• Mac, Windows Malware Campaign Targets Uyghur Activists

    Updated: 2012-06-30 00:25:17
    Security pros have spotted a Mac Trojan and Windows malware being used separately in targeted attacks against political activists in Central Asia. - Researchers at Kaspersky Lab say Mac malware is being used in an advanced persistent attack targeting people supporting human rights for the Uyghur people in China. According to Kaspersky, victims are being hit with an email laced with a new, mostly undetected version of the MaControl backdoor ...

  • Praha Opening

    Updated: 2012-06-30 00:02:57
    via youtube.com Noteworthy. Posted via email from danielmiessler.com | posterous Related ContentNew Headz Up App | SNLSeriously Fast LyricsA Creative Song‘The Star Wars That I Used To Know’An Intro to Dubstep

  • Obamacare Basics

    Updated: 2012-06-29 22:19:36
    via upworthy.com It’s not single payer, but it’s a start. Posted via email from danielmiessler.com | posterous Related ContentGingrich Supporting ObamaCare in May 2009Andrew Sullivan on ObamaCare | The Daily BeastA Stunning ResumeAnother Approach to Weightlifting | Men’s HealthHere’s How Corporations Dodge Taxes [INFOGRAPHIC] | Mashable

  • Updated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx, (Fri, Jun 29th)

    Updated: 2012-06-29 20:51:15
    ...(more)...

  • Report: BYOD, Virtualization, Mobile Will Make 45% of Networks Obsolete by 2016

    Updated: 2012-06-29 19:21:00
    : , , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your

  • Weekly News Roundup

    Updated: 2012-06-29 16:48:50
    Lawyers smartening up with cybersecurity: ”Lawyers Get Vigilant on Cybersecurity“ by Jennifer Smith. Law firms are now beginning to see an increasing number of cyber attacks. With the use of mobile devices to handle deals and other confidential matters, firms are now starting to smarten up and lock down. Lawyers are being asked to encrypt messages, avoid [...]

  • Google Compute Engine Is No Threat to Amazon, Microsoft, RackSpace

    Updated: 2012-06-29 14:33:00
    , , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your

  • SQLMap Project Moved to Github

    Updated: 2012-06-29 06:20:49
    https://github.com/sqlmapproject/sqlmap Related ContentBuilding the Ideal 100-word Password ListSqlmap Plugin for BurpSuite | BugBlogA Reminder That You’re Not LivingThe Vim PedalSQLMap Gets Data Extraction Over DNS

  • “RADICAL OPENNESS” Jason_Silva

    Updated: 2012-06-29 03:08:32
    via vimeo.com Posted via email from danielmiessler.com | posterous Related ContentThis is About as Good as the World GetsDakotalapse of Earth’s SkyThe Color AppDigital DJ UIStrong Vim Fu

  • ‘The Star Wars That I Used To Know’

    Updated: 2012-06-29 02:58:31
    via youtube.com Posted via email from danielmiessler.com | posterous Related ContentSeriously Fast LyricsA Creative SongHow Not to Do a PresentationNew Headz Up App | SNLBMW Electric Concept Cars

  • A Republican Voting for Obama | Reddit

    Updated: 2012-06-29 02:54:08
    I am a registered Republican, and never voted for a Democratic president. I am prepared to vote for President Obama for his reelection and here’s why. I’ll try to make it fast. I was with Blue Cross and Blue Shield for the last two years, with insurance coverage for myself and my entire family. I [...]

  • ISC StormCast for Friday, June 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2635, (Fri, Jun 29th)

    Updated: 2012-06-29 02:20:36
    ...(more)...

  • McAfee, Guardian Uncover Crime Ring Bilking European Banks

    Updated: 2012-06-28 23:18:02
    Using automated transactions and better man-in-the-browser attacks, sophisticated online thieves have stolen at least 60 million Euros, according to McAfee and Guardian Analytics. - A group of sophisticated online thieves have modified two popular attack toolkits to help them succeed in a global crime spree, stealing at least 60 million Euros about $74 million U.S. dollars from European and South American banks, security firms McAfee and Guardian Analytics stated in a June 26 r...

