• CapLoader Video Tutorial

    Updated: 2012-04-30 15:35:00
    Below is a short video tutorial showing some of the cool features in CapLoader 1.0. The functionality showed in the video includes: Loading multiple pcap files into a single flow view Port Independent Protocol Identification (PIPI) Fast extraction of packets related to one or several flows Exportin[...]

  • Feds Greatest Security Fear? Hacktivists!

    Updated: 2012-04-30 12:46:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations—including cloud computing , virtualization , security , mobility and data

  • Permanent Reverse Backdoor for IPhone / IPad By CoreSec

    Updated: 2012-04-30 08:38:00

  • Symantec: Attacks Rose While Vulnerabilities Fell in 2011

    Updated: 2012-04-30 05:35:09
    Googles Android OS, due to its open nature, became a favored target of cyber-criminals, according to Symantec. - The number of malicious and Web attacks continued to grow rapidly in 2011, with mobile platforms like Googles Android operating system increasingly becoming key targets of cyber-criminals, according to security software vendor Symantec. In their annual Internet Security Threat Report, released Apri...

  • Great Song, Great Video

    Updated: 2012-04-30 04:03:38
    ,

  • Gamification of Tasks That Require Self-discipline is a Mistake

    Updated: 2012-04-30 03:45:24
    Gamification is a trend in technology right now where people are given micro rewards for accomplishing discrete tasks, such as completing a programming exercise, or completing an online profile, etc. It’s essentially a way to incentivize things that people don’t want to do. And now one idea is to do it for homework. So, giving [...]

  • Who's tracking phone calls that target your computer? Stay Tuned to the ISC, (Sun, Apr 29th)

    Updated: 2012-04-30 03:43:44
    The story I am about to tell is similar to the diaries posted by Rob VandenBrink in July 2010, ...(more)...

  • FCC posts Enquiry Documents on Google Wardriving , (Mon, Apr 30th)

    Updated: 2012-04-30 03:00:32
    Remember back in 2010, Google was in hot water for some wardriving activities, where personal inform ...(more)...

  • Webfight and Burp Logs

    Updated: 2012-04-30 02:49:42
    Related ContentReal-world Wrestling and Jits vs. Asshat with Tapout ShirtGoogle RefineSteve Martin Doing the Atheist HymnalThe Sickest Light Show I’ve Ever SeenHitler Game Show

  • ISC StormCast for Monday, April 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2500, (Mon, Apr 30th)

    Updated: 2012-04-30 02:36:00
    ...(more)...

  • Simple Desks

    Updated: 2012-04-30 02:33:20
    Related ContentMarriage in the BibleThis Shouldn’t Be FunnyTeach the ControversyThis is a Real Help Desk TicketVoting Republican

  • An Impromptu Lesson on Passwords .., (Mon, Apr 30th)

    Updated: 2012-04-30 02:10:21
    I was reading the other night, which since I've migrated my library means that I was on my iPad. My ...(more)...

  • Hotmail, AOL and Yahoo Password Reset 0Day Vulnerabilities

    Updated: 2012-04-29 05:10:00

  • ISC Feature of the Week: Handler Created Tools, (Fri, Apr 27th)

    Updated: 2012-04-27 21:02:12
    Overview A couple of weeks ago we learned about the handlers at https://isc.sans ...(more)...

  • VMware Code Leak Highlights Security Concerns Around Virtualization

    Updated: 2012-04-27 18:14:17
    The hacker who posted the code from VMwares ESX hypervisor on the Internet has said more code will be leaked, though VMware is downplaying the risk to customers. - The leaking of VMware hypervisor source code onto the Internet is turning attention again to the issue of security in virtualized environments. VMware officials this week confirmed that some source code from the companys ESX hypervisor technology and written commentary from software programmers wer...

  • VMware’s Lost Source Code: Not A Panic Situation

    Updated: 2012-04-27 16:00:00
    : Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Mike Fratto Bio Archive Mike Fratto Network Computing Editor Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations—including

  • Network the ‘Next Big Thing’ For Virtualization?

