Security

Learn to Protect Your PC

You can register for this event by emailing Ms Arlyn Tamondong at arlynt[at]pangasinan.com

Bitstop Re-enrolled in Microsoft Partner Network

Bitstop Inc successfully completed the requirements for us to be re-enrolled into the Microsoft Partner Network. As part of the benefits, Bitstop Inc is now eligible to sell Microsoft Online Services (Cloud based offerrings) Office 365, Exchange Online, Office Live Meeting, Sharpoint ONline, Windows Intune. Windows Intune is specially useful for organizations that need to centrally manage their PC inventories, provide Security and malware protection, AND upgrade their PCs to windows 7 on a very low 11 USD per device per month fee!  

Pirated Windows XP leads in Infections

A study that has been conducted by the AVAST Virus Lab has identified unpatched and pirated versions of Windows XP as the perfect target for rootkit infection. The study found that rootkits infecting via the MBR were responsible for [more than] 62 percent all rootkit infections. Driver infection made up only 27 percent of infection. The clear leader in rootkit infection is the Alureon (TDL4/TDL3) family, responsible for 74 percent of infections. For more details: http://www.sectechno.com/2011/08/06/pirated-copies-of-windows-xp-top-rootkit-target/

IE 9 vs 99% of Malware

The Internet Explorer 9 beta protects against 99 percent of “socially engineered malware,” according to independent researcher NSS Labs. What is socially engineered malware? Cybercriminals use socially engineered malware to gain access to your computer. According to NSS Labs, socially engineered malware describes any link that leads to malicious websites or downloads that could harm your computer. Research shows that these links appear on popular websites and services such as Facebook, Twitter, and LinkedIn as cybercriminals are increasingly taking advantage of people’s trust in these sites. How Internet Explorer 9 protects against socially engineered malware NSS Labs says that the success of Internet Explorer in...

IE Security Vulnerability

Microsoft Warns of Zero-Day Flaw in Internet Explorer (November 3, 2010) Microsoft has issued an advisory warning of active attacks on a zero-day flaw in Internet Explorer (IE). The vulnerability is being exploited to install malware on users' computers. The flaw affects IE 6, 7 and 8; users who have not already done so are being urged to upgrade to IE 8, which includes Data Execution prevention technology that makes the flaw harder to exploit. IE 9, which is in beta release, is not affected. Microsoft says it is working on a fix for the vulnerability, but it does not...

52 Percent of New Virus dead within 24 hours

Panda Software has research that shows: An average of 37,000 new viruses, worms, Trojans and other security threats appear every day The amount of cataloged malware totaled 30 million individual samples by July 2009 Hackers are modifying their creations every day to avoid detection by security companies Every day, PandaLabs receives nearly 37,000 samples of new viruses, worms, Trojans and other types of Internet threats, 52 percent of...

BNS Adopts ITIL Hosted Solution

As part of ITIL v3.0 initiatives at Bitstop Inc, Bitstop Network Service is proud to announce the adoption of ITIL Software to manage, track and identify our service assets. The hosted solution enables us at Bitstop Inc to quickly enter our inventory including warranty, license and supplier information for quick reference and fast servicing.  

Brace for Conficker Worm

Major News organizations have highlighted a possible surge in Conficker worm. Users are advised to go to http://safety.live.com to conduct a free scan of their computers to make sure that the malware is neutralized.  

Protect yourself from Conficker Worm

Scan all files Since Conficker uses random extension names to avoid detection, Windows users should make sure their security software is set to scan all files, rather than checking on specific extensions. Update Windows The alarmingly high number of Conficker infections led Microsoft last Tuesday to enable its anti-malware utility, Microsoft Software Removal Tool (MSRT), to detect the worm. So it's important that Windows users, if they haven't already, download the latest Microsoft security patch that went out earlier this week. Use a blocklist This is less relevant for...

Join our Partner Associate Program

Bitstop Inc is inviting IT trainors and professors to join us in our Partner-associate program. Bitstop Inc is offering access to our vast IT resource library that includes Cisco, Microsoft and other IT vendor manuals (except those that are specifically covered by NDA with our Principals). Some of these items include our Keystore IT video courses andMicrosoft TECHNET DVDs. These materials can not be taken OUT of Bitstop Inc, but must be 'consumed' on site. In return, we ask that the IT professors and trainors do two things for us: 1. Echo the learning materials to their students and give us first crack...

Call for security Papers

Greetings Fellow DEFCONPH Forum Members, It is commonly acknowledged that security requirements cannot be addressed by technical means alone, and that a significant aspect of protection comes down to the attitudes, awareness, behavior and capabilities of the people involved. Indeed, people can potentially represent a key asset in achieving security, but at present, factors such as lack of awareness and understanding, combined with unreasonable demands from security technologies, can dramatically impede their ability to do so. We are looking for specific expertise to be shared with our delegates, both technical and non-technical, in the following interests: Topics of interests: * Risk Assessment * Policies and...

State of Cyber Security in the Philippines

Photo taken before the start of the presentation by Sec Ray Anthony Roxas Chua, below from left to right: Dr Bill Torres, Sec Roxas Chua, Wilson Chua, Atty Bill Pamintuan and Phiiip Varela

Cisco Workshop Seminar PIX

More pictures in Pangasinan ICT website.

Oracle Multiple Vulnerabilities

Systems Affected: * Oracle Database 11g, version 11.1.0.6, * Oracle Database 10g Release 2, versions 10.2.0.2, ,0.2.0.3, and 10.2.0.4, * Oracle Database 10g, version 10.1.0.5, * Oracle Database 9i Release 2, versions 9.2.0.8 and 9.2.0.8DV, * Oracle Secure Backup, versions 10.1.0.1, 10.1.0.2, 10.1.0.3,10.2.0.2, and 10.2.0.3, * Oracle TimesTen In-Memory Database, versions 7.0.5.1.0, 7.0.5.2.0, 7.0.5.3.0, and 7.0.5.4.0,* Oracle Application Server 10g Release 3 (10.1.3), version,10.1.3.3.0, * Oracle Application Server 10g Release 2 (10.1.2), versions, 10.1.2.2.0 and 10.1.2.3.0, * Oracle Collaboration Suite 10g, version 10.1.2, * Oracle E-Business Suite Release 12, version 12.0.6, * Oracle E-Business Suite Release 11i, version 11.5.10.2, *...

Watch out for Conficker Worm

Also Known As: TA08-297A (other),CVE-2008-4250 (other),VU827267 (other),Win32/Conficker.A (CA), Mal/Conficker-A (Sophos) Trojan.Win32.Agent.bccs (Kaspersky),W32.Downadup.B (Symantec) Summary

Worm:Win32/Conficker.B is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is...

Full Security Archive

Copyright © Bitstop Network Services, Inc

Design by Bartosz Brzezinski

Design by Phil Haack Based On A Design By Bartosz Brzezinski