• Carriers, Manufacturers Called Out for Failing to Update Android Phones

    Updated: 2011-11-26 15:40:07
    Android smartphones from Samsung, HTC and Motorola dominated a "Dirty Dozen" list of insecure phones because carriers were not pushing out OS updates in a timely manner. - Security firm Bit9 on Nov. 21 released its quot;Dirty Dozen quot; list of insecure smartphones. The list focused on Android smartphones because approximately 56 percent of Android phones in the marketplace are running out-of-date and insecure versions of the mobile operating system, Harry Svedl...

  • Quick Tip: Pastebin Monitoring & Recon, (Thu, Nov 24th)

    Updated: 2011-11-24 16:56:55
    Happy Thanksgiving! On the heels of Dr. Ullrich's diary regardingSCADA hacks published on Pas ...(more)...

  • Menlo Logic AccessPoint SSL VPN Software - Voted WindowSecurity.com Readers' Choice Award Winner - VPN Software

    Updated: 2011-11-24 06:59:18
    Menlo Logic AccessPoint SSL VPN Software was selected the winner in the VPN Software category of the WindowSecurity.com Readers' Choice Awards. Checkpoint VPN-1 Power and Astaro Network Security were runner-up and second runner-up respectively.

  • Top 10 Dumb Computer Security Notions and Myths

    Updated: 2011-11-23 19:45:53
    IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud Computing BLOGS WHITE PAPERS WEBCASTS Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Enterprise Networking Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews Top 10 Dumb Computer Security Notions and Myths IT Security Network Security News Reviews : Top 10 Dumb Computer Security Notions and Myths By Fahmida Y . Rashid on 2011-11-23 While organizations are deploying firewalls , public key cryptography and complying with various security and privacy regulations , many of them are still hanging onto certain misperceptions , falsehoods and approaches that don't work , Charles Pfleeger , a

  • Shoppers Need Watch for Scams While Using Mobile Devices on Black Friday

    Updated: 2011-11-23 19:14:33
    Shoppers using apps to research products, compare prices, and find coupons should be vigilant for online scams and thefts while shopping in stores this Black Friday. - Shoppers heading to the stores for Black Friday shopping this week should be vigilant when using mobile devices as scammers and criminals will be gunning for them, security experts warned. Mobile appears to be king on this year's Black Friday, traditionally the biggest holiday shopping day of th...

  • E-Commerce, Retail Websites Alert for DDoS Attacks this Holiday Season

    Updated: 2011-11-23 15:59:35
    Online shoppers aren't the only ones that may overwhelm e-commerce Websites and crash them this holiday season. Cyber-attackers may be waiting in the wings with a DDoS attack. - With the holiday season ramping up, it's not just online shoppers that have to be vigilant for cyber-threats. Enterprises and retailers have to be alert for scammers, cyber-criminals and hackers. High-profile distributed-denial-of-service attacks made headlines in 2011, and security vendors wa...

  • SCADA hacks published on Pastebin, (Wed, Nov 23rd)

    Updated: 2011-11-23 15:50:30
    pastebin.com has become a simple platform to publish evidence of various attacks ...(more)...

  • Google Enables Forward Secret HTTPS for Google+, Search, Gmail

    Updated: 2011-11-23 15:41:53
    Google enables forward secure HTTPS encryption for its key Web services and advises other major Websites to thwart hackers from engaging in retrospective decryption. - Like Fox Mulder in the quot;X-Files, quot; Google (NASDAQ:GOOG) is fighting the future when it comes to securing email search and other Web services. The search engine provider, which last month made HTTPS encryption its default security mode for search, Nov. 22 said it has added forward sec...

  • Network Encroachment Methodologies

    Updated: 2011-11-23 07:59:27
    In this article, we will go over several of the more common network encroachment and attack methods that can be used alone, or in conjunction with each other or with additional attacks to compromise a network.

  • ISC StormCast for Wednesday, November 23rd 2011 http://isc.sans.edu/podcastdetail.html?id=2152, (Wed, Nov 23rd)

    Updated: 2011-11-23 02:05:11
    ...(more)...

  • Weak Security Prevails With 12345 Among Most Common Passwords for 2011

    Updated: 2011-11-23 00:05:17
    With users continuing to use weak passwords across multiple online services, security experts are advocating a single sign-on approach to reduce the number of passwords users have to remember. - The 25 most popular passwords in 2011 include such gems as quot;password quot; and quot;123456, quot; according to an analysis of various lists and databases dumped online by hackers this year. Internet users were selecting common names, numeric sequences and keyboard layouts as their pas...