    Updated: 2012-04-27 16:00:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations—including cloud computing , virtualization , security , mobility and data

  • Skype user IP-address disclosure

    Updated: 2012-04-27 14:56:00

  • Ron Gula on Why Tenable Fits the U.S. Department of Defense

    Updated: 2012-04-27 14:49:08
    : . Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Mobile Device Security Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars

  • Microsoft has added MSSQL 2008 R2 SP1 to the list of affected software for MS12-027 (Thanks Ryan). More info here -- http://technet.microsoft.com/security/bulletin/ms12-027, (Fri, Apr 27th)

    Updated: 2012-04-27 09:24:19
    ...(more)...

  • 83% of repubilcans voted for cispa while only 23% of democracts voted for CISPA

    Updated: 2012-04-27 07:19:38
    http://www.reddit.com/r/politics/comments/supxt/83_of_repubilcans_voted_for_c… Sent from my mobile device; please forgive any brevity or errors. Posted via email from danielmiessler.com | posterous Related ContentChild of a republican here: I get it now. | RedditIn 1986 Reagan “lowered” taxes, but in order to offset the reduced income with his huge increase in defense spending, he enacted a tax on [...]

  • ISC StormCast for Friday, April 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2497, (Fri, Apr 27th)

    Updated: 2012-04-27 03:20:20
    ...(more)...

  • Critical Unpatched Oracle Vulnerability, (Fri, Apr 27th)

    Updated: 2012-04-27 02:27:42
    Oracles April Critical Patch Update listed a vulnerability in the TNS Listener services ...(more)...

  • Veracode Claims ‘Information Security Product of the Year’

    Updated: 2012-04-26 17:11:09
    We are extremely excited to announce that the Veracode Platform has been chosen as SC Magazine’s Information Security Product of the Year. The award was in recognition of the company’s innovative Veracode Platform and the significant business and technical advantages it has brought to companies investing in the technology. The SC Awards are widely recognized [...]

  • Define Irony: A medical device with a Virus?, (Thu, Apr 26th)

    Updated: 2012-04-26 16:51:21
    Information Week [1] is running a piece on FDA Checks of Medical Hardware. After some review ...(more)...

  • Compliance Auditing with Microsoft PowerShell

    Updated: 2012-04-26 15:20:35
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Mobile Device Security Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars Whitepapers

  • Google Apps Platform Users Cite Data Security as Biggest Concern

    Updated: 2012-04-26 10:40:02
    One-quarter of survey respondents in organizations with more than 200 workers listed security and privacy as their primary concerns. - Cost is not the most important factor in the decision to adopt Google Apps, Googles cloud messaging and collaboration platform, according to a survey of Google Apps administrators in small and midsize businesses. While price was a consideration, survey respondents said the ability to collaborate eff...

  • Dome9 Security Introduces Cloud Server Secure Access

    Updated: 2012-04-26 10:36:01
    The Dome9 Chrome App, enabling secure access to servers and clouds for Google Chrome users, is available at the Chrome Web Store for free. - Dome9 Security, a provider of cloud security firewall management for public and private clouds, as well as for dedicated and virtual private servers, announced the availability of Instant Access for Google Chrome, a new browser-based application enabling one-click secure access to servers and clouds...

  • Kaspersky Enterprise Space Security - Voted WindowSecurity.com Readers' Choice Award Winner - Anti Virus

    Updated: 2012-04-26 10:00:03
    Kaspersky Enterprise Space Security was selected the winner in the Anti Virus category of the WindowSecurity.com Readers' Choice Awards. avast! Server Edition and McAfee VirusScan Enterprise were runner-up and second runner-up respectively.

  • Facebook Teams Up With Microsoft, Symantec, Others on Antivirus Marketplace

    Updated: 2012-04-26 04:11:04
    Facebook is giving users access to free downloads of anti-malware software, and trading URL blacklists with its partners, which also includes McAfee, Sophos and Trend Micro. - Facebook officials are launching a site on their social network aimed at making their 900 million-plus users and their systems more secure. Facebook, in partnership with Microsoft, McAfee, Symantec, Trend Micro and Sophos, on April 25 announced the Antivirus Marketplace, where users can download fr...

  • Tor Browser on iOS

    Updated: 2012-04-26 01:03:00

  • Apple 10 Years Behind Microsoft in Security: Kaspersky

    Updated: 2012-04-25 21:26:24
    The CEO of the security software vendor says that the number of attacks on Macs will only grow, and Apple will have to learn to respond more quickly. - Apple is at least a decade behind Microsoft when it comes to dealing with malware attacks and security, and the recent Flashback attack on Macs only highlights the problems facing the systems maker, according to the founder of security software vendor Kaspersky Lab. In an interview with Computer Bu...

