sales@ishantech.net +603-79319471


 2016 – IshanTech (M) Sdn Bhd awarded as
Outstanding PPS Achievements – Commercial Category by HP

 

2016 – IshanTech (M) Sdn Bhd awarded as
New Business Champion of 2016 from ESET Malaysia

2016 – IshanTech (M) Sdn Bhd recognized as
TOP 25 CYBER SECURITY Technologies Companies 2017
APAC CIO Outlook – IshanTech

 




WeLiveSecurity News, views, and insight from the ESET security community


  • 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields - Version: 3.0
    on January 9, 2018 at 6:00 pm

    Revision Note: V3.0 (January 9, 2018): Microsoft has released an update for all supported editions of Microsoft Excel that allows users to set the functionality of the DDE protocol based on their environment. For more information and to download the update, see ADV170021.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for Microsoft Office applications. This advisory provides guidance on what users can do to ensure that these applications are properly secured when processing Dynamic Data Exchange (DDE) fields. […]

  • 4056318 - Guidance for securing AD DS account used by Azure AD Connect for directory synchronization - Version: 1.0
    on December 12, 2017 at 6:00 pm

    Revision Note: V1.0 (December 12, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for the AD DS (Active Directory Domain Services) account used by Azure AD Connect for directory synchronization. This advisory also provides guidance on what on-premises AD administrators can do to ensure that the account is properly secured. […]

  • 4038556 - Guidance for securing applications that host the WebBrowser Control - Version: 1.0
    on August 8, 2017 at 5:00 pm

    Revision Note: V1.0 (August 8, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for applications developed with the Microsoft Internet Explorer layout engine, also known as the Trident layout engine. This advisory also provides guidance on what developers and individuals can do to ensure that their applications hosting the WebBrowser Control are properly secured. […]

  • 4033453 - Vulnerability in Azure AD Connect Could Allow Elevation of Privilege - Version: 1.0
    on June 27, 2017 at 5:00 pm

    Revision Note: V1.0 (June 27, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to inform customers that a new version of Azure Active Directory (AD) Connect is available that addresses an Important security vulnerability. […]

  • 4025685 - Guidance related to June 2017 security update release - Version: 1.0
    on June 13, 2017 at 5:00 pm

    Revision Note: V1.0 (June 13, 2017): Advisory publishedSummary: Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks and disclosures. Some of the releases are new, and some are for older platforms that we are making publicly available today. […]


  • The Cold Boot Attack is Back
    by Garry McCracken on September 19, 2018 at 4:19 pm

    The Cold Book Attack was resurrected last week by some researchers at f-secure https://press.f-secure.com/2018/09/13/firmware-weakness-in-modern-laptops-exposes-encryption-keys/ .  I would like to provide some context for both the exploit and the mitigations because the cold boot attack is just the tip of the iceberg.   But first, if you don’t want to know the details, there are steps that […] The post The Cold Boot Attack is Back appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Do physical servers really need to be encrypted?
    by Garry McCracken on September 17, 2018 at 8:04 pm

    In the past, I have tried to make the case for encrypting physical servers on premise.  The argument for not needing to encrypt them is that these servers usually run for weeks, months or even years without being brought down, and that they are physically protected within a well-fortified data center.  The protection that Full […] The post Do physical servers really need to be encrypted? appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • ATM and IoT Security – Get Proactive, Be Protected
    by Ryan Sanders on September 11, 2018 at 4:09 pm

    Takeaways from NCR Innovation Conference 2018 Innovation, Meet Security Digital banking has transformed the way we connect and transact with one another. From mobile banking apps to contactless payments, a focus on consumer experience has driven new technologies like never before seen. The consistent, common factor – convenience. That said, we’ve seen breaches of personal […] The post ATM and IoT Security – Get Proactive, Be Protected appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Enterprise Encryption for Linux
    by Garry McCracken on September 5, 2018 at 8:00 pm

    Linux has built in encryption for several years now, yet enterprises still struggle with encryption on Linux laptops.  Why is that? To answer this question, let’s first review the disk encryption capabilities that are built into Linux: 1)      dm-crypt (https://en.wikipedia.org/wiki/Dm-crypt) dm-crypt is a transparent disk encryption subsystem within the Linux kernel. It is a block device based […] The post Enterprise Encryption for Linux appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Proper encryption management and control strengthens computer forensic efforts
    by Garry McCracken on August 15, 2018 at 4:51 pm

    It has been awhile since I last wrote about computer forensics and encryption so it is time for an update. First, what is Computer Forensics?   According to Wikipedia, Computer forensics is, “a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to […] The post Proper encryption management and control strengthens computer forensic efforts appeared first on SecureSpeak | WinMagic Data Security Blog. […]