  • Pentagon Confirms Military Action Is an Acceptable Response to Cyber-Attacks

    Updated: 2011-11-22 21:18:47
    The ability to launch military strikes against cyber-attackers will deter perpetrators considering attacking the United States via cyber-space, the Pentagon said in a report sent to Congress. - It is official. The United States military has explicitly stated that it has the right to retaliate with military force against a cyber-attack. In a 12-page report sent to Congress and made public Nov. 21, the Department of Defense said the military can launch a physical attack in the case of a...

  • Updates on ZeroAccess and BlackHole front..., (Tue, Nov 22nd)

    Updated: 2011-11-22 19:44:10
    Mpack, IcePack, Eleonore, Phoenix, BlackHole. ...(more)...

  • RealPlayer update addresses 19 CVEs. Patch it! Remember that Exploit kits can exploit vulnerable client apps. http://service.real.com/realplayer/security/11182011_player/en/, (Tue, Nov 22nd)

    Updated: 2011-11-22 17:05:31
    Pedro Bueno (pbueno /%%/ isc. sans ...(more)...

  • Big Data? Is There Any Bigger Data Than Your Security Data?

    Updated: 2011-11-22 16:16:59
    The idea of “big data” has technology vendors and customers alike scrambling to come up with ways to manage the limitless amounts of data being generated by apps, API’s, databases, web services, etc. For organizations with aggressive security and compliance requirements, the security data driving today’s modern threat and risk intelligence (assessments, compliance reports, attack [...]

  • Open tabs 11/22/11

    Updated: 2011-11-22 14:33:40
    I got home Sunday from 3 days in Las Vegas, two of which were spent at the first ever Minecon.  For those of you who aren’t the parents of Minecraft addicts or addicts yourselves, it’s a game where you create a whole world then mine it for resources and build just about anything you can [...]

  • ISC StormCast for Tuesday, November 22nd 2011 http://isc.sans.edu/podcastdetail.html?id=2149, (Tue, Nov 22nd)

    Updated: 2011-11-22 03:58:42
    ...(more)...

  • Android Malware Targeting User Data Continues to Proliferate in Market

    Updated: 2011-11-22 03:38:35
    Security researchers are sounding a warning about the speed at which Android malware is growing, thanks to how easy it is to post an application on the Android Market. - As Android market share continues to grow, malware developers are increasingly targeting the platform, according to security researchers. While the total volume of mobile malware and malware specifically targeting Android remains very small in comparison to malware targeting the Windows platf...

  • ATandT Customers Targeted by 'Organized, Systematic' Attack on Website

    Updated: 2011-11-22 03:36:30
    Unknown attackers have unsuccessfully used an automated script to try to access customer accounts on the AT&T Website, AT&T wrote in a letter to customers. - AT amp;T notified some of its wireless customers that unknown perpetrators had tried to hack their accounts. The attack was unsuccessful as no accounts appear to have been breached, the company said in a letter to its customers. Attackers appear to have used an automated script to see if AT am...

  • Poor Passwords, Weak Software Make SCADA Systems Vulnerable to Attack

    Updated: 2011-11-21 22:29:29
    While putting industrial systems on the Internet may make it easier to manage and monitor them remotely, they are also exposing critical infrastructure to cyber-attacks. - Security professionals have been sounding the alarm about protecting critical infrastructure from cyber-attackers for a while, and recent incidents show that attacks are very likely. Shortly after reports emerged of cyber-attackers breaching a city water utility network in Springfield, Ill., a...

  • IPv6 Momentum Takes Huge Swing

    Updated: 2011-11-21 16:35:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events IT Management Imperative Virtual Event December 1st In this virtual event , you will get up to speed on the best practices and methods to optimize IT management and you see how to prepare for new

  • Fidelis Introduces SSL Traffic Security Platform

    Updated: 2011-11-21 14:15:46
    In response to demand to inspect traffic at speeds above one gigabit, Fidelis is introducing the SSL Inspector 10G. - Fidelis Security Systems, a specialist in network visibility, analysis, and control solutions, announced the SSL Decoder within Fidelis XPS, which provides the ability to assess the authenticity of a Secure Socket Layer certificate. Fidelis also introduced the SSL Inspector 10G, which enables th...