  • Microsoft: Conficker Worm Continues to Plague Enterprises

    Updated: 2012-04-25 18:04:59
    In its latest Security Intelligence Report, Microsoft says weak passwords and unpatched systems conspire to let the three-year-old Conficker worm continue to propagate. - The notorious Conficker worm, which began infecting Windows systems in 2008 but has not had a new variant in more than two years, continues to dog enterprises more than three years later, according security experts at Microsoft. For the past two-plus years, Conficker has remained the top malware th...

  • Video: Windows Local Password Policy

    Updated: 2012-04-25 08:00:24
    This video demonstrates the process of configuring Windows local password policy through Active Directory policies.

  • One in Five Macs Infected With Malware: Sophos

    Updated: 2012-04-25 04:11:45
    A survey by the security software vendor found that 20 percent of Macs are infected with Windows malware, and 2.7 percent carry Mac malware. - One in every five Apple Macs is infected with malware, according to a survey by security software firm Sophos. And the malware on the Macs is a combination of both Windows and Mac threats, Graham Cluley, senior technology consultant for Sophos, said in an April 24 post on the companys NakedSecurity...

  • Network Security Podcast, Episode 272 v2

    Updated: 2012-04-25 01:30:22
    As a follow up to last week’s episode, Martin was joined last week by Josh Corman to talk to Wade Baker about the 2012 Verizon Data Breach Investigation Report.  Wade talks to us about how the information for the report was gathered, some of the strengths and weaknesses of the analysis and finally how the amazing puzzle [...]

  • Google Ups Bounty for Security Flaws to $20,000

    Updated: 2012-04-24 19:59:10
    The search giant is looking to encourage security pros and hackers who find vulnerabilities in Google products to seek the companys reward rather than sell them elsewhere. - Google is increasing the amount of money its willing to pay to security researchers, hackers and others who find security holes in the search giants products. Now people who find flaws or bugs and report them to Google rather than sell them on the market can get up to $20,000, a significant jump ov...

  • New Mac Flashback Malware Variant Detected by Intego

    Updated: 2012-04-24 14:48:02
    The new variant, which exploits the same Java flaw as previous versions, is the latest indication that the malware's threat has not abated. - The Mac Flashback malware continues to haunt users, with a new variant recently found in operation, according to Mac security software vendor Intego. The new variant, Flashback.S, uses the same vulnerability in Java that the previous versions had exploited, but it operates in a slightly different w...

  • Increasing Encryption Deployments ... The Response to Compliance Regulations

    Updated: 2012-04-24 05:29:20
     Dear Friends, please join me on Thursday, April 24, 2012 at 2 PM EST where I will be speaking about the usage of encryption and how it has been evolving

  • Mac Flashback Malware Still Going Strong, Security Experts Say

    Updated: 2012-04-23 15:56:25
    Despite some estimates that the number of infected Macs has dropped to 30,000, Dr. Web and others say that number is still likely more than 600,000. - Security experts looking at the Flashback malware that had infected hundreds of thousands of Apple Macs worldwide are trying to come to an agreement over how many of these systems are still compromised by the exploit. Earlier this month, Internet security companies Kaskpersky Lab and Dr. Web, a sma...

  • Tenable Selected for DISA’s ACAS Vulnerability Management Solution

    Updated: 2012-04-23 15:49:39
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Mobile Device Security Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars Whitepapers

  • Anonymous the Biggest Security Worry in IT, Bit9 Survey Says

    Updated: 2012-04-23 05:06:51
    However, respondents say the biggest risks are in attacks from cyber-criminals or nation-states, like Russia and China, the company found. - The hacker group Anonymous seems to be getting into the heads of IT professionals, according to a new survey by security software vendor Bit9. The quot;Bit9 2012 Cyber-Security Survey, quot; released April 23, found that while 61 percent of the 1,861 IT enterprise security professionals who respon...

