Cybersecurity

What are some great Anti-Spyware Tools?

Ad-Aware SE Personal Edition – http://www.download.comSpybot Search and Destroy – http://www.down...

Detecting Mac OS X Trojan "Flashback"

BackgroundAs of October 2011, a Trojan named Flashback has been targeting Mac OS X users by masqu...

SQL Injection (Application Vulnerability)

SummarySQL Injection is a type of security vulnerability that occurs when application does not pr...

Cloning systems with Sophos and Sysprep

During deployments of multiple systems with the exact same hardware configuration, Sysprep is the...

Useful OSS Security Tools

1 – Alienvault – Open Source Security Information Management system – good review in the latest (...

What is the function of www.AppliedSecurity.ucla.edu site?

This site is dedicated to posting practical solutions to current data security issues facing the ...

Is the cost of licenses to protect sensitive data by encrypting the disk paid by the campus?

Yes. The campus IT security group has chosen PGP full disk encryption and related tools for this ...

How to Prevent Unauthorized Users From Accessing Your Computer if you Step Away From Your Desk

It takes only a few seconds to secure your computer and discourage malicious individuals. Lock do...

What to do if your e-mail is hacked

Standard steps to do if you believe your e-mail has been hacked:http://blogs.msdn.com/b/securityt...

Verizon's Annual Data Breach Investigations Report (DBIR)

A dramatic increase in attacks by outside parties. Breaches fueled by monetary gain. Hacking and ...

Reducing Laptop Theft

To assist in reducing laptop theft UCPD participates in part of a nationwide security tracing pro...

Sophos Security News & Blogs

Sophos has a number of security news feeds and blogs at: http://www.sophos.com/en-us/why-sophos/o...

Symantec's Annual Internet Security Threat Report

The Internet Security Threat Report (ISTR) provides an overview and analysis of the year in globa...

Sophos Security Threat Report

See the threats through the hype, with the latest research and commentary from SophosLabs. http:/...

Mobile Device Management Now Available With Sophos

The current UCLA-wide agreement for Sophos anti-virus software has been renewed through October 2...

Explaining to your mother how to safely surf the web at Starbucks

The title is mostly for fun, but I’m curious if anyone has found fairly simple guides to safely b...

Heartbleed Remediation

For up to date status of Dell products in relation to Heartbleed visit — http://www.dell.com/lear...

Windows Bitlocker Strength

By default Windows 7/8 Bitlocker uses 128-bit encryption. Each version has an option for 256-bit...

Tips for creating a secure password

How can I create a secure password?Update: Read this first: Choosing a Secure Password by Bruce ...

Intrusion Detection Systems Information

Intrusion Detection Systems (IDS) have many approaches. This page is intended to document the di...

Where can I go to find out more information on viruses, worms, trojans, spyware, hoaxes, etc...

I like going to these sites: Sophos Symantec McAfee CertBruinTech http://www.bruintech.ucla.edu/s...

Phishing protection

Applications that offer phishing protection:Standalone Thunderbird (1.5+) – warns you if a e-mail...

Why shouldn't I email or post Microsoft Word documents?

Many people send Microsoft Word documents as email attachments without realizing that there are s...

How can I make more secure passwords that I can still remember?

This link below leads to a few simple systems described in a paper titled “Simple Formula for Str...

What is PGP? Where can I get more info?

What is PGP?PGP (“Pretty Good Privacy”) is a powerful, free crypto package. PGP lets people excha...

Are there any security requirements for connecting a device to the UCLA network?

Please see UCLA’s Minimum Security Standards for Network Devices UCLA Policy 401 From: Associat...

What is UCLA ASTF and who are its members?

The Applied Security Task Force issues advisories on IT vulnerabilities, threats, patches and oth...

Kerberos

Kerberos http://web.mit.edu/kerberos/www/ Apple’s Introduction to Kerberos [Part 1 http://www...

Anti-virus, firewall and Internet security software

AVG Anti-virus – free; anti-virus Microsoft Security Essentials – Free anti-virus and anti-spywa...

Where can I download Sophos Anti-virus and how do I install it?

Sophos Anti-virus is offered to all faculty, staff, and students at UCLA. Sophos is offered by B...

National Vulnerability Database

National Vulnerability Database is a comprehensive cyber security vulnerability database that int...

Norton Antivirus causes email sending problems

The outgoing email scanning function in Norton Antivirus is usually turned on by default. Indivi...

New UC guidelines on Encryption

The best way to protect data is to not have it. However, restricted data should be retained only ...

Preventing SSH Dictionary Attacks With DenyHosts

From the tutorial:“In this HowTo I will show how to install and configure DenyHosts. DenyHosts is...

Security Engineering - free e-book

Free online copy of a good and comprehensive computer security book: Security Engineering: A Guid...

How do I obtain Sophos Anti-Virus Software at UCLA

UCLA has negotiated an agreement with Sophos for all of their anti-virus products for desktop and...

Uninstalling Norton Antivirus

To install Sophos you must first remove your current anti-virus program. These instructions to un...

I need a free file encryption software

TrueCrypt is a simple, easy-to-use, on-the-fly encryption program. It works on Windows 2000/XP/2...

Is there a free Anti-Virus software for Windows XP 64-bit?

Sophos 6.x supports 64-bit Windows XP, but according to Bruin Online, the earliest it will become...

UCLA Multi-Factor Authentication

For Google Apps for Education (g.ucla.edu)Since Google Apps authentication is done using UCLA Sin...