• Not All ‘Cybers’ Are Created Equally

    Updated: 2012-02-29 14:29:35

  • Compliance, data protection and keeping safe online in 2012

    Updated: 2012-02-29 08:00:03
    In Europe revised data protection laws are being presented, as a way to keep companies and customer data more secure. In this article we cover the highlights, controls that can be used to ensure data protection and the elevated level of security now required as a standard.

  • RSA 2012: eWEEK Labs Picks the 21 Hottest Security Vendors

    Updated: 2012-02-29 05:09:20
    : IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews RSA 2012 : eWEEK Labs Picks the 21 Hottest Security Vendors IT Security Network Security News Reviews : RSA 2012 : eWEEK Labs Picks the 21 Hottest Security Vendors By Cameron Sturdevant on 2012-02-29 The RSA Conference 2012 Feb . 27-March 2 will set the security agenda for the year . More than 300 companies are at the expo , but I've picked the 21 stops I'm making while in San Francisco . I've got a heavy dose of mobile device management MDM and

  • Decoding IPv6: Four Misconceptions that Security Execs Need to Know

    Updated: 2012-02-29 05:00:00

  • Android Forensics Study of Password and Pattern Lock Protection

    Updated: 2012-02-29 02:54:00

  • Big Data Can Boost Security Defenses, Has Privacy Baggage: Microsoft

    Updated: 2012-02-29 02:39:16
    Big data analytics can provide significant insights into the network to detect threats, but it needs to be balanced with privacy concerns, speakers at the RSA conference said. - SAN FRANCISCO Big data is popping up in many discussions at this year's RSA Conference here: both as a way to solve some of the most pressing security problems as well as a reason why individual privacy is at risk. The proliferation of devices and services means more and more information is be...

  • Cyber-Defenses Are About Managing Risk: RSA's Coviello

    Updated: 2012-02-28 22:55:32
    : IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews Cyber-Defenses Are About Managing Risk : RSA's Coviello

  • Two Approaches To Network Optimization At RSA

    Updated: 2012-02-28 18:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're experiencing and promises to be the defining event of the

  • February VEF Participant Takes Home a Kindle Fire.

    Updated: 2012-02-28 17:26:58
    As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to [...]

  • Top 20 Security Blogs

    Updated: 2012-02-28 16:23:43
    Veracode’s nomination for “Best Corporate Security Blog” at the 2012 Social Security Bloggers Awards got the Veracode Marketing team thinking about the other great information security blogs we follow. The Marketing team thought it would be fun to compile a list of what we think are the best 20 information security blogs. We used a [...]

  • Google Shelling Out Up to $1M for Chrome Bug Hunt

    Updated: 2012-02-28 16:20:54
    IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews Google Shelling Out Up to 1M for Chrome Bug Hunt

  • Dell Data-Center Roll-Out Features Next-Gen Servers, Network Virtualization Architecture

    Updated: 2012-02-28 14:00:00
    , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're experiencing and promises to be the defining event of

  • Three Types of Client-side Exploits

    Updated: 2012-02-28 13:00:00
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars Whitepapers Video Tutorials

  • ISC StormCast for Tuesday, February 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2356, (Tue, Feb 28th)

    Updated: 2012-02-28 07:32:00
    ...(more)...

  • QOTD from securityburnout.org, (Tue, Feb 28th)

    Updated: 2012-02-28 05:34:57
    In the too good to pass up on category we find an article by Iain Thomson in El Re ...(more)...

  • Toward More Reliable Wireless With AirMagnet Enterprise 10

    Updated: 2012-02-27 21:40:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Lee H . Badman Bio Archive Lee H . Badman Network Computing Blogger Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the

  • RSA 2012: Mobile Security, Hacktivists, APT, Social Engineering

    Updated: 2012-02-27 21:07:13
    The 2012 RSA Conference has something for everyone when it comes to security issues. This year's sessions cover topics, ranging from cryptography to mobile security to hacktivism and enterprise security. - Thousands of security professionals are planning to descend upon the RSA Conference in San Francisco this week to discuss security issues, ranging from challenges posed by mobile products, to hacktivists, to social engineering, to advanced persistent threats and the cloud. There is something fo...