  • Nmap script for "Detect Internet Connection Sharing"

    Updated: 2012-04-23 01:38:00

  • WordPress Vulnerabilities and How to Fix Them

    Updated: 2012-04-22 17:15:00

  • An Interesting View on Feminism

    Updated: 2012-04-22 01:29:46
    Posted via email from danielmiessler.com | posterous Related Content29-year-old Deaf Woman Hears For First Time Using Hearing ImplantNew Headz Up App | SNLSeriously Fast LyricsA Creative SongAn Intro to Dubstep

  • Marquese Scott: The Best Dancer I’ve Ever Seen

    Updated: 2012-04-21 20:34:34
    :

  • Documenting Chinese Commercial Espionage | Heritage.org

    Updated: 2012-04-20 23:48:16
    This adds up to a disturbing conclusion: China’s manufacturing rise has been illegally aided. Many advances are certainly due to the PRC’s own strengths; others stem from voluntary cooperation by foreign partners. But it is all too easy to find examples of Chinese theft that correspond well to spurts in manufacturing capability in advanced electronics, [...]

  • Call it Genius. Our Smart Groups Make Vulnerability Management Simple for Security Teams

    Updated: 2012-04-20 17:27:07
    eEye R&D has been hard at work on optimizing how our enterprise clients can manage and schedule assessments within Retina CS. These efforts will increase the efficiency of how our clients perform assessments across their IT infrastructure – be it their traditional server or desktop assets, or new technologies like mobile, virtual and cloud. In [...]

  • AT&T Wireless Bill Turned Malicious

    Updated: 2012-04-20 16:52:01
    Everyone dreads paying their wireless bill, but imagine getting a wireless bill for over $1600 dollars! This latest threat does just that, sending you a wireless bill for an exorbitant amount pushing you to click the link in the email and find out what happened with your bill. Any links in the email redirect the user to malicious distribution points dishing out exploits for Microsoft and Adobe vulnerabilities. The cybercriminals pervading this threat do an excellent job of spoofing legitimate AT&T wireless bill notifications. The image below (click to enlarge) shows both the real and fake notifications for comparison.

  • Weekly News Roundup

    Updated: 2012-04-20 16:34:15
    Happy Friday readers! There was certainly no shortage in security news this week, here are our picks for the top headlines: Mac OS X Malware: “Mac OS X Pummeled By Yet Another Trojan” by Stefanie Hoffman (@FortiGuardLabs). This post from the Fortinet blog covers a huge topic from this past week’s headlines – Mac OS [...]

  • Readers' Choice Awards Yearly Round Up 2011

    Updated: 2012-04-19 09:00:06
    The winning solutions for the 2011 Readers' Choice awards.

  • Web Application exploitation - a cheatsheet By Tim Arneaud

    Updated: 2012-04-19 05:37:00

  • The Graph All High School English Teachers Should Mount in Their Classrooms

    Updated: 2012-04-18 16:03:53
    [ The graph's x-axis shows the GSS WORDSUM score, which is a vocabulary-based intelligence proxy (correlated at .71). The y-axis shows percentage of people with that score. ] Given how little Americans value education today I think it’s a good idea to empirically demonstrate to our youth that intelligence (as proxied by vocabulary) does actually [...]

  • Chris Wysopal on Application Security at RSA 2012

    Updated: 2012-04-18 15:18:00
    At RSA this year, Howard Anderson, News Editor for the Information Security Media Group interviewed Chris Wysopal, Veracode CISO and Co-Founder. In the interview, Chris talked about application security, the future of AppSec, and what he believes to be the next major hot topic in this space. Chris also outlined why organizations now need their [...]

  • My website in mobile version by Dudamobile

    Updated: 2012-04-18 14:46:00

  • Something to think on from Source Boston

    Updated: 2012-04-18 14:26:19
    “The Internet will never again be as free as it is this morning” – Dan Geer at SOURCE Boston Think on that for a while.  If it doesn’t scare you, it should. Update:  Here’s the full text of Dan Geer’s talk at SOURCE Boston

  • Identity (Management) Crisis (Part 5): The Future of Identity Management Identity in the Cloud

    Updated: 2012-04-18 07:00:06
    In this, part 5, we'll discuss the future of identity management with a special focus on the effect of the cloud on IDM.

  • 10 Interesting Data Points on IQ and Demographics

    Updated: 2012-04-18 01:02:19
    Gene Expression recently put up a brilliant post showing data on the GSS‘s WORDSUM scores correlated to various demographic data points, such as educational attainment, political ideology, religious preferences, etc. From the post: A few years ago I put up a post, WORDSUM & IQ & the correlation, as a “reference” post. Basically if anyone [...]

