• Fake tech reps calling, (Fri, Mar 30th)

    Updated: 2012-03-30 22:38:53
    Fake Anti-Virus isn't enough, now we also have to contend with fake Microsoft reps! This scam has ...(more)...

  • Visa, MasterCard Warn Banks of Data Breach, Stolen Cardholder Data

    Updated: 2012-03-30 20:47:53
    According to reports, about 50,000 credit card accounts were breached when the servers of a third-party processing company were compromised. - Cyber-criminals hacked into a credit card processing company and stole information from about 50,000 Visa and MasterCard cardholders, the two companies said March 30. In separate statements, officials with Visa and MasterCard said they were aware of the data breach at the third-party processing...

  • SINET IT Security Entrepreneur's Forum: 10 Key Takeaways

    Updated: 2012-03-30 19:17:51
    : IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews SINET IT Security Entrepreneur's Forum : 10 Key Takeaways IT Security Network Security News Reviews : SINET IT Security Entrepreneur's Forum : 10 Key Takeaways By Chris Preimesberger on 2012-03-30 The San Francisco-based Security Innovation Network SINET held its sixth annual IT Security Entrepreneurs' Forum March 21 and 22 at Stanford University's Frances Arrillaga Alumni Center , and as one might imagine , the presentations and panel

  • The Free Will Argument You MUST See

    Updated: 2012-03-30 18:11:07
    This is the single best presentation of Harris’ argument that I’ve ever seen him make. He finally addresses common counterarguments, such as: Well, I can decide to do x right now—and then I can change my mind–or even change my mind again! This proves I have free will. This is the first time I’ve seen [...]

  • Kelihos Botnet Still at Work, Security Experts Say

    Updated: 2012-03-30 16:06:48
    While Kaspersky, Dell and others may have disrupted the Kelihos, experts with Seculert and Damballa say cyber-criminals are still spreading the botnet. - Security researchers from Kaspersky Lab, Dell SecureWorks and other places generated a lot of headlines this week with their announcement that they had taken down a new version of the Kelihos peer-to-peer botnet. In a March 28 post on Kasperskys SecureList blog, Stefan Ortloff, a security exper...

  • Boundary Hosts Network Monitoring Service

    Updated: 2012-03-30 14:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations—including cloud computing , virtualization , security , mobility and data

  • Tomorrow, the world will end, (Fri, Mar 30th)

    Updated: 2012-03-30 10:29:50
    No, this isn't about the Mayan calendar, and that particular instance of End of the World&q ...(more)...

  • Yahoo Will Implement 'Do Not Track' Solution This Summer

    Updated: 2012-03-30 04:20:58
    The Internet giant joins the likes of Apple, Google and Microsoft in instituting the consumer privacy technology on their Websites. - Yahoo late this year will institute a quot;Do Not Track quot; policy across all its Websites, joining such companies as Apple, Microsoft, Google and Mozilla in giving online consumers a tool to limit the amount of personal information that is collected. Yahoo executives March 28 announced that use...

  • ISC StormCast for Friday, March 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2434, (Fri, Mar 30th)

    Updated: 2012-03-30 03:00:56
    ...(more)...

  • Nessus 5 On Demand Training Now Available

    Updated: 2012-03-29 19:12:51

  • The BYOD Security Dilemma

    Updated: 2012-03-29 18:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations—including cloud computing , virtualization , security , mobility and data

  • 5 Secure Switch Management Best Practices

    Updated: 2012-03-29 14:01:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations—including cloud computing , virtualization , security , mobility and data

  • EventSentry - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring

    Updated: 2012-03-29 09:59:59
    EventSentry was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. GFI EventsManager and ManageEngine EventLog Analyzer were runner-up and second runner-up respectively.

  • ISC StormCast for Thursday, March 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2431, (Thu, Mar 29th)

    Updated: 2012-03-29 03:45:58
    ...(more)...

