12 February 2013 at 10:02am
Category Count Compromise 87 Copyright 33 Denial of Service 9 General Query 8 LEA Query 2 Legal/Policy Query 0 Malware 296 Net/Security Query 7 Other 19 Phishing 25 Scanning 31 Social Engineering 1 Unauthorised Use 2
23 January 2013 at 5:07pm
Over the past few weeks we've come across a number of situations where users have been sharing, or encouraging the sharing of eduroam credentials between each other. For instance a user might want to provide temporary access for a friend or a visiting lecturer from a non-eduroam organisation might want immediate network access. It should be clear to us as system managers that this is not safe behaviour.
8 January 2013 at 1:25pm
Category Count Compromise 122 Copyright 89 Denial of Service 1 General Query 6 LEA Query 6 Legal/Policy Query 0 Malware 345 Net/Security Query 3 Other 8 Phishing 7 Scanning 31 Social Engineering 0 Unauthorised Use
There has been a resurgence of "fake" websites that infringe upon the intellectual property of our customers. Their name and brand may be misused, the design of their site may have been copied, or the website may be trying to masquerade as them. In some cases the legitimacy of the organisation running the site may be in question.
In the real world a firewall is a solid barrier between a precious asset on one side and a hazard on the other. For example, we hope that there is a firewall between the passengers in a car and the petrol tank. A network firewall performs exactly the same role, protecting an asset inside the firewall from a hazard on the outside. Firewalls are often used to protect an organisation from hazards on the Internet but they can, and probably should, also be used within an organisation to separate different departments, working areas or networks.
Subscribe to security