Dell has started releasing BIOS updates to computers affected by the disclosed vulnerability in the Intel AMT framework. Intel's Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology all have the vulnerability and Dell is working to mitigate the problem with BIOS firmware updates. Dell issued a client statement on the topic (PDF). … [Read more...]
There is no welfare when you are below the information security poverty line
The term 'security poverty line' was coined back in 2011 by Wendy Nather. It describes organizations who are under-spending on IT security in terms of maintaining an effective level of security or even reaching compliance with regulations. For many organizations, more money spent on IT staff, consulting, or hardware means fewer resources actually going towards their purpose … [Read more...]
AllRecipes.com announces potential breach
AllRecipes.com is a website for sharing recipes and learning about food. Yesterday, the company emailed out that accounts created before June 2013 may have been intercepted during registration. This would lead to email addresses and passwords being exposed to third parties. It is recommended to change your password if you have not done so since 2013. The breach was … [Read more...]
Configure a View in Outlook to help prevent falling for phishing
Phishing messages to your work email can be costly if the wrong person replies with confidential information. If you use Outlook for your email client, it can help identify those messages from outside senders to make sure they stand out. Having some context before opening a message will help prevent falling for the phishing scheme when you know it is coming from an outside … [Read more...]
‘The Wolf’ commercial by HP lays out the enterprise security risk from unmanaged printers
This is a sponsored post written by me on behalf of HP MPS. All opinions are 100% mine. HP made a very clever series of commercials called 'The Wolf'. The wolf is the attacker of a corporate enterprise, the sheep. We get to hear from the attacker as he compromises the printers, leaps to the computers and servers to get data about clients, employees, and everything else. … [Read more...]