  • Adobe Flash Player APSB12-07 - 28 March 2012, (Wed, Mar 28th)

    Updated: 2012-03-28 20:45:38
    Adobe released a critical update today for Flash Player. The basic gist is that most of ...(more)...

  • Exploitability in Context

    Updated: 2012-03-28 17:31:48
    Every year there are literally tens of thousands of new vulnerabilities discovered across the various software and hardware technologies we rely upon every day. Simple math would seem to dictate an impossible task to manage all of these vulnerabilities and to make the real-world, priority-based decisions on them. Vulnerability management is one thing, but for [...]

  • iPhone Passcodes Can Be Cracked as Quickly as XRY

    Updated: 2012-03-28 15:55:36
    Micro Systemations XRY app can crack passcodes for iPhones and Android devices within minutes, and is being used by a growing number of law enforcement agencies. - The four-digit password on Apples iPhone is no match for Micro Systemations XRY application. The password on the popular smartphone can probably keep a regular person who finds the device from breaking into it. However, the software from the Swedish company, which it sells to law enforcement ag...

  • Howto: SQL Injection Using MySQL LOAD_FILE() and INTO OUTFILE()

    Updated: 2012-03-28 10:33:00
    <a href="http://feedads.g.doubleclick.net/~a/HGW4SBP4NeaXHUYtK7QO2r31GXc/1/da"

  • Howto: Sending an ARP from scapy

    Updated: 2012-03-28 10:29:00

  • Johnny - GUI for John the Ripper

    Updated: 2012-03-28 10:08:00
    </p

  • Apple Safari on iOS 5.1 - Adressbar spoofing vulnerability

    Updated: 2012-03-28 09:55:00

  • Myths of Securing Windows Desktops (Part 2)

    Updated: 2012-03-28 04:00:07
    In part two of this article about Securing Windows desktops, the author discusses endpoint firewalls, data protection, and whitelisting of applications as to make sure that readers are fully aware of the capabilities and limitations of each security solution.

  • ISC StormCast for Wednesday, March 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2428, (Wed, Mar 28th)

    Updated: 2012-03-28 03:47:34
    ...(more)...

  • Network Security Podcast, Episode 271

    Updated: 2012-03-28 01:44:03
    Since Rich is on the road this week, Martin and Zach are joined by none other than friend of the podcast, Josh Corman.  Which is not that surprising, since there’s only one story we’re talking about tonight, the latest Verizon Data Breach Investigation Report.  There’s a lot to talk about again in this year’s report, [...]

  • Opera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/, (Tue, Mar 27th)

    Updated: 2012-03-27 23:53:38
    ...(more)...

  • Wireshark 1.6.6 and 1.4.2 Released, (Tue, Mar 27th)

    Updated: 2012-03-27 23:51:55
    Wireshark released today version 1.6 ...(more)...

  • ISC Feature of the Week: ISC Poll, (Tue, Mar 27th)

    Updated: 2012-03-27 21:56:54
    Overview Your vote counts!The ISC Poll https://isc.sans ...(more)...

  • Facebook Passwords, Information Need to Be Kept Private

    Updated: 2012-03-27 21:15:53
    NEWS ANALYSIS: U.S. Senators Charles Schumer and Richard Blumenthal say asking for social media passwords may be a violation of federal law. For job applicants and employers, this could open a potential legal minefield. - The recent practice of employers and would-be employers requesting Facebook and other social network log-in information is probably a violation of equal employment laws, say two Senators. U.S. Senators Charles Schumer (D-N.Y.) and Richard Blumenthal (D-Conn.) have asked the U.S. Equal Employment...

  • LulzSec Group Claims Hack of Military Singles Website

    Updated: 2012-03-27 18:24:35
    Three weeks after five alleged members of LulzSec were arrested, hackers claiming the LulzSec banner say they attacked a Website for military singles. - A hacker group using the name quot;LulzSec quot; is claiming responsibility for breaking into the database for a Website for single members of the military over the weekend. According to a post on the blog site Pastebin.com March 25, hackers using the names quot;LulzSec quot; and quot;Lul...

