Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

I have office proplus 365  installed through shared computer activation

when there is update from 365 side, users get lot of  outlook addin prompts  ( attached)

why so many prompts come  and secondly can we control updates from active directory
Starting with Angular 5
LVL 13
Starting with Angular 5

Learn the essential features and functions of the popular JavaScript framework for building mobile, desktop and web applications.

So I received a cute little spam email saying that someone has taken over my account and wants me to buy bitcoin, yada, yada, yada.  The one thing they mention is how if I take a look at the sender information above its actually my email address.  Sure enough, its my email address.  How did they manage to get my email address to show up in the sender field?  Typically I usually see a bogus email address but this one is actually my email address.  I can see from the header its from a different email address but how did they get my email address to show up in that field?  Is it like a display name or something?

Is there a way to train average users how to spot these fraudulent emails.
i opened my outlook 2016, we rae having office proplus with shared computer activation.
we have monthly channel showing version 1904

i saw in article that update got released

but when i opened outlook i got this microsoft office has identified a potential security concern

with regard ocoffice.dll, socialconnector.dll, icaddin.dll

my question can this updates caused this addin to be obsololet or macros disabled this

i dont know why only me got this pop up
I live in a rural area with my nearest neighbor about 500 meters away. I KNOW that at one time my router was accessed. I often wonder if someone is trying to break my router code again. I have a high quality router with guest turned off. Is there any free or inexpensive software that will send my cell a message if an attempt is definitely being made to guess my password?  If not cellphone smart even a program that will log attempts to break in?
The first and last breach happened about one year ago. No visible harm was done and the hacker left a "cute" message to let me know that I had been hacked. I am fairly sure that the hacker entered my system through my IP camera connection to my router because two of my passwords were changed on the cameras.
The main reason for my immediate interest is that the police visited me today asking if I had video of something minor that transpired that my cameras might have recorded. They indicated that they had been informed by a person that wanted copies of any possible video that they KNEW that I had video surveillance. Odd. None of my cameras are visible unless someone is using a spotting scope to check things out. It is mainly curiosity on my part but I DO want to know if I am being targeted. What software does any expert know of that would  tell me I am under attack?

Just for general info?
All devices use windows 10. My cell is Android. My  isp service is via fiber optic at 1000/1000. I have 8 cameras. Three of them are ptz. …
Hi everyone, I'm creating an android app that allows people to register via FacebookAccountKit.

Facebook account kit gives me a Token when the user has been verified (via SMS).

I can't understand how I can secure registration and user data with the token.

I'll explain :

At the moment, when I need to get user data from the database and show it on the app, I use a hidden field to send the user ID to the PHP file to filter the data.

Many have told me that it is not recommended, they told me to send a Token to the PHP file and then get the user id.

I can't understand a few things:

1) The Token must be associated with the user's ID address, could I save them in the same table or could I do it in another way?

2) When the Token expires what happens? I have to log in the user again and save the new Token on the MySql table.
   But to do this I will have to specify that it will be saved in the line where the user ID is the same as the user ID and then send the user ID from the app again.

3) To log in, I request the phone number and the user ID, I will have to send them from the app to the PHP file that checks whether the user exists or not, but so I return to the initial problem, ie send the user's id and the phone number from the app to the PHP file.

Someone could clarify my confusion about this.

Do you recommend a more valid alternative for securing my users' data?

If you …
How can I change the security in Outlook 365 so that it does not put PowerPoint attachments in read only mode?
hi guys

I'm currently trying to put a plan together to senior management for a strategy for their infrastructure and security. I have only just been hired for the project. My role is to provide leadership for the infrastructure and security teams.  I know exactly what I need to do, but my issue is that I'm trying to put this into a structured plan to follow in steps, but articulating this properly has been a bit of a challenge. The purpose of the plan is to liaise with important stakeholders to understand the vision/mission of the business goals in order for I.T to better support them.