  • Network Security Podcast, Episode 274

    Updated: 2012-04-18 00:36:36
    The gang is scattered to the wind.  Rich is off at some random Margaritaville and Zach is pretending he has a real life and a new job or something.  So Martin called out the cavalry and is joined tonight by none other than Dave Lewis, aka Gattaca on twitter (I bet many of you didn’t [...]

  • SecurityCenter 4.4 Released

    Updated: 2012-04-17 15:46:07
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Mobile Device Security Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars Whitepapers

  • Nessus Perimeter Service with New Tenable PCI Scanning Service Available

    Updated: 2012-04-17 15:31:16
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Mobile Device Security Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars Whitepapers

  • Monitor your bandwidth from the Linux shell

    Updated: 2012-04-17 06:29:00

  • Nessus 5.0.1 Released

    Updated: 2012-04-16 17:14:44
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Mobile Device Security Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars Whitepapers

  • Bay Bridge Lighting

    Updated: 2012-04-14 06:22:03
    via lh5.googleusercontent.com Posted via email from danielmiessler.com | posterous Related ContentMondayDucks in WaterThe First Result When Googling SantorumMy Varnish Study PieceYouTube Downloader | Chrome Web Store

  • Old Man In Nursing Home Reacts To Hearing Music From His Era

    Updated: 2012-04-14 03:39:25
    via youtube.com Touching. Posted via email from danielmiessler.com | posterous Related Content29-year-old Deaf Woman Hears For First Time Using Hearing ImplantSeriously Fast LyricsA Creative SongIf China Attacks America (A Must See)Hitler Finds Out There’s No iPhone 5

  • eEye’s Patch Tuesday Assessment Now Available On Demand

    Updated: 2012-04-13 21:48:19
    Miss our live VEF webinar earlier this week? In case you did, I’ve put all of the content together for you below. Enjoy! Additionally, access this month’s Security Bulletin, a list of all the Audit IDs, and the PDF of the presentation.  If you have additional questions you’d like to ask the research team about this month’s [...]

  • Weekly News Roundup

    Updated: 2012-04-13 15:56:09
    Happy Friday to all. Welcome to another edition of our Weekly News Roundup. Dennis Fisher of Threat Post reports on a breach of the Medicaid and Child Health Insurance Plan in Utah which lead to the leakage of personal information, including Social Security numbers of 181,000 individuals. The intrusion occurred after the Utah Department of [...]

  • This is why CISPA scares me

    Updated: 2012-04-13 04:12:52
    Unlike it’s brethren, SOPA and PIPA, CISPA doesn’t scare me because it’s aimed at shutting down piracy and giving the media companies unheard of powers. CISPA scares me because it is aimed at letting companies share information between each other and with the government in order to stop bad guys, which is a noble cause. [...]

  • NetworkMiner 1.3 Released

    Updated: 2012-04-12 22:55:00
    NetworkMiner 1.3 was released earlier today, and there was much rejoicing! HTTP Digest credentials from USCC's web_recon.pcap and hmi_web_recon.pcap Some of the features added to this new release of NetworkMiner include: Extraction of user names from HTTP Digest Authentication (RFC 2617), such as th[...]

  • How to Get a Good Cup of Coffee From Starbucks

    Updated: 2012-04-12 19:33:48
    Wagner’s music is better than it sounds. ~ Edgar Wilson Nye People tend to love Starbucks despite it tasting like it was brewed for three weeks in the center of the sun. Most mask this reality by ordering a coffee beverage instead of coffee, or by disguising the taste with biblical levels of additives. But [...]

  • Veracode Secures $30M in Additional Funding, Expands Exec Team

    Updated: 2012-04-12 17:45:47
    We are thrilled to announce that Veracode has secured an additional $30M in funding from Meritech Capital Partners and existing investors Atlas Venture, .406 Ventures and StarVest Partners. Our investment demonstrates our confidence in the market and is intended to accelerate Veracode’s already impressive growth” said Rob Ward, Managing Director at Meritech Capital Partners. Some [...]

  • Vulnerabilities, Exploits, and Good Dental Hygiene

    Updated: 2012-04-12 14:53:48
    : , , Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Continuous Monitoring Mobile Device Security Compliance Vulnerability Scanning Vulnerability Management Configuration Auditing Log Management SIEM SCADA Security Compliance Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Tenable Blog Webinars

  • March VEF Participant Wins a Kindle Fire

    Updated: 2012-04-12 00:51:22
    As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to [...]

