Browser Separation with Integration using VirtualBox

Seamless window integration of two separate operating systems, with isolated network stacks. Ransomware poses a real risk to every day web surfers. There are multipule attack vectors, drive by downloads, compromised sites and malvertising to name just a few are all huge areas of risk. This leads some to want seperation or sand boxing of …

Continue reading ‘Browser Separation with Integration using VirtualBox’ »

VeraCrypt takes a minute to pre-boot authenticate

VeraCrypt is a free disk encryption software, that is based on TrueCrypt 7.1a. If you are suffering slow boot up with VeraCrypt, you password takes ages to be accepted or slow pre boot authentication then read on… When I first tested VeraCrypt with Windows 10, I had problems with it taking around a minute to …

Continue reading ‘VeraCrypt takes a minute to pre-boot authenticate’ »

Implementing Security Zones with Home Routers for the IoT early years

With the inevitable increase of internet connected devices, mainly due to the surge in Internet of Things (IoT) products, the number of vulnerable (or potentially vulnerable) devices is ever increasing. Today we have everything from internet connected thermostats and door bells to toy dolls and cars. Security zones with home NAT/Firewall routers NOTE: All references …

Continue reading ‘Implementing Security Zones with Home Routers for the IoT early years’ »

The need for Full Disk Encryption (FDE) / System Encryption

With the increasing number of mobile computing devices the fixed desktop PC in the home has been on the decrease, in favour of a mix of mobile platforms. Whilst a number of people use their mobile or tablet devices for browsing the web, there is a large number of laptops in use which do not …

Continue reading ‘The need for Full Disk Encryption (FDE) / System Encryption’ »

Mitigating Credential Theft using the Windows 10 Isolated User Mode

In this video Seth Juarez interviews Seth Moore who describes another benefit of the Windows 10 Isolated User Mode, credential theft mitigation. He first describes the kinds of credentials that can be stolen and how a hacker gains access to them. He then describes how the Windows 10 Isolated User Mode prevents the typical techniques …

Continue reading ‘Mitigating Credential Theft using the Windows 10 Isolated User Mode’ »

Windows 10 Security with Isolated User Mode Processes and Features

I stumbled across these videos by Seth Juarez the other day, which explain the detail around Isolated User Mode and security improvements in Windows 10. There is a lot of talk about privacy and ‘telemetry’ in relation to Windows 10, however there is a bigger picture. This should make an interesting watch for those interested …

Continue reading ‘Windows 10 Security with Isolated User Mode Processes and Features’ »

Qualys Labs SSL Test – Incorrect SNI alerts

If you have run the Qualys SSL Test, you may have seen the following errors in your report: Client aborts on SNI unrecognized_name warning Incorrect SNI alerts If your unsure what SNI is all about, then the following quote from Wikipedia should bring you up to speed: “Server Name Indication (SNI) is an extension to …

Continue reading ‘Qualys Labs SSL Test – Incorrect SNI alerts’ »