At the moment, I've gone and met people in the teams and asked them about how things work, the infrastructure and the security in place. But, that's not part of a structured method/plan.

For example, I am setting the plan together in phases. In the first phase, I want it to be the understanding phase. So something like 'meet with direct reports'. Then 'understand from direct reports, their roles and responsibilities by spending two hours in the first week with them'.

Then something like 'exploring vulnerabilities across all verticals to identify shortfalls affecting productivity....' (or anything similar'.

The purpose is to expand this into phases, so that I can come up with a conclusion and show senior people as to what I will do in the next X number of months.

Do you guys have any plans you created or know of any good structure that is out there which can be …
I have a computer that is throwing dozens of dcom errors. The event iD is 10016. Here's the text from the event viewer (this is winodws 10 pro, 1809

The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID
 and APPID
 to the user KBICUSTOMCASE\timothy2 SID (S-1-5-21-4137594547-1242624928-2318743208-1125) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.

It's the same message time and time again repeated sequentially every minute or so.

I have no idea what the event log info is trying to tell me. Any assistance on this would be greatly appeciated.


Getting a TLS error on a particular web site when connecting via a Fortinet VPN connection. Error is "Can't connect securely to this page. This might be because the site uses outdated or unsafe TLS security settings".

The site works fine when connecting from the local LAN.
Attached is a list of *strut* files that are present in our UNIX servers.
Was told by our app staff that we are on a very old (& likely vulnerable) Struts.

Which lines mean we have Struts in our server & the files that we can remove
to fix our vulnerability?   Was told by app staff he doesn't need the Struts but
will need to identify which specific Struts files to remove
CompTIA Cloud+
LVL 13
CompTIA Cloud+

The CompTIA Cloud+ Basic training course will teach you about cloud concepts and models, data storage, networking, and network infrastructure.

I am looking at my shiny new GitHub account and I see the default setting for any new repository is to make it public. Is there a setting or preference I can change to make the default private?
CRM 2011 upgrade

We are trying to upgrade a CRM 2011 system however the IT group will not allow us to use production data in dev to test the upgrade.  Does anyone have experience working with very confidental data that cant be shown to most users?  

I have worked on some projects where we wrote an encrypt/decrypt program to make the data anonymous during the upgrade and then it was decrypted afterwards when in the new system.

Any suggestions would be helpful.
now MBSA has been retired one of its really useful functions, I found, was to produce a useful table of share and directory permissions. It gave share, directory, share ACL and directory ACL in a well formatted table for further investigation to ensure permissions were relevant. Although it still works (if you can find the download) on  older OS I am trying to find replacement tools or scripts to achieve the same. Does anyone know of any free tools and/or scripts that can recreate the same data that the MBSA shares check used to perform, which can either be run remotely or run locally on the sever being reviewed (preferably remotely like MBSA could). if the results could go to CSV that would be ideal for further data analysis on the configurations.
Ok so odd situation.  Have right now 2 exchange servers. One went down last week and wasn't able to rebuild the CAS part..worked with Microsoft support to get new exchange server up and migrated mailboxes.  Last night the new exchange server and a couple other servers got hit with ransomware. Encrypted everything with  ETH extension.  Backup server repository is corrupted..basically worst scenario ever. However, the old exchange server is intact from the ransomware and still has the original DB's on it. I opened them with Kernel and  can see everything.  Is it possible to create a new exchange server and copy those databases over.. As in connect in vmware the drives with the databases on them and mount them in the new exchange server?  Or would i be able to copy/paste all the files in the install directory of old into new overwriting the corrupted?
Is there Checkpt Gaia & Fortigate hardening guidelines?

If there is, can point me to where to download & if there's none,
a paper from the principals recommending not to harden  them
is appreciated.
Got an audit finding that our Firebird Sql / DB is not hardened.

