News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About
The Broadband Guide
SG
search advanced
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.

 Username:
 Password:
Register
 forgot password?

Security Information

This page is dedicated to security, it includes local security information, as well as a number of syndicated security feeds, alerts, tools and news from major security portals. This page aims to provide a single security information access point, helping you stay current with recent security threats. You can check the SG Security FAQ and visit the SG Security forum with any questions you might have.



SG Security Scan

The SG Security Scan is a great tool that tests a number of ports on your computer for the most common vulnerabilities.

SG Security Scanner
Vulterable Ports
Commonly Open Ports
SG Ports - comprehensive database of known TCP/UDP ports

 

SG Security Articles

General Security Guide
How To Crack WEP and WPA Wireless Networks
IRDP Security Vulnerability in Windows
Why encrypt your online traffic with VPN ?



Latest Threats - Symantec

Trojan.Cryptdef gen9 - (2015.03.03) Risk Level: Very Low. Type: Trojan.
Trojan.Cryptdef gen10 - (2015.03.03) Risk Level: Very Low. Type: Trojan.
Trojan.Cryptdef gen8 - (2015.03.02) Risk Level: Very Low. Type: Trojan.
Packed.Generic.482 - (2015.03.02) Risk Level: Very Low. Type: Trojan.
Trojan.Cryptolocker.N - (2015.03.01) Risk Level: Very Low. Type: Trojan.
Downloader.Busadom g1 - (2015.02.27) Risk Level: Very Low. Type: Trojan.
Infostealer.Predapan - (2015.02.27) Risk Level: Very Low. Type: Trojan, Worm.
Backdoor.Korplug.C - (2015.02.27) Risk Level: Very Low. Type: Trojan.
Backdoor.Korplug.C gm - (2015.02.27) Risk Level: Very Low. Type: Trojan.
Downloader.Busadom - (2015.02.26) Risk Level: Very Low. Type: Trojan.

 

Latest Security Advisories (US-CERT)


Guidance for Defending Against Destructive Malware (2015.03.03)
Original release date: March 03, 2015

The National Security Agency (NSA)'s Information Assurance Directorate has released a report on Defensive Best Practices for Destructive Malware. This report details several steps network defenders can take to detect, contain and minimize destructive malware infections.

US-CERT encourages users and administrators to review the NSA report and ICS-CERT TIP-15-022-01 for more information on destructive malware.




FTC Details the Top 10 Imposter Scams of 2014 (2015.03.02)
Original release date: March 02, 2015

The Federal Trade Commission (FTC) has released an advisory describing the top 10 reported imposter scams for 2014. Scam operators often impersonate individuals, companies, and organizations to entice targets to participate in fraudulent financial transactions.

Users are encouraged to review the FTC advisory for details and refer to the US-CERT Tip ST04-014 for information on social engineering and phishing attacks.




Cisco IPv6 Denial of Service Vulnerability (2015.02.25)
Original release date: February 25, 2015

Cisco has identified a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition. The vulnerability is due to improper processing of malformed IPv6 packets carrying extension headers. Cisco Network Convergence System 6000 (NCS 6000) and Cisco Carrier Routing System X (CRS-X) running an affected version of Cisco IOS XR Software are affected by this vulnerability.

Users and administrators are encouraged to review the Cisco Advisory and apply the necessary updates.




Samba Remote Code Execution Vulnerability (2015.02.24)
Original release date: February 24, 2015

Linux and Unix based operating systems employing Samba versions 3.5.0 through 4.2.0rc4 contain a vulnerability in the Server Message Block daemon (smbd). Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.

US-CERT recommends users and administrators refer to their respective Linux OS vendor(s) for an appropriate patch if affected. Patches are currently available from Debian, Red Hat, Suse, and Ubuntu. A Samba patch is available for experienced users and administrators to implement.




Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird (2015.02.24)
Original release date: February 24, 2015

The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox, Firefox ESR, and Thunderbird. Exploitation of these vulnerabilities may allow a remote attacker to obtain sensitive information or execute arbitrary code on an affected system.

Updates available include:

  • Firefox 36
  • Firefox ESR 31.5
  • Thunderbird 31.5

Users and administrators are encouraged to review the Security Advisories for Firefox, Firefox ESR, and Thunderbird and apply the necessary updates.




Lenovo Computers Vulnerable to HTTPS Spoofing (2015.02.20)
Original release date: February 20, 2015

Lenovo consumer personal computers employing the pre-installed Superfish Visual Discovery software contain a critical vulnerability through a compromised root CA certificate. Exploitation of this vulnerability could allow a remote attacker to read all encrypted web browser traffic (HTTPS), successfully impersonate (spoof) any website, or perform other attacks on the affected system.

US-CERT recommends users and administrators review Vulnerability Note VU#529496 and US-CERT Alert TA15-051A for additional information and mitigation details.




IRS Issues Warning for a Scam Targeting Tax Preparers (2015.02.18)
Original release date: February 18, 2015

The Internal Revenue Service (IRS) has issued a press release addressing a new spear phishing scam targeting tax preparers and other tax professionals. Scam operators often use fraudulent e-mails to entice their targets to reveal login credentials.

US-CERT encourages users and administrators to review the IRS press release for details and refer to US-CERT Security Tip ST15-001 for information on "tax" themed phishing attacks.




ISC Releases Security Updates for BIND (2015.02.18)
Original release date: February 18, 2015

The Internet Systems Consortium (ISC) has released security updates to address a vulnerability in BIND. Exploitation of this vulnerability may allow a remote attacker to cause a denial of service condition.

Updates available include:

  • BIND 9.9.6-P2
  • BIND 9.10.1-P2

Users and administrators are encouraged to review ISC Knowledge Base Article AA-01235 and apply the necessary updates.




 

top