  • FTC Privacy Report Is Drawing Praise, Criticism

    Updated: 2012-03-27 16:39:32
    Consumer advocacy groups applauded the FTCs report, though some question if it goes far enough. Industry groups say the recommended policies would stifle innovation. - The Federal Trade Commissions report calling for a combination of federal laws and self-policing among companies to protect online user privacy is drawing cautious praise from consumer advocacy groups, though some claimed the suggestions do not go far enough in establishing safeguards. At the s...

  • AVG Launches Security BootCamp for Small Businesses

    Updated: 2012-03-27 13:53:53
    The online program tests business owners across eight installments with different security themes. - Web and mobile security specialist AVG Technologies launched SMB BootCamp, a free, online mix of video clips and Web content divided into eight weekly themed installments, each with a short, multiple-choice questionnaire that must be completed correctly in order to qualify for the next stage. Th...

  • Monday

    Updated: 2012-03-27 08:08:22
    via lh6.googleusercontent.com Ouch. Posted via email from danielmiessler.com | posterous Related ContentDucks in WaterThe First Result When Googling SantorumYouTube Downloader | Chrome Web StoreWho the Hell is AirSage?The Happiness Process

  • Robots and Jobs

    Updated: 2012-03-27 06:28:24
    This fascinating article explores the very real issue of the rise of robotic technology and how it will affect the job market in coming years and decades. I feel the content rambles a bit, and fails to properly summarize, but it’s great stuff overall. Here’s my summary of the current jobs situation, within the context [...]

  • Selling my Previous MacBook Pro

    Updated: 2012-03-27 06:05:10
    [ 27.03.12: Sold within one day. Thanks everyone. ] I am currently selling my previous MacBook Pro that is in great condition with the following specs: 2010 Model 15″, 1400×900 2.8 GHz Core 2 Duo 8GB 1067 MHz DDR3 256GB SSD Drive I just reformatted it, put 10.7.2 on it, and it’s ready to go. [...]

  • The Bible is Awesome | Bad Astronomy

    Updated: 2012-03-27 05:32:19
    via blogs.discovermagazine.com Bible: 0, Universe: 1 Posted via email from danielmiessler.com | posterous Related ContentTry a BookThis is my Favorite PictureA Digital IO WorkflowInteractive Animation Brings Starry Night to LifeBrowser Combat

  • Bike Parkour

    Updated: 2012-03-27 05:25:33
    Um… Related ContentCultivating Gratefulness | TED‪Java TrailerMagnet Through Copper PipeiZON Remote Home MonitoringThe #1 Life Improvement

  • FTC Calls on Congress to Pass Consumer Privacy Laws

    Updated: 2012-03-27 04:11:56
    In its final report, the agency urged companies to police themselves, but said government intervention is also needed. - The Federal Trade Commission is putting pressure on both Congress and tech companies to take actions to protect user privacy and give them more information on how their personal data is collected and used. In its final report, released March 26, the FTC takes aim at vendors whose mobile devices...

  • ISC StormCast for Tuesday, March 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2425, (Tue, Mar 27th)

    Updated: 2012-03-27 02:40:33
    ...(more)...

  • IBM: The Good and Bad About Internet Security

    Updated: 2012-03-26 21:04:06
    : IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews IBM : The Good and Bad About Internet Security

  • What is a Data Breach? Definition, Costs & Security Around Data Breaches

    Updated: 2012-03-26 18:19:41
    In addition to bringing you the latest in AppSec research and news in this blog, we will begin presenting short educational briefings on key subjects within the application security space. We hope you will enjoy and learn from these short posts. We value your opinion, so please let us know if there are any concepts [...]