  • Disqus vs. CloudFlare: Comments Fixed

    Updated: 2012-02-27 14:14:26
    . :

  • Life Correction | Reddit

    Updated: 2012-02-27 13:21:24
    When I arrived at her wedding, her mom greeted me. “Oh, are you THE Conc?” she said. I was a bit shocked. “I don’t think so” I replied. Her mom said “Yes, you’re her friend from college. She talks about you all the time! She would LOVE to see you before the ceremony.” So her [...]

  • RSA Conference 2012: Hot Security Products for Cloud, BYOD

    Updated: 2012-02-27 05:22:56
    : , IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews RSA Conference 2012 : Hot Security Products for Cloud , BYOD IT Security Network Security News Reviews : RSA Conference 2012 : Hot Security Products for Cloud , BYOD By Fahmida Y . Rashid on 2012-02-27 This year marks the 20th anniversary of the RSA conference , and companies are descending on San Francisco's Moscone Convention Center with product announcements and demonstrations highlighting the latest and greatest in their security

  • ISC StormCast for Monday, February 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2353, (Mon, Feb 27th)

    Updated: 2012-02-27 04:34:31
    ...(more)...

  • DDoS Tool List From Anonymous

    Updated: 2012-02-27 02:14:00

  • How Exercise Fuels the Brain | NYT

    Updated: 2012-02-27 00:43:10
    After the single session on the treadmill, the animals were allowed to rest and feed, and then their brain glycogen levels were studied. The food, it appeared, had gone directly to their heads; their brain levels of glycogen not only had been restored to what they had been before the workout, but had soared past [...]

  • The Miura-ori

    Updated: 2012-02-27 00:37:48
    via wheatpond.com Posted via email from danielmiessler.com | posterous Related ContentTry a BookA Digital IO WorkflowBrowser CombatThe Problem Decision TreeDon’t Be a Cryptic Ass

  • Why Do Some People Learn Faster? | Wired.com

    Updated: 2012-02-27 00:31:11
    A new study, forthcoming in Psychological Science, and led by Jason Moser at Michigan State University, expands on this important concept. The question at the heart of the paper is simple: Why are some people so much more effective at learning from their mistakes? After all, everybody screws up. The important part is what happens [...]

  • A Clarification on My Free Will Position

    Updated: 2012-02-26 16:49:59
    A number of people recently have asked me about how my position on free will integrates with a practical society, e.g. how do you get up in the morning if you know you don’t make your own decisions? I answered this recently in an email, and here’s the response: – On Sun, Feb 26, 2012 [...]

  • Google Chrome to Support 'Do Not Track' Privacy Policy

    Updated: 2012-02-25 11:59:27
    Google said it will support "Do Not Track" for its Chrome Web browser by the end of the year. It's not clear how the implementation will present. - Google (NASDAQ:GOOG) Feb. 23 said it is embracing the quot;Do Not Track quot; policy to streamline consumer privacy on the Web, and plans to support the initiative in its popular Chrome Web browser by the end of the year. Formulated by the White House, Federal Trade Commission and the Digital ...

  • Zettaset's SHadoop Brings User Access Control to Big Data

    Updated: 2012-02-24 22:40:36
    Organizations that are concerned with employees who can access data within their Hadoop clusters can now look at SHadoop from Zettaset to create baseline policies. - Zettaset unveiled SHadoop, a new security initiative that would help organizations manage and control employee access to data in Hadoop environments. SHadoop would integrate security functions that would allow administrators to implement role-based access control within the company's Hadoop Orc...

