[AusNOG] CryptoLocker Virus

Peter Tiggerdine ptiggerdine at gmail.com
Thu Oct 24 12:05:56 EST 2013


When you think about it, just about all file extension are insecure and
have being compromised in one way or another. It's almost at the stage
where sending/receiving any attachment is high risk.




On Thu, Oct 24, 2013 at 10:51 AM, Robert Hudson <hudrob at gmail.com> wrote:

> On 24 October 2013 11:27, Pinkerton, Eric (AU Sydney) <
> Eric.Pinkerton at baesystemsdetica.com> wrote:
>
>>
>> IMHO, The 'best' policy is a combination of many things starting with
>> training your end users to spot dodgy looking links, filtering egress
>> traffic, patching patching and more patching, not using XP with IE6,
>> monitoring your logs, changing your default password from 'password' and
>> giving people permissions in line with their requirements (ie not making
>> everyone a domain admin) etc etc.
>
>
> Unfortunately, much of that relies on educating users, and if educating
> users was going to work, it'd have done so already. :(
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20131024/71dab167/attachment.html>


More information about the AusNOG mailing list