  • Aerohive’s $99 Branch Office Offering Is Not A Black Friday Sale

    Updated: 2011-11-21 13:22:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Lee H . Badman Bio Archive Lee H . Badman Network Computing Blogger Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events IT Management Imperative Virtual Event December 1st In this virtual event , you will get up to speed on the best practices and methods to

  • ISC StormCast for Monday, November 21st 2011 http://isc.sans.edu/podcastdetail.html?id=2146, (Mon, Nov 21st)

    Updated: 2011-11-21 02:25:25
    ...(more)...

  • Majority of Firewall Rules Are Improperly Configured, Managed, Survey Finds

    Updated: 2011-11-20 16:29:38
    A Tufin Technologies study found that the lack of automation in firewall management is resulting in improper firewall rule configuration and cheating on audits. - Organizations are struggling to keep track of changes in their networks and to effectively manage their firewall policies, according to a new study. Nearly 85 percent of network administrators in the 2011 Firewall Management report said half of their firewall rule changes need to be fixed beca...

  • SOPA, Facebook Spam Attack, SCADA Exploit Lead Week's Security News

    Updated: 2011-11-20 16:29:33
    The past week's most prominent IT security news included the massive spam attack against Facebook, outrage over a new federal anti-piracy bill and an attack on critical infrastructure in the United States. - The Web exploded in outrage as the House Judiciary Committee conducted hearings on Nov. 16 to discuss the Stop Online Piracy Act. Consumer advocacy groups, industry organizations and technology giants slammed Congress for stacking the witness panel with five advocates for the bill and only one again...

  • Monitoring your Log Monitoring Process, (Sat, Nov 19th)

    Updated: 2011-11-19 22:30:53
    A review of this year's diaries on Log Monitoring We Write a lot about Log Monitoring and Analysis. ...(more)...

  • NetworkMiner 1.2 Released

    Updated: 2011-11-19 16:00:00
    NetworkMiner 1.2 is now available! For those who are not familiar with the network forensics tool NetworkMiner, it's a portable Windows application that analyzes network traffic. NetworkMiner comes in two flavors; a free open source version and a commercial version called “NetworkMiner Professional”[...]

  • Nasdaq Security Hygiene Was Lacking, Investigators Found

    Updated: 2011-11-19 03:17:45
    Investigators were surprised to find that Nasdaq had outdated and improperly patched software running in its environment, Reuters said. - More details leaked from the investigation into the cyber-attack on Nasdaq OMX Group in the fall of 2010 show that the stock exchange was surprisingly lax in its security, Reuters reported. Federal investigators found that some of the exchange's computers were running out-of-date software ...

  • Dragon Research Group (DRG) announced the white paper entitled "VNC: Threats and Countermeasures" : https://dragonresearchgroup.org/insight/vnc-tac.html, (Sat, Nov 19th)

    Updated: 2011-11-19 02:17:13
    Pedro Bueno (pbueno /%%/ isc. sans ...(more)...

  • Cyber-Attackers Breach SCADA Network, Destroy Pump at Water Utility

    Updated: 2011-11-18 22:57:48
    Hackers destroyed a pump used by a U.S. water utility after hacking the network of a SCADA vendor and stealing remote access login information. - Hackers breached the network at a water utility in Springfield, Ill. and destroyed a pump, according to a post on the Wired Threat Level blog. Cyber-attackers gained remote access into the control systems used by the city water utility in Springfield, Ill. on Nov. 8, a security expert told Wi...

  • SecurityCenter Dashboards on the Discussion Forums

    Updated: 2011-11-18 21:50:14

  • Spammed YouTube Service Requests Link to Pharmafraud

    Updated: 2011-11-17 21:02:41
    One of the most popular sites on the Web, YouTube, has again become a target of Cyber Criminals. Similar to the myriad other service request emails that have been circulating over the past couple years, the hapless email recipient receives an email similar to the one shown below.

  • New Dell Kace Appliances Address Midmarket

    Updated: 2011-11-17 13:49:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events IT Management Imperative Virtual Event December 1st In this virtual event , you will get up to speed on the best practices and methods to optimize IT management and you see how to prepare for new

  • On False Senses of Security

    Updated: 2011-11-16 18:33:34
    Customer conversations are the best part of my job. I really enjoy talking with users and buyers of security technology, especially in today’s hyperactive threat and attack climate. Most often these conversations are with customers proactively planning updates to their security strategy, or with prospects that have matured to a level where their tools need [...]