  • At RSA: New data reinforces intimate stories of career stress and burnout

    Updated: 2012-02-24 22:10:30

  • Aruba Networks Joins MDM Game With ClearPass Policy Manager

    Updated: 2012-02-24 22:06:32
    Aruba is entering the mobile-device-management fray with its own offering. However, Aruba claims its platform is cheaper and easier to deploy than others on the market. - Yet another company is stepping into the mobile-device-management arena to help organizations make sense of the influx of employee-owned devices into the corporate environment. Aruba ClearPass is designed to simplify and automate the process of securely provisioning mobile devices onto an ent...

  • Novell Zenworks 11 SP2 Adds Patch, Asset Management for Macs

    Updated: 2012-02-24 20:42:11
    With Zenworks 11 SP2, Novell has added full-disk encryption and extensive Mac support to help organizations manage the influx of Macs on the corporate network. - Novell is adding support for Apple Macs to its device-management suite to help administrators manage heterogeneous systems within the enterprise. With ZENWorks 11 Support Pack 2, administrators can automate patch updates for Macs, automatically deploy software and patches, and manage each syste...

  • Flashback Trojan in the Wild, (Fri, Feb 24th)

    Updated: 2012-02-24 19:06:48
    A Mac Trojan named Flashback released last year masquerading as a Flash Player installer appears to ...(more)...

  • x.o.ware Launches ExoNetwork Security Products

    Updated: 2012-02-24 15:52:58
    The ExoNetwork is a small device that creates a personal cloud that provides secure access from an unencrypted wireless network. - Network security specialist x.o.ware Inc. introduced the ExoNetwork, a secure exoskeleton for small and midsize business (SMB) networks that protects a local network from unauthorized access and extends security to anywhere users access the Internet, even over unsecure public networks. The com...

  • Cisco Small Business SRP 500 Series Multiple Vulnerabilities - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500, (Fri, Feb 24th)

    Updated: 2012-02-24 14:48:04
    ...(more)...

  • Perdue Streamlines IT Management, Cuts Maintenance Expenses

    Updated: 2012-02-24 14:00:00
    , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're experiencing and promises to be the defining event of

  • ISC StormCast for Friday, February 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2350, (Fri, Feb 24th)

    Updated: 2012-02-24 03:21:38
    ...(more)...

  • BlackBerry PlayBook tablet Samba file sharing Vulnerability - http://www.blackberry.com/btsc/KB29565, (Fri, Feb 24th)

    Updated: 2012-02-24 01:30:26
    ...(more)...

  • DNS-Changer "clean DNS" extension requested, (Thu, Feb 23rd)

    Updated: 2012-02-23 23:23:37
    Brian Krebs published this request for extension by the FBI to continue to operate clea ...(more)...

  • Identity-Fraud Victims Are Smartphone, Social Media Users: Report

    Updated: 2012-02-23 22:48:43
    A Javelin Strategy report found that smartphone owners and social media users are likely to become victims of identity theft. - Social media and mobile devices may be putting consumers at greater risk for identity fraud, according to a Feb. 22 report on identity fraud. More than 11.6 million adults were a victim of identity fraud in the United States in 2011, an increase of 13 percent since 2010, according to the Javeli...

  • Using MPLS In The Enterprise

    Updated: 2012-02-23 15:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Jeff Loughridge Bio Archive Jeff Loughridge Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're experiencing

  • Using Nessus 5 to Raise the Value of Penetration Testing

    Updated: 2012-02-23 13:00:00

  • How to Convince Someone Evolution is True | Reddit

    Updated: 2012-02-23 07:40:11
    He permitted her to persist with the illusion that evolution and creation are competing hypotheses, when in fact they are entirely independent concepts that have nothing to do with one another. She needs to understand why creation doesn’t belong in a science classroom. The fact that she thinks it does displays a fundamental misunderstanding on [...]

  • Acunetix Web Vulnerability Scanner - Voted WindowSecurity.com Readers' Choice Award Winner - Web Application Security

    Updated: 2012-02-23 07:00:05
    Acunetix Web Vulnerability Scanner was selected the winner in the Web Application Security category of the WindowSecurity.com Readers' Choice Awards. SecureIIS Web Server Security and LockoutGuard were runner-up and second runner-up respectively.