  • Microsoft Targets Zeus Botnets With Financial Services Partners

    Updated: 2012-03-26 16:10:05
    IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews Microsoft Targets Zeus Botnets With Financial Services Partners

  • Starting a Book

    Updated: 2012-03-26 06:15:45
    I’ve known for many years now that I’d write books one day, but even up to just a few months ago I thought my first book would come years from now. But something has changed my mind: perhaps the overwhelming ignorance I’ve seen around the current election cycle, or maybe something else. But I think [...]

  • Job seekers getting asked for Facebook Credentials | Boston.com

    Updated: 2012-03-26 04:58:00
    Bassett, a New York City statistician, had just finished answering a few character questions when the interviewer turned to her computer to search for his Facebook page. But she couldn’t see his private profile. She turned back and asked him to hand over his login information.Bassett refused and withdrew his application, saying he didn’t want [...]

  • Game of Thrones Recap Video

    Updated: 2012-03-26 04:33:27
    via youtube.com Posted via email from danielmiessler.com | posterous Related ContentGame of Thrones Violin Rock CoverAn Inspirational VideoNew Headz Up App | SNLA Creative SongSeriously Fast Lyrics

  • Branson on Delegation | The Next Web

    Updated: 2012-03-26 00:52:32
    Delegation was the first skill I was forced to learn when I made the jump from a technical to a managerial position. These were the toughest times for me. I’m a geek and being in control of everything (to the finest detail) defines me. Not only that, but since I can pick up skills quickly, [...]

  • Facebook Pushes Back Against Employers Wanting Passwords

    Updated: 2012-03-24 14:14:12
    Facebook is officially pushing back against employers who want job applicants' Facebook passwords. - Facebook, perhaps anxious to avoid public controversy as it prepares for a much-publicized initial public offering, is moving to squelch a widely reported practice of employers asking job applicants for their Facebook passwords. “If you are a Facebook user, you should never have to share your pass...

  • Verizon Data Breach Report Offers Scary Truths About Security

    Updated: 2012-03-24 14:13:52
    NEWS ANALYSIS: The Verizon study finds that the best way to prevent data breaches is not expensive or new, but rather simple. The fact that businesses dont adhere to good security practices is more frightening than the breaches themselves. - Verizons annual quot;Data Breach Investigations Report quot; includes some sobering findings that show just how pervasive social and political hacking has become. So-called “hacktivism” was responsible for 58 percent of all data stolen in 2011. Nearly 80 percent of attacks were opportunistic, ...

  • How to Get a Raise | The Register

    Updated: 2012-03-23 04:35:07
    You’re not getting paid as well as you should. I know this not only because you’re bothering to read this, but also because most techies are crap at extracting cash from their employers. It shouldn’t shock you too much to learn that I, as a City headhunter and former contractor, focus quite hard on money [...]

  • Tennessee legislature boldly sets the science clocks back 150 years | Bad Astronomy | Discover Magazine

    Updated: 2012-03-23 04:34:18
    Basically, the bill will make sure teachers can discuss creationism in the classroom, as well as global warming denialism. The House version states, This bill prohibits the state board of education and any public elementary or secondary school governing authority, director of schools, school system administrator, or principal or administrator from prohibiting any teacher in [...]

  • The Innate Nature of Sexuality

    Updated: 2012-03-23 03:19:45
    I find the whole cloud of hush around the origins of sexuality to be fascinating, as it reeks to me of political correctness (see: sensitivity-based truth avoidance). Basically, because it’s such a charged topic (and therefore obscured from direct study) I continue to try to model the matter. This story from The Atlantic today gives [...]

  • Female Chimps Play With Stick Dolls | Discovery News

    Updated: 2012-03-23 02:18:51
    Female chimpanzees treat sticks and small logs as dolls by cuddling them, creating games and even putting them to bed, new research finds. Since young male chimps were less inclined to play dollies, the authors say their study presents the first evidence of an animal species in the wild in which play differs between males [...]