  • What You Don't Know Can Hurt You: LAN Manager Might Be Supported

    Updated: 2012-04-11 07:00:06
    In this article the author gives a best practice walk through on how to set Active Directory, AD, domain, OU, Group Policy, LAN Manager, NTLMv2, authentication, protocol, SAMup your domain, organizational units, and Group Policy settings correctly.

  • Microsoft Patch Tuesday – April 2012

    Updated: 2012-04-11 06:38:03
    April is upon us, and for Patch Tuesday Microsoft delivered six security bulletins, patching a total of eleven vulnerabilities. MS12-027 is the most urgent, as Microsoft has rated it critical and has stated that there are targetted attacks leveraging this vulnerability – patch this one first. To go along with the spirit of security updates, [...]

  • At Least Double The NASA Budget — Currently 1/2 Cent Per Dollar

    Updated: 2012-04-10 23:55:33
    Currently, NASA’s budget barely surpasses 0.5 percent of the Federal budget, and has seen a steady decline in the proportions of its funding, now reaching all-time lows. The cultural mindset brought on by NASA has allowed us to reap the benefits of economic growth, creating an influx of people wanting to become scientists and engineers.There [...]

  • Network Security Podcast, Episode 273

    Updated: 2012-04-10 23:30:49
    Zach is off settling in to the new job and prepping for Source Boston, but Rich and Martin managed to get together to discuss travel, the latest security news, and Rich’s rant on the whole Mac malware thing.  And Martin apologizes to listeners for the mixup with episode 272. … Network Security Podcast, Episode 273, [...]

  • Why don’t Americans Walk More? | Slate Magazine

    Updated: 2012-04-10 21:43:04
    Carlin Robinson, 12, walks from her grandmother’s car to the school bus in Manchester, Ky. Her house can be seen in the background. A study published in 2010, investigating high obesity rates in the town found that residents used cars to minimize walking distance, to the detriment of their health. Photograph by Linda Davidson / The [...]

  • CIntruder - pentesting tool to bypass captchas.

    Updated: 2012-04-10 05:23:00

  • How Was Jesus’ Death a Sacrifice?

    Updated: 2012-04-09 15:15:19
    There’s one question I’ve never heard asked as part of an inquiry into Christianity: Why was Jesus’ sacrifice considered to be so significant? Let’s examine some facts. He came here to die, and knew it was going to happen. He knew it wouldn’t be permanent. He isn’t dead. You keep using the word “sacrifice”. I [...]

  • The “Existing Causes” Argument Against Free Will

    Updated: 2012-04-09 07:01:23
    Image from skeptically.org In my ongoing efforts to convince others that free will is an illusion, I have found an argument vector that I’ve not yet encountered: If you believe in cause and effect, i.e. that all outcomes are the result of previous conditions, and you accept that all causes existed before you were born, [...]

  • The Benefits of Web Server Optimization

    Updated: 2012-04-06 05:59:57
    Granted I’m only a couple hundred miles away from my datacenter for this test, but I am loading a fairly typical page of content here in 128ms. That’s pretty sick. We’re talking a tenth of a second for a full page load. Here’s how I did it. :: Related Content10 Ways to Test Your Website [...]

  • Network Security Podcast, Episode 272

    Updated: 2012-04-05 12:38:31
    As a follow up to last week’s episode, Martin was joined last week by Josh Corman to talk to Wade Baker about the 2012 Verizon Data Breach Investigation Report.  Wade talks to us about how the information for the report was gathered, some of the strengths and weaknesses of the analysis and finally how the amazing puzzle [...]

  • Security Considerations for Cloud Computing (Part 3) - Broad Network Access

    Updated: 2012-04-04 09:00:28
    In this, part 3 of our series, we'll discuss how the Broad Network Access characteristic of cloud computing introduces security issues that you need to address.

  • Fast analysis of large pcap files with CapLoader

    Updated: 2012-04-02 20:55:00
    Are you working with large pcap files and need to see the “whole picture” while still being able to quickly drill down to individual packets for a TCP or UDP flow? Then this is your lucky day, since we at Netresec are releasing our new tool CapLoader today! Here are the main features of CapLoader:[...]

Current Feed Items | Previous Months Items

Mar 2012 | Feb 2012 | Jan 2012 | Dec 2011 | Nov 2011 | Oct 2011