  • ISC StormCast for Thursday, February 23rd 2012 http://isc.sans.edu/podcastdetail.html?id=2347, (Thu, Feb 23rd)

    Updated: 2012-02-23 02:40:51
    ...(more)...

  • Keylogging with Metasploit & Javascript

    Updated: 2012-02-22 19:59:00

  • IPTABLES Shell Script For Block NMAP

    Updated: 2012-02-22 06:49:00

  • Video: Active Directory Domain Password Policy

    Updated: 2012-02-22 05:59:59
    This video explains the process of configuring Active Directory domain password policy.

  • Google to Sell Heads-Up Display Glasses by Year’s End | NYTimes.com

    Updated: 2012-02-22 01:43:15
    Seth Weintraub, a blogger for 9 to 5 Google, who first wrote about the glasses project in December, and then discovered more information about them this month, also said the glasses would be Android-based and cited a source that described their look as that of a pair of Oakley Thumps.They will also have a unique [...]

  • Network Security Podcast, Episode 268

    Updated: 2012-02-22 01:14:23
    With the 2012 RSA Conference less than a week away, we decided to try to record a short podcast focused on the event this week.  Of course, since Rich and Martin are involved, things ran away and the show ended up being the same length it normally is.  Zach won’t be at the RSA Conference [...]

  • S for Lisp | George Watsky

    Updated: 2012-02-21 20:32:46
    via youtube.com Enjoy. Posted via email from danielmiessler.com | posterous Related ContentA Creative SongSeriously Fast LyricsNew Headz Up App | SNLIf China Attacks America (A Must See)Hitler Finds Out There’s No iPhone 5

  • Cisco And Deloitte Wrong: Good Practices More Impactful Than Vendor Choice

    Updated: 2012-02-21 19:57:00
    : Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Mike Fratto Bio Archive Mike Fratto Network Computing Editor Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're

  • I Pray Every Night For an Obama vs. Santorum Presidential Race

    Updated: 2012-02-21 19:01:32
    .

  • Webinar This Thursday: Turning Your Big Security Data into a Big Advantage

    Updated: 2012-02-21 16:52:29
    What’s Your Strategy for Big Security Data? The idea of “big data” has technology vendors and customers alike scrambling to come up with ways to manage the limitless amounts of data being generated by apps, API’s, databases, web services, etc. For organizations with aggressive security and compliance requirements, the security data driving today’s modern threat [...]

  • Sqlmap Plugin for BurpSuite | BugBlog

    Updated: 2012-02-21 16:08:06
    Once you may have loaded the plugin, use it is very simple. Just have to click the right mouse button over the url you want to test with sqlmap and you will have the option popup: via blog.buguroo.com Win. Posted via email from danielmiessler.com | posterous Related ContentBeerSec.org: Abusing ASP.NET Forms Authentication with BurpBeEF’s Metasploit [...]

  • AppSense Unveils Smartphone Encryption

    Updated: 2012-02-21 14:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're experiencing and promises to be the defining event of the cloud computing

  • Aruba Networks Swings Big At BYOD And More With ClearPass

    Updated: 2012-02-21 14:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Lee H . Badman Bio Archive Lee H . Badman Network Computing Blogger Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're

  • Exploitable Since 2002: New Nessus 5 Filters

    Updated: 2012-02-21 13:00:00

  • Post Exploitation To Manage Firewall And Antivirus

    Updated: 2012-02-21 04:28:00

  • SQLMap plugin for Burpsuite

    Updated: 2012-02-21 03:58:00

  • The DODO iPad Case

    Updated: 2012-02-21 01:59:03
    Inspired. Related ContentDODOCASEiPad 2 Graphics Much Faster Than iPad 1, Motorola XoomIs it becoming cool to not capitalize story titles?Genetically There Are Only Three Types of PeopleThe Original Occupy Wall Street Protester

  • Do Things; Tell People | Carl Flax

    Updated: 2012-02-21 01:42:26
    You would not believe how much opportunity is out there for those who do things and tell people. It’s how you travel the entreprenurial landscape. You do something interesting and you tell everyone about it. Then you get contacts, business cards, email addresses. Then you get contracts, job offers, investors, whatever. You make friends who [...]