CIS doesnt have such  a guide & googling only gives a 1-liner pg:

Any where else any one can point me to?
An end user has a Dell laptop that she spilled coffee on.  Sent to to Dell who replaced the motherboard, keyboard, and hard drive.  Before the accident the system was running  fine and as far as I know, BitLocker was NOT enabled.  Dell stated that they replaced the hard drive as the new motherboard did not recognize the old drive.  I can attach the drive to another system and BIOS see the drive, but it is not accessible as BitLocker shows it locked.  

I reinstalled the old drive back into the laptop and upon boot, I get the BitLocker recovery screen which states to go to from another  computer.  It also provide a Recovery Key ID.  When I go to that URL, I am prompted to login with my MS account, which I do.  There is no other navigation for the recovery key.

I do not know what account was used for the registration of BitLocker so I do not know what account should be used for the recovery key.  The previous MSP is out of business so calling them is not an option, the end user... well, let's just say she is not versed in this area and does not know anything.

I am following this article:  and get to step 9, but do not see an option for reset this PC.

What I am looking for is a way to reset the BitLocker and unlock the drive so I do not have to reinstall all the apps and recover her data.

Is this even possible?
Is there a way to determine what …
Dear all experts,

I run the following command in PowerShell and would like to obtain the security log details,

Get-EventLog -LogName Security -InstanceId 4662

however, I found that the result is not same as the event log,   Object name in PowerShell result becomes a SID but in event log it is showing the full DN of the object.

Is there anyway to convert the SID to DN in PowerShell.
Result in PowerShell3.PNG
If I am going to focus on phone / io games, I'd like to know about security issues like hacking, which is unavoidable w online games. I created a successful Authoritative Java RTS server. It could not be hacked. has all game data local..  Are people messing around with slither, etc?

Surely, if they start my game from an io site - or on my business hosting private server, it is my official client code. - it is not their hack. Now they can hack my game variables, but can they simply make a map hack? Must I still have an authoritative server? I read that some games are just clients - update each other on all activity, no in-game server, just clients.

Is hacking something I ned to be vigilant about, yet?

Will it ever be?
Why Diversity in Tech Matters
LVL 13
Why Diversity in Tech Matters

Kesha Williams, certified professional and software developer, explores the imbalance of diversity in the world of technology -- especially when it comes to hiring women. She showcases ways she's making a difference through the Colors of STEM program.

i have a user that set her work O365 Outlook Web Access (OWA) mailbox to forward to her person mail (gmail, yahoo, etc...). IT Security has asked me to find the log that shows she changed her O365 OWA mail to forward to her online personal email. She did this quite a while ago.

How can i see that audit trail/log and show the Security dept that she did in fact make that change/set her work email to forward to personal email?

I need to remove the end users from the local administrators group on all workstations. For a select group of users, they would need to remain as local admins on their machine. I currently have 1 OU that holds all workstations.  

I see that there are two ways of removing users from admin group. Either using restricted groups gpo or group policy preferences. I dont see much of a difference between the two approaches. In either case it would seem that I would have to create two separate OU's , one for computers that dont have end users in local admin group and the other would have computers not linked to any gpo of this type.  Is this correct? What would be the best approach to this?

Thank you.

I have a question regarding remote users and security.

Which one is better or the standard way?

1. VPN and RDP to a inside computer
2. VPN without RDP, but more restrictions through ACLs.

What is the way to go? PS: We have extremely sensitive PII information.

Thank you in advance!

Is there an MS or an authoritative vulnerability site that indicates all
CVEs for Win2003 and Win XP are the same (ie same CVE number)?
Good morning,
I receive this error when i try to remote into my office computer from home. " Can't connect securely to this page" This might be because the site uses outdated or unsafe TLS security settings.

My server is SBS 2003 R2. Remote access worked great until today.

Please help, very urgent.

Browsed OWASP site & seems like OWASP API Security  guide or checklist
was just initiated in Dec '18:

a) did I miss or there is already a guide that have been released?  Can
    point me to it?  The above link only give a Table of Content, is there
    a full guide?

b) if it's not released yet, perhaps can point me to a full guide on API






Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.