  • Malware Kits Use Pseudo-Random Domain Generation to Thwart Security Fixes

    Updated: 2012-06-28 21:53:54
    Attack kits such as Blackhole are taking a page from botnet operators and utilizing pseudo-random domain generation to combat IT security industry efforts to disrupt attack campaigns. - Exploit kits are adopting a tactic more commonly found in botnet malware to make their attack campaigns more resilient–“pseudo-random domain generation.” Among the kits being associated with this activity is Blackhole, which has emerged as one of the most prevalent exploit kits in the wild. In a r...

  • ISC Feature of the Week: About the Internet Storm Center, (Thu, Jun 28th)

    Updated: 2012-06-28 19:15:23
    Overview Ever wondered when, how or why the Internet Storm Center started? Want to know what we do, ...(more)...

  • The 2013 BMW 5-Series Gets a Power Boost

    Updated: 2012-06-28 18:56:01
    Word from Car and Driver is that 2013 BMW 550i, 550i GT and 650i coupe and convertible models will all get the new engine, rated at 445 horsepower and 480 pound feet of torque. That’s a gain of 45 horsepower and 30 pound feet of torque compared to last year’s models, courtesy of BMW’s Valvetronic [...]

  • Google’s Bouncer Gets Roughed Up; Why You Should Care

    Updated: 2012-06-28 17:57:50
    With the increasing number of devices and applications in the enterprise, driven by the “consumerization of IT” and Bring Your Own Device (BYOD), companies are faced with the need for visibility as to what risk is being introduced to the enterprise. One might think this is a challenge the handset or mobile platform vendors are [...]

  • Burp 1.4.10 Gets JSON Request Support

    Updated: 2012-06-28 17:27:12
    Burp now fully supports JSON requests. These are properly handled by Intruder and Scanner, for automatic placement of attack insertion points, and syntax is correctly colorized in the message viewer: via releases.portswigger.net Posted via email from danielmiessler.com | posterous Related ContentSession Handling Improvements in Burp 1.4Extending Burp Suite to solve reCAPTCHA | Web App SecurityBurp [...]

  • The Many Flavors of AppSec – Recipe 3 – SQL Injection

    Updated: 2012-06-28 16:46:38
    It's Thursday again so that means it is time for the third drink recipe in our series "The Many Flavors of AppSec". Over the past two weeks you've got to indulge on our Anonymous and AppSec in the Cloud cocktails. This week we present the SQL Injection Shot!

  • Network Performance Monitoring Pressure Ratchets Up

    Updated: 2012-06-28 14:35:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your company

  • ISC StormCast for Thursday, June 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2632, (Thu, Jun 28th)

    Updated: 2012-06-28 03:27:54
    ...(more)...

  • RSA Dismisses Researchers' SecurID Attack Claims

    Updated: 2012-06-28 00:51:09
    A team of researchers say they have found an effective way to access RSA encryption keys. However, an executive from EMC's RSA division dismissed the attack strategy as "not useful." - An international team of researchers claim to have uncovered a way to enhance “padding oracle attacks” against cryptographic hardware such as RSA SecurID 800 authentication tokens to enable hackers to access encryption keys. However, an executive with EMC's RSA security division dismissed the atta...

  • Online Banking Heists, (Wed, Jun 27th)

    Updated: 2012-06-28 00:26:07
    Afew days ago I wrote about a few arrests in Belgium in relation to online banking fraud. In t ...(more)...

  • Security Defenses: 10 Ways To Circumvent Threats With a Sound BYOD Policy

    Updated: 2012-06-27 21:00:39
    : IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews Security Defenses : 10 Ways To Circumvent Threats With a Sound BYOD Policy IT Security Network Security News Reviews : Security Defenses : 10 Ways To Circumvent Threats With a Sound BYOD Policy By Chris Preimesberger on 2012-06-27 As much as the bring-your-own-device-to-work trend pleases CIOs because it means they don't have to buy as many BlackBerrys , laptops and smartphones for employees as they used to , the thought of all those foreign

  • FBI Charges 24 Suspects in Credit Card, Cyber-Fraud Case

    Updated: 2012-06-27 20:17:51
    A two-year undercover operation led by the FBI resulted in 24 people being charged for their alleged part in a massive international credit card fraud ring that stole accounts from hundreds of thousands of victims. - Two-dozen people were arrested in 13 countries on June 26, following a two-year undercover FBI investigation into an international credit card fraud ring affecting hundreds of thousands of victims, according to the U.S. Department of Justice. Dubbed quot;Operation Card Shop, quot; the undercov...