  • VDS Best Practices - Design Considerations

    Updated: 2011-11-16 18:05:10
    After a long break I am back again on this forum. Over the last couple of months I was busy interacting with various customers as part of the VMworld US and Europe conferences and trying to understand how customers are...

  • BMC Treads Carefully Among The Giants

    Updated: 2011-11-16 15:51:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events IT Management Imperative Virtual Event December 1st In this virtual event , you will get up to speed on the best practices and methods to optimize IT management and you see how to prepare for new

  • Google’s wifi mapping non-solution

    Updated: 2011-11-16 14:10:55
    Google got in a lot of trouble last year for capturing private data from wireless networks when they were driving the googlemobiles around to get video shots for StreetView.  Basically, rather than just capturing the SSID for the access points, in a lot of cases they captured data streams from the AP’s, which violated all [...]

  • Windows Firewall: Domain Networks, Private Networks, and Public Networks

    Updated: 2011-11-16 06:00:09
    In this article the author will discuss the different network connections associated with Windows Firewall settings for your Windows servers and desktops.

  • Network Security Podcast, Episode 259

    Updated: 2011-11-16 00:23:48
    Rich and Martin are together for the first time in about 6 weeks thanks to all our overlapping travel. We are joined by Marisa Fagan who tells us about BayThreat- one of the only actual security conferences in the Bay Area (and a really good one). Then Marisa leaves and Rich and Martin jump into [...]

  • Putting Trust in Software Code

    Updated: 2011-11-15 19:44:31
    Seven years ago when we were first embarking on the mission of making static analysis useable, scalable, and able to operate without access to source code, automated static binary analysis was a new concept. There were human operated disassemblers, but the ability to do large scale, highly repeatable static binary analysis was an unknown. At [...]

  • Dragon Research Group (DRG) announced an updated VNC probe insight report: https://dragonresearchgroup.org/insight/vnc-tac.html, (Tue, Nov 15th)

    Updated: 2011-11-15 10:04:06
    ...(more)...

  • A Brief Introduction To OpenFlow

    Updated: 2011-11-14 15:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us A Brief Introduction To OpenFlow Mike Fratto November 14, 2011 OpenFlow is a specification now managed by the Open Networking Foundation , which defines the functions and protocols used to centrally manage switches via a centralized . controller 1 2 3 4 5 6 7 13 Next E-mail Share OpenFlow is a specification now managed by the Open Networking Foundation which defines the functions and protocols used to centrally manage switches via a centralized controller . OpenFlow is a command and control protocol that includes communication over SSL TLS protected channels , feature discovery and configuration of devices by the controller , and managing the forwarding tables on the

  • DHL Shipment Notice Malware

    Updated: 2011-11-11 17:41:06
    Below is an example of a recent malware infected email attempting to spread the Bredolab (bredozip) trojan. Similar versions of failed delivery notification spam using other shipping companies are now standard threats that users should be aware of as a security threat. In these attacks, the recipient of the email gets a notice of a package shipment that looks very authentic. When they open the email attachment, or click an embedded web link, the virus infects the host pc...

  • Open Tabs 11/11/11

    Updated: 2011-11-11 14:03:46
    Whether you call it Veteran’s Day, Pocky Day,Binary Day or something else, it’s Friday, I don’t know about you, but I’m looking forward to this weekend and spending some time with friends.  Being a parent, I don’t get out for adult time as much as I once did, which makes the rare occassions all that [...]

  • TechGenix launches MSPAnswers.com - Your guide to the world of Managed Services!

    Updated: 2011-11-11 10:00:15
    Visit MSPAnswers.com for exclusive tips and insights on how your MSP business can thrive and grow in an increasingly competitive managed services market.

  • Discovering Dropbox On Your Network

    Updated: 2011-11-10 18:22:37
    : Careers News Events Contact Support About Tenable Enter search text Solutions Solutions Overview Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM Products Products Overview Nessus Scanner Nessus ProfessionalFeed SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Expert Resources Expert Resources Overview Whitepapers Webinars Videos Discussion Forum Tenable Blog Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Store

  • Microsoft Patch Tuesday Roundup - November 2011

    Updated: 2011-11-09 13:11:47
    : Careers News Events Contact Support About Tenable Enter search text Solutions Solutions Overview Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM Products Products Overview Nessus Scanner Nessus ProfessionalFeed SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Expert Resources Expert Resources Overview Whitepapers Webinars Videos Discussion Forum Tenable Blog Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Store

  • Out of band remote control of devices, MDM and AMT what the future holds

    Updated: 2011-11-09 07:00:10
    In this article the author will cover two emerging technologies for managing and securing devices - MDM and AMT. MDM in the mobile device market and AMT for the Intel based desktop PC's on the LAN.