  • Jobs Made Apple Great by Ignoring Profit | Reuters

    Updated: 2012-02-20 19:08:50
    I have come to the conclusion that what has made Apple so different is that instead of having a profit motive at its core, it has something else entirely. Many big companies like to pretend this is the case — “we put our customers first” — but very few truly live by that mantra. When [...]

  • Gateway Security vs. Desktop Security

    Updated: 2012-02-20 17:09:08
    , . . Blog About In the News Press Releases Careers Support Technical Support Customer Service User Guides Knowledge Base Training How To Buy Find a Partner Partners Why eSoft Distributed Intelligence Architecture SoftPak Director Whitepapers Blog Test a Site ThreatMonitor eSoft Videos Solutions Small Business Solutions Education Solutions Financial Solutions Health Care Solutions Website Blocking Web Security Email Security Spam Blocking Web Protection Products Services Instagate ThreatWall Software Add-Ons Support Options Demo Virtual UTM Appliances eSoft Sales Promotions Monthly Security Service Home Categories adware attacks blackhat seo compromised sites cyber crime email security exploits firewall fraud internet security malware mobile devices network security password security

  • My Friend’s Every Day Carry System

    Updated: 2012-02-17 21:26:01
    via youtube.com My good friend Ken is doing a new video blog and is covering his Every Day Carry (EDC) system for his first installment. Check it out if you have an interest in concealed carry; Ken is the type who does massive amounts of research before he decides a direction to go with his [...]

  • Cowbird : A Digital Storytelling Platform

    Updated: 2012-02-17 18:33:47
    Cowbird is a small community of storytellers, focused on a deeper, longer-lasting, more personal kind of storytelling than you’re likely to find anywhere else on the Web. Cowbird allows you to keep a beautiful audio-visual diary of your life, and to collaborate with others in documenting the overarching “sagas” that shape our world today. Sagas [...]

  • Recommended Security Application For iOS

    Updated: 2012-02-17 08:02:00

  • Bypassing Web Application Firewalls with SQLMap Tamper Scripts

    Updated: 2012-02-17 07:00:00

  • Flexibility Key To Next-Gen Networks

    Updated: 2012-02-16 18:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're experiencing and promises to be the defining event of the cloud computing

  • Vmware/Mitel Compete With Cisco For Contact-Center Desktop Virtualization

    Updated: 2012-02-16 14:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Howard Marks Joe Onisick Upcoming Events Cloud Connect Santa Clara Feb 13-16, 2012 Cloud Connect brings together the entire cloud eco-system to better understand the transformation we're experiencing and promises to be the defining event of the cloud computing

  • Sam Harris on Free Will

    Updated: 2012-02-16 06:39:11
    via youtube.com Obvious to me. Nonsense to others. Fascinating to me, that it’s nonsense to others. Posted via email from danielmiessler.com | posterous Related ContentSam Harris Answers Reddit’s QuestionsHarris Gives The Single Best Summary of Why Religious Belief is HarmfulJudge Napolitano Speaks Stunning/Obvious Political TruthNew Headz Up App | SNLA Creative Song

  • The Problem With Daniel Dennett’s Free Will

    Updated: 2012-02-16 06:05:08
    Before going into my qualms with Daniel Dennett’s capability/evitibility-based free will, I want to point out that most supporters of Daniel Dennett’s brand of free will don’t realize that he agrees that we don’t have my brand of free will. What brand is that you ask? The absolute kind. The kind where people are free [...]

  • Retina CS Turns Patch Tuesday into Simply “Tuesday”

    Updated: 2012-02-15 18:24:08
    Last week we announced Retina CS 3.0 – which extends our already market-leading vulnerability management capabilities for mobile devices – by adding in support for Android devices, as well as Microsoft Exchange ActiveSync – and sets a new bar for enterprise cloud security, allowing private cloud deployments based on Amazon Web Services (AWS) and VMware [...]