  • Webhoneypot - Web Application Honeypot

    Updated: 2012-06-27 19:47:00

  • SQL Injection Explained

    Updated: 2012-06-27 17:49:40
    Check out this video with Veracode Security Researcher Fred Owsley discussing SQL Injection. SQL Injection is a type of web application security vulnerability in which an attacker is able to submit a database SQL command which is executed by a web application, exposing the back-end database. Fred explains how SQL Injection occurs and what you can do protect your data from a SQL Injection attack. The video can be viewed below, enjoy! For your convenience we have also transcribed the video.

  • Annoying Things in OS X

    Updated: 2012-06-27 16:58:02
    I have a friend who is getting into OS X for the first time after being a lifetime poweruser in Windows. He has a number of valid complaints, and I wonder what the official OS X fanboy answers are. [ Note: I'm an OS X fanboy. ] Basically, the problem is that for an operating [...]

  • CEO Ron Gula on Log Correlation Engine Version 4

    Updated: 2012-06-27 15:20:00
    Tenable CEO and CTO Ron Gula took a few minutes to talk about some of the important new features of Log Correlation Engine (LCE) version 4. Watch now on Tenable's YouTube Channel:

  • What's up with port 79 ?, (Wed, Jun 27th)

    Updated: 2012-06-27 14:42:43
    ISC reader Yew Chuan reports that he is seeing a steady increase in probes to tcp/79 ( ...(more)...

  • Video: Windows 7 local user accounts

    Updated: 2012-06-27 09:00:04
    This video provides an overview of default accounts created in Windows 7 after the installation.

  • Log Correlation Engine Version 4 Now Available

    Updated: 2012-06-27 04:20:00

  • Facebook Email Change Raises Security Concerns

    Updated: 2012-06-27 04:05:43
    A Sophos official said the social networks decision to make the @facebook.com addresses users default addresses will make them even more attractive to spammers. - Facebooks decision to replace users chosen email addresses with their Facebook email address as the default on profile pages likely will make those @facebook.com addresses even more attractive to spammers and other cyber-criminals, according to one security expert. In a blog post June 26, Graham Cl...

  • ISC StormCast for Wednesday, June 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2629, (Wed, Jun 27th)

    Updated: 2012-06-27 02:28:27
    ...(more)...

  • Cyber-Underground Takes Buffet Approach to Selling Bank Fraud Malware

    Updated: 2012-06-27 00:31:00
    Researchers at Trusteer say cyber-criminals are offering feature-based pricing on malware components to give black market customers greater flexibility. - Cyber-criminals are now pricing webinjects based on the specific features being requested, underscoring an ongoing movement towards flexibility in the black market, according to security researchers at Trusteer. Webinjects are malware components that launch fake Web pages or form fields when users ...

  • Insecure Cryptographic Storage Explained

    Updated: 2012-06-26 18:47:00
    We recently recorded Veracode Security Researcher Chris Lytle discussing Insecure Cryptographic Storage. Insecure Cryptographic Storage is a common vulnerability that occurs when sensitive data is not stored securely. Protecting sensitive data by encrypting it should be a key step in a Secure Software Development Lifecycle. In this video Chris describes what Insecure Cryptography is and explains the impact of Insecure Cryptographic Storage Flaws.

  • Nomadix Tackles Runaway Anytime, Anywhere Access Demand

    Updated: 2012-06-26 16:09:00
    , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your

  • Five Ways to Engineer Better Network Security

    Updated: 2012-06-26 15:54:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your company

  • WordPress Application Firewall. Protects against current and future attacks.

    Updated: 2012-06-26 07:44:00

  • finddomains - discovering domain names/web sites/virtual hosts

    Updated: 2012-06-26 04:32:00
    </img

  • BoNeSi - the DDoS Botnet Simulator

    Updated: 2012-06-26 04:28:00

  • Stuxnet Includes Expiration Date to Halt Spread of Malware

    Updated: 2012-06-26 01:37:07
    The cyber-attack ceased on Sunday to be a virus that could propagate via USB memory sticks. But the implications of the nation-state-created cyber-attack continue to be felt. - Stuxnet is many things: A cyber-weapon, a nation-state attack on Iran's nuclear processing capability, and a computer virus. On Sunday, however, the program ceased its run as a slowly spreading virus. On Monday, researchers at Kaspersky Labs identified an expiration date June 24, 2012 within t...