  • Enhanced Botnet Detection with Nessus

    Updated: 2012-03-22 18:44:32

  • Tube Plane | Scott Adams

    Updated: 2012-03-22 17:23:03
    My idea is that the entire passenger cabin would be separate from the rest of the plane, like a shotgun shell waiting to be put in the shotgun. Passengers would take their seats in the cabin “tube,” located in the airport terminal. When the airplane arrives, it lines up with the terminal and smoothly ejects [...]

  • Nmap 5.61TEST5 : Major Update

    Updated: 2012-03-22 15:41:04
    We’ve been working hard for the last 2 months since 5.61TEST4, and I’m pleased to announce the results: Nmap 5.61TEST5. This release has 43 new scripts, including new brute forcers for http proxies, SOCKS proxies, Asterisk IAX2, Membase, MongoDB, Nessus XMLRPC, Redis, the WinPcap remote capture daemon, the VMWare auth daemon, and old-school rsync. Better [...]

  • In Configuration We [Still] Trust

    Updated: 2012-03-22 15:13:03
    It has been roughly a year since we released our original paper titled “In Configuration We Trust.” The goal of that research was to try to draw awareness to the fact that a lot of security improvement can be made simply by how you architect your network and configure your operating systems and applications. These [...]

  • Verizon Data Breach Investigative Report 2012 – Application Security Specific Highlights

    Updated: 2012-03-22 13:06:23
    Verizon just released its 2012 Data Breach Investigative Report which contains findings contributed by global agencies such as the U.S. Secret Service, the Dutch High Tech Crime Unit, the Irish Reporting and Information Service, the Australian Federal Police and the London Metropolitan Police. I thought it would be good to put together a quick summary [...]

  • Neil deGrasse Tyson on the Death of American Dreams

    Updated: 2012-03-22 08:30:35
    via youtube.com This guy is a treasure. Posted via email from danielmiessler.com | posterous Related ContentNeil deGrasse Tyson on the Meaning of Life | RedditNeil deGrasse Tyson’s Reddit AMADavid Simon on the End of the American EmpireNew Headz Up App | SNLA Creative Song

  • Soul Food | Key & Peele

    Updated: 2012-03-22 08:16:54
    via youtube.com If you’re not watching Key and Peele you’re f’ing up by the numbers. Trust. Believe. Posted via email from danielmiessler.com | posterous Related ContentHow Not to Do a PresentationSeriously Fast LyricsA Creative SongWicked Table Tennis Points from Recent TournamentsNew Headz Up App | SNL

  • Game of Thrones Violin Rock Cover

    Updated: 2012-03-22 08:06:44
    via youtube.com A phenomenal cover of a phenomenal piece of music. Posted via email from danielmiessler.com | posterous Related ContentGame of Thrones Recap VideoPhenomenal Speech by a War VeteranNew Headz Up App | SNLExit Music (For A Film) – Radiohead (Cover)Seriously Fast Lyrics

  • Chris Wysopal writes about Static Analysis in The Testing Planet

    Updated: 2012-03-21 13:07:50
    Chris Wysopal recently authored an article detailing static analysis that was featured in The Testing Planet. “What is Static Analysis?” provides a comprehensive and in depth yet understandable explanation of the ins and outs of static testing. Using graphics and examples of code, Chris begins with the loading phase and travels through the Application Modeler, [...]

  • Identity (Management) Crisis (Part 4): Selecting a Comprehensive Identity Management solution

    Updated: 2012-03-21 09:00:08
    In this, Part 4, we'll look more closely at the criteria for choosing a comprehensive identity management solution for an organization or a federated identity management solution.

  • The Available Plugins Of Ettercap

    Updated: 2012-03-19 13:52:00

  • Check the addons of Chrome by kkotowicz

    Updated: 2012-03-19 13:49:00

  • Smart Scapy By Lacofa

    Updated: 2012-03-19 06:48:00

  • RDP Honeypot on Amazon EC2 Virtual Server

    Updated: 2012-03-19 06:39:00

  • Secure your vps by _St0rm

    Updated: 2012-03-18 09:49:00

  • All posts that I got about Exploit RDP(MS12-020) in couple days ago.