  • Sandcat Penetration Testing Oriented Browser | The Hacker News (THN)

    Updated: 2012-02-15 18:06:38
    This first Sandcat Browser release includes the following pen-test oriented features:Live HTTP Headers Request Editor extension Fuzzer extension with multiple modes and support for filters JavaScript Executor extension — allows you to load and run external JavaScript files Lua Executor extension — allows you to load and run external Lua scripts Syhunt Gelo HTTP Brute [...]

  • Microsoft Patch Tuesday – February 2012

    Updated: 2012-02-15 06:00:51
    Ahh Valentine’s Day. Time to leave work early, buy a box of chocolates for your loved one, and fight through the crowds for a table at your favorite restaurant. Or, if you happen to be gainfully employed in IT security, time to spend the evening at work with your coworkers, patching servers and drinking a [...]

  • Identity (Management) Crisis (Part 3): Solving the Identity Problem

    Updated: 2012-02-15 06:00:34
    In this, Part 3, we're going to begin the discussion about some current identity management solutions as well as new ways to implement old methods of verifying identity.

  • Network Security Podcast, Episode 267

    Updated: 2012-02-15 00:42:23
    On this wonderful (?) Valentine’s Day, we are joined by guest-host and friend-to-the-show Michelle Klinger, while Rich is overcoming some throat-in-tube type illness (feel better, Rich!). Network Security Podcast, Episode 267, February 14, 2012 Time:  34:41 Show Notes: HOIC DDoS Analysis and Detection Cybersecurity Disaster Seen in U.S. Survey Citing Spending Gaps Boston Police hits back [...]

  • Dubious PayPal Phish Lures Users

    Updated: 2012-02-14 03:57:27
    In the latest phishing spree on PayPal users, cyber criminals use some crafty techniques to evade detection and trick users. As typical, the scam starts with an email asking the user to update their account, providing a realistic spoof of an authentic PayPal communication.

  • Nessus 5.0 Released!

    Updated: 2012-02-13 19:31:42
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars Whitepapers Video Tutorials

  • New IBM iSeries Audit Policy

    Updated: 2012-02-13 18:01:29

  • Barrelroll - Make Proxy Server to DDoS Clients

    Updated: 2012-02-13 13:40:00

  • Adding More Pentesting Tools for BackTrack 5

    Updated: 2012-02-12 01:42:00

  • Fake Invoice Spam Delivers Malware and Exploits

    Updated: 2012-02-08 16:44:01
    eSoft is alerting users to some fake invoice spam hitting inboxes with an attachment delivering malware. The trick to this is that the attachment is a simple htm file that many users might open, then delivering the malware through an exploit.

  • Saving Credentials on Windows Computers

    Updated: 2012-02-08 07:59:28
    In this article the author discusses Windows Credential Manager and the ability to save credentials to a Windows 7 computer and how an attacker can exploit saved credentials using the command line tool vaultcmd.

  • Howto: Jailbreak iPhone iOS 5

    Updated: 2012-02-08 07:55:00

  • Android Multiple Vulnerabilities By 80vul.com

    Updated: 2012-02-08 07:42:00

  • Installer Script For Metasploit on iOS5 by Khalil Ounis

    Updated: 2012-02-07 07:49:00

  • Open Source database of android malware

    Updated: 2012-02-05 00:51:00

  • Industry Experts Call Retina CS a ‘Flawless’ Best Buy

    Updated: 2012-02-01 19:47:38
    Yesterday Morey Haber gave our readers a sneak peek at what was to come with our soon-to-be-announced Retina CS 3.0 release. All of us here at eEye feel 3.0 will drive even greater distance between eEye and our competitors. Customers speak the loudest with regards to my backing up our claim of market and product [...]

Current Feed Items | Previous Months Items

Jan 2012 | Dec 2011 | Nov 2011 | Oct 2011 | Sep 2011 | Aug 2011