  • Find Your Rulers | Voltaire

    Updated: 2012-06-25 22:39:38
    To find out who rules over you, simple determine who you’re not allowed to criticize. ~ Voltaire Related ContentQuotes: Voltaire“Those Who Believe Absurdities Will Commit Atrocities — Voltaire”The Best Books of 2010 | The EconomistPaul Graham’s Creativity and Development PhilosophyLeave Your Change

  • LulzSec Hackers Plead Guilty to Cyber-Attack Charges in U.K.

    Updated: 2012-06-25 21:06:17
    Two members of the LulzSec hacking group pleaded guilty in United Kingdom courts to taking part in cyber-attacks on several Internet sites in the U.K. and overseas, including Sony Pictures, Nintendo, HBGary and Britains National Health Service. - Two reputed members of the hacking group Lulz Security (LulzSec) pleaded guilty in the United Kingdom today to charges related to Website attacks in the U.K. and in other countries, according to reports. Ryan Cleary, 20, and Jake Davis, 19, admitted to conspiring with other members of LulzSec to...

  • PayPal Offers Bounty for Reported Security Bugs

    Updated: 2012-06-25 16:14:36
    PayPal, owned by eBay, joins Google, Facebook, Mozilla and others in offering money to security researchers to report vulnerabilities. - PayPal is expanding its security-bug-reporting program to include a bounty for reported vulnerabilities, joining a growing list of vendors including Google, Adobe, Mozilla and Facebook with similar programs. The online payment services company, like others with bounty programs, is hoping to convinc...

  • Portsplit - Use multiple service in the same port.

    Updated: 2012-06-25 15:47:00

  • F5 Brings Context, Scalability Added Security to Big-IP v11.2

    Updated: 2012-06-25 14:46:00
    , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your

  • O2 Platform – Real-Time Vulnerability Creation Feedback inside VisualStudio

    Updated: 2012-06-24 17:16:05
    via youtube.com Compelling. Posted via email from danielmiessler.com | posterous Related ContentSeriously Fast LyricsA Creative SongIf China Attacks America (A Must See)Hitler Finds Out There’s No iPhone 5David Simon on the End of the American Empire

  • Google is an Unhappy Math Genius

    Updated: 2012-06-24 17:08:49
    Google is like a math prodigy that is unhappy because no matter what he tries he’s unable to write poetry or make people laugh. Link. Related ContentMath and ProgrammingGoogle and Big BrotherThe First Result When Googling SantorumMath Pickup LinesPromiscuous Women Tend to be Unhappy

  • AT&T And Hostgator was hack.

    Updated: 2012-06-23 15:47:00

  • AutoCAD Drawings Target of Apparent Cyber-Espionage Campaign in Peru

    Updated: 2012-06-22 21:39:03
    Malware spread through infected AutoCAD files targeted firms in Peru to collect and dispatch stolen drawings to email accounts located in China, researchers said. - Security researchers at ESET have uncovered a malware campaign targeting AutoCAD drawings in an apparent attempt at industrial espionage. AutoCAD is a widely used computer-aided design application that has been in use worldwide since the mid-1980s. It allows drafting in both two-dimensional and...

  • Weekly News Roundup

    Updated: 2012-06-22 16:04:29
    Happy Friday everyone! There has been a lot of news involving breaches and their effects this week, so here’s our wrap of this week’s events! It’s only June, and there have already been 189 breaches this year: “The Worst Data Breaches of 2012 (So Far)” by Ellen Messmer. This slideshow highlights the 15 most significant data [...]

  • The Vim Pedal

    Updated: 2012-06-22 12:08:56
    VIM Clutch is a hardware pedal for improved text editing speed for users of the magnificent VIM text editor (1, 2). When the pedal is pressed down, the pedal types “i” causing VIM to go into Insert Mode. When released, it types <Esc> and you are back in Normal Mode. via github.com omfg impressive. Posted [...]

