DPC3010 DOCSIS 3.0 8x4 Cable Modem
  • Cisco Model DPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA
  • Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA
  • Cisco Model EPC3010 DOCSIS 3.0 Cable Modem
  • Cisco Model EPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA

Users and administrators are encouraged to review the Cisco Advisory and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.




Oracle Releases July 2014 Security Advisory (2014.07.15)
Original release date: July 15, 2014

Oracle has released its Critical Patch Update for July 2014 to address 113 vulnerabilities across multiple products.

This update contains the following security fixes:

  • 5 for Oracle Database Server
  • 29 for Oracle Fusion Middleware
  • 7 for Oracle Hyperion
  • 1 for Oracle Enterprise Manager Grid Control
  • 5 for the Oracle E-Business Suite
  • 3 for Oracle Supply Chain Products Suite
  • 5 for Oracle PeopleSoft Products
  • 6 for Oracle Siebel CRM
  • 1 for Oracle Communications Applications
  • 3 for Oracle Retail Applications
  • 20 for Oracle Java SE
  • 3 for Oracle and Sun Systems Products Suite
  • 15 for Oracle Virtualization
  • 10 for Oracle MySQL

US-CERT encourages users and administrators to review the Oracle July 2014 Critical Patch Update and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.




Microsoft Releases Security Advisory for Improperly Issued Digital Certificates (2014.07.10)
Original release date: July 10, 2014

Microsoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue affects all supported releases of Microsoft Windows.

Users and administrators are encouraged to review Microsoft Security Advisory 2982792 and apply the necessary updates.

 


This product is provided subject to this Notification and this Privacy & Use policy.




Cisco Addresses Apache Struts 2 Vulnerability (2014.07.09)
Original release date: July 09, 2014

Multiple Cisco products include an implementation of Apache Struts 2 which contains a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions and execute arbitrary commands on a targeted system.

Cisco products affected by this vulnerability include:

  • Cisco Business Edition 3000 Series
  • Cisco Identity Services Engine (ISE)
  • Cisco Media Experience Engine (MXE) 3500 Series
  • Cisco Unified Contact Center Enterprise (Cisco Unified CCE)

US-CERT encourages users and administrators to review the Cisco Advisory and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.




 

top

exec. time: 0.00313 s
Copyright © 1998-2014 Speed Guide, Inc. All rights reserved.
Terms of Use | Privacy Policy