    Updated: 2012-03-17 13:01:00

  • Missed it Live? On Demand March VEF Now Available + Live Q&A Answered

    Updated: 2012-03-15 19:10:23
    Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick. Additionally, find this month’s Security Bulletin here, a list of all the Audit IDs here, and the PDF of the presentation here.  If you have additional questions not [...]

  • Patching is Still a Challenge? Yup.

    Updated: 2012-03-14 16:53:59
    eEye has always taken a “zero gap” approach to our threat management product strategy. That thinking has been the driver for our market firsts in support for new technologies such as cloud, mobile, and virtualization vulnerability management. These new technologies bring tremendous benefits, but they also bring risks with them as well, which must be [...]

  • Myths of Securing Windows Desktops (Part 1)

    Updated: 2012-03-14 07:00:01
    In this article the author discusses two of the areas that you will need to solve: Anti-virus and privilege management.

  • Microsoft Patch Tuesday – March 2012

    Updated: 2012-03-14 03:55:59
    March – the month that brings us spring training, NCAA March Madness, Pi Day, and St. Patrick’s Day (including the requisite Shamrock Shake). To go along with these exciting events, Microsoft has chipped in with six security bulletins for the March edition of Patch Tuesday. By now, hopefully everyone realizes that DLL hijacking affects a [...]

  • Network Security Podcast, Episode 270

    Updated: 2012-03-14 02:13:29
    It’s a good thing we’ve started double-checking Rich’s work, because he hasn’t been that reliable as of late.  Luckily Martin is recording this week, so the audio quality is back to it’s normal levels, but that means the content is back to normal levels as well.  Which actually turns out to be a good thing, [...]

  • Install Vanguard - Web Penetration Testing Tools

    Updated: 2012-03-10 03:02:00

  • KARMA on the Fon and Sniffing Wireless Network Traffic with Ubuntu – Step by Step

    Updated: 2012-03-10 02:43:00

  • nmap and another program via tor tunnel by darryn van tonder

    Updated: 2012-03-10 02:37:00

  • Interesting Vulnerability (2012-03-09)

    Updated: 2012-03-09 09:25:00

  • Test IDS By PredragTasevski.com

    Updated: 2012-03-07 14:09:00
    <img src="http://feedads.g.doubleclick.net/~a/4-7IVlSp4Gal66P4SlvwdV31vdc/1/di" border="0" ismap="true"

  • Security Considerations for Cloud Computing (Part 2)

    Updated: 2012-03-07 06:00:14
    In this article, we'll introduce the idea of thinking about private cloud security within the context of each of the five essential characteristics that define a cloud-based solution.

  • Active and Passive Auditing of DNS Servers in Use – Finding DNSChanger Malware

    Updated: 2012-03-05 15:00:00

  • RSAC 2012 Microcast: SecureWorks

    Updated: 2012-03-05 14:01:14
    Dell SecureWorks Chief Technology Officer Jon Ramsey took a few minutes out of his day at the RSA Conference to talk to me about a new study his team had recently written on series of attacks they dubbed Sin Digoo Affair.  In addition to being a detailed analysis of the tools and actions performed by [...]

  • RSAC 2012 Microcast: AlertLogic

    Updated: 2012-03-04 17:26:00
    My first interview this year at the 2012 RSA Conference was with Urvish Vashi from AlertLogic.  We talked briefly about the recent acquisition of ArmorLogic, but my real interest was the State of Cloud Security Report issued by AlertLogic.  It’s an interesting report and gives us some fuel for the debate about which is more [...]

  • Automated Audit using SQLMap By OWASP

    Updated: 2012-03-03 23:45:00

Current Feed Items | Previous Months Items

Feb 2012 | Jan 2012 | Dec 2011 | Nov 2011 | Oct 2011 | Sep 2011