  • Microsoft Patch Tuesday – November 2011

    Updated: 2011-11-09 01:58:37
    This month Microsoft released four security bulletins, patching a total of four vulnerabilities. Included in this month’s bulletins is a particularly ugly vulnerability in tcpip.sys (MS11-083). This vulnerability involves sending a large amount of UDP packets to a closed port. While the amount of work to exploit seems great and Microsoft feels that exploitation will [...]

  • Network Security Podcast, Episode 258

    Updated: 2011-11-08 23:15:38
    We’re still scattered to the wind and getting together for a podcast is proving to be nearly impossible.  Luckily Martin was able to get a couple of podcasts from BSides DFW this weekend, so there’s a podcast, short as it is.  It’s almost enough to make you wonder if having a successful helps make you [...]

  • Open Tabs 11/08/11

    Updated: 2011-11-08 13:39:27
    I had a great time at BSides DFW this weekend!  Michelle Klinger, Joseph Sokoly and the whole crew of volunteers who made the event happen did such an awesome job of putting it together and the Microsoft tech center was the perfect place to have it.  Not that Jayson Street didn’t make a few of [...]

  • Webinar Winner! Congratulations to the Winner of Our Motorola Xoom Tablet Giveaway!

    Updated: 2011-11-06 23:37:22
    Recently we hosted a webinar with VMware, “Close Your Virtual App Security Gap”. If you haven’t had a chance to check out the materials from that webcast, you can find the slides here. It was a great session, where the eEye and VMware ThinApp product teams talked about virtual app security and how virtual apps can [...]

  • Passive OS Fingerprinting

    Updated: 2011-11-05 14:45:00
    Network traffic from a computer can be analyzed to detect what operating system it is running. This is to a large extent due to differences in how the TCP/IP stack is implemented in various operating systems. We will in this blog post explain the different methods that can be used to identify what o[...]

  • Best Practices in Data Protection Study Released

    Updated: 2011-11-04 23:09:03
     Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest

  • Open Tabs 11/04/11

    Updated: 2011-11-04 15:56:01
    It’s almost time to hop in the car and head for #BSidesDFW (I even think in hashtags some days) in about an hour.  I find it annoying that I have to leave the house about 3 hours before my flight to have any chance of making it, since it takes 90 minutes to get to [...]

  • Close Your Virtual App Security Gap

    Updated: 2011-11-03 23:25:27
    Virtual apps, and specifically those deployed by market leading VMware’s ThinApp technology, are becoming increasingly popular in the financial services and healthcare-related fields, as well as with government agencies.   Why?  The technology allows IT teams easily streamline application mobility and eliminate application conflicts on the desktop, which at the end of the day, means [...]

  • Open Tabs 11/03/11

    Updated: 2011-11-03 15:15:17
    This week’s podcast conversation with HD Moore and Josh Corman was a good thing.  Getting the ideas of “HD Moore’s Law“, the security poverty line and security debt out there so other people can beat on the ideas, examine them for flaws and hopefully incorporate portions of the concepts into their own thinking.  This is, [...]

  • Is that System Managed?

    Updated: 2011-11-02 12:00:00

  • Defending your Network against the APT

    Updated: 2011-11-02 07:59:23
    In this article, we'll take a look at how the APT has evolved and what you need to do to defend your network against this type of threat.

  • Network Security Podcast, Episode 257

    Updated: 2011-11-02 00:41:16
    Tonight Martin is speaking to Josh Corman, Akamai co-worker, and HD Moore, creator of Metasploit and Rapid7 CTO.  Josh came up with the idea of HD Moore’s Law a couple of months ago, the idea that the strength of the casual attacker is roughly equivalent to what Metasploit is capable of.  If your corporation isn’t [...]

  • Tenable Network Security Showcase - Chicago 2011

    Updated: 2011-11-01 14:28:19

  • Open tabs 10/31/11

    Updated: 2011-11-01 04:10:20
    it was a fun Halloween, or at least as much fun as it can be if you spend the whole day home working.  It would have been fun to be in the office today to see my co-workers in their costumes, but I had far to much to do to make the commute to my [...]

Current Feed Items | Previous Months Items

Oct 2011 | Sep 2011 | Aug 2011 | Jul 2011 | Jun 2011 | May 2011