11 Most common computer security threats

THREAT #1: VIRUS Description: A virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks.… Read More »

Adobe Flash Player and AIR Domain Sandbox Bypass Vulnerability (APSB10-06)

Two (2) potential risks associated with this vulnerability are Denial of Service issue (CVE-2010-0187) Allowing users to make unauthorized cross-domain requests We recommend verifying the version number of the present adobe flash player and then reviewing the solution in order to resolve this issue. See below on how to verify the version number and reviewing the… Read More »

Adobe Acrobat and Reader Multiple Vulnerabilities (APSB16-14)

Users on Windows and Macintosh systems can utilize the Adobe product’s update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Adobe recommends users update their software installations to the latest versions by following the instructions below. The latest product versions are available to end users via one of… Read More »

Administrator Account’s Password Does Not Expire

While there are queries that can be run in Active Directory Administrative Center to determine which accounts haven’t had their passwords changed recently, this is not a task that’s likely to be performed by anyone outside the administration team. Ultimately whether your select the “password never expires” option is up to you. Enabling it does… Read More »

What’s Microsoft?

Microsoft is the world’s leading producer of computer software. Microsoft was incorporated in 1981, but the company’s roots go back at least as far as 1975, when the first commercially available personal computer appeared on the cover of Popular Electronics. The Altair 8800, as it was called, was a rudimentary system, but it found a… Read More »

How to verify Account Brute Force Possible Through IIS Printers Directory Authentication Interface

Qualys scanning found a vulnerabilities-“Account Brute Force Possible Through IIS Printers Directory Authentication Interface” as below. I need to do black box testing to verify this vulnerability. If anybody would be willing to help, it would be greatly appreciated! ————————–——– THREAT: A “printers/” directory has been found active on your Microsoft IIS Server and is… Read More »

Account Brute Force Possible Through IIS Printers Directory Authentication Interface

Qualys scanning found a vulnerabilities-“Account Brute Force Possible Through IIS Printers Directory Authentication Interface” as below. I need to do black box testing to verify this vulnerability. If anybody would be willing to help, it would be greatly appreciated! ————————–——– THREAT: A “printers/” directory has been found active on your Microsoft IIS Server and is… Read More »

What is an Account lockout Threshold

This is a policy setting determines the number of failed sign-in attempts that will cause a user account to be locked. A locked account cannot be used until it is reset by an administrator or until the number of minutes specified by the Account lockout duration policy setting expires. You can set a value from 1… Read More »