Subscribe to our mailing list (right) to receive NCSC news posts in your inbox. If you wish to remove yourself from the mailing list re-enter your details and you will be sent a link to unsubscribe.
Microsoft release whitepaper on “Pass-the-Hash” mitigation techniquesDecember 19, 2012
Microsoft has recently published a whitepaper titled “Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques” and containing guidance and advice to mitigate against such techniques.
Apple QuickTime 7.7.3 ReleasedNovember 13, 2012
Apple have released QuickTime 7.7.3 for Windows 7, Vista, XP SP2 or later, in order to address several critical security vulnerabilities which could allow arbitrary code execution.
Sophos Anti-Virus VulnerabilitiesNovember 07, 2012
A recent report by a security researcher has described multiple vulnerabilities that have been identified in Sophos Anti-Virus products, prompting Sophos to issue a security advisory.
Top 35 Mitigation Strategies UpdatedOctober 31, 2012
The Defence Signals Directorate (DSD) of the Australian Department of Defence have released an October 2012 update to their Top 35 Strategies to Mitigate Targeted Cyber Intrusions.
Sophos - Security Threat Report 2012October 08, 2012
Increasingly online security threats are a growing concern for organisations across the globe. Recent trends observed include widespread sustained attacks on networks and the evolution of sophisticated techniques to penetrate...