  • June VEF Participant Wins a Kindle Fire

    Updated: 2012-06-22 02:27:48
    As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to [...]

  • Kaspersky Security for Mail Server - Voted WindowSecurity.com Readers' Choice Award Winner - Email Anti Virus

    Updated: 2012-06-21 10:00:23
    Kaspersky Security for Mail Server was selected the winner in the Email Anti Virus category of the WindowSecurity.com Readers' Choice Awards. Panda Security for Enterprise and GFI MailSecurity for Exchange/SMTP were runner-up and second runner-up respectively.

  • Zeus, SpyEye Trojans Back to Attacking Banks in Real Time

    Updated: 2012-06-21 05:20:29
    Custom modifications for two major cyber-criminal toolkits Zeus and SpyEye can make stealing from banks that use two-factor authentication easier. - Underground developers for the two major banking Trojans, Zeus and SpyEye, have honed their techniques for automated theft to the point that even two-factor authentication can be bypassed easily and automatically, according to a report released by Trend Micro this week. The evolution of the banking...

  • ภัยที่เรียกว่าคนกลาง

    Updated: 2012-06-21 02:00:00

  • CCOs: Let Threat Analyzer do the heavy lifting

    Updated: 2012-06-20 18:32:00
    In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance.  [...]

  • Flame Malware Joint U.S., Israeli Attack on Iran's Nuclear Program: Report

    Updated: 2012-06-20 18:30:00
    Officials involved in U.S. cyber-operations linked Flame to U.S. and Israeli activities against Iran, according to a report in The Washington Post. - The story of the Flame continues to take more twists and turns, as a report has surfaced tying the malware to a joint cyber-effort between the United States and Israel. According to The Washington Post, Flame was developed five years ago as part of an initiative code-named Olympic Games that was de...

  • Do Passwords Matter?

    Updated: 2012-06-20 13:44:41
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Security Considerations for Cloud Computing (Part 6) - Metered Services

    Updated: 2012-06-20 09:00:11
    This article looks at the final essential characteristic of cloud computing: metered services

  • The Flaws in Defending Morality With Religion | Big Think

    Updated: 2012-06-20 01:32:48
    As Plato first portrayed it, we have to ask with James Rachels a two-part question: “(1) Is conduct right because the gods command it, or (2) do the gods command it because it is right?” “Conduct is moral because god says so” If (1) then conduct takes on the afterglow of being moral because of [...]

  • The Republican Plan

    Updated: 2012-06-20 01:30:48
    Anyway you cut it, what Republicans vaguely advocate (even Brooks emphasizes the vagueness) is not only radically nuts, but utterly unworkable–hence the vagueness. Here’s Brooks, trying his best to apply the lipstick: Mitt Romney … would structurally reform the health care system … simplify the tax code … [and] reverse 30 years of education policy…. [...]

  • Basic Beliefs of the Modern Human

    Updated: 2012-06-19 21:37:23
    For most of human history people have been wrong about Earth’s place in the universe. Some thought we were the only thing here, others thought we were at the center of many things. But it wasn’t until very recently that we have come to know that we are just a speck in a monumental picture. [...]

  • High Fructose Intake Sabotages Cognitive Performance; Fish Oil Helps

    Updated: 2012-06-19 20:23:38
    A new UCLA rat study is the first to show how a diet steadily high in fructose slows the brain, hampering memory and learning — and how omega-3 fatty acids can counteract the disruption. The peer-reviewed Journal of Physiology publishes the findings in its May 15 edition. “Our findings illustrate that what you eat affects how [...]

  • U.S. No Longer Land Of Opportunity’ | Here & Now

    Updated: 2012-06-19 20:19:21
    .

  • Small Business Cyber Security Infographic

    Updated: 2012-06-18 19:16:10
    Small businesses often assume they are safe from cyber attacks because they are too small to be of interest to hackers. Many small businesses also mistakenly assume they have taken adequate measures to protect themselves. This infographic highlights the risks faced by small businesses from hackers as well as gives a few tips to help safeguard against attacks.

  • PENETRATION TESTING PRACTICE LAB - VULNERABLE APPS / SYSTEMS

    Updated: 2012-06-18 18:32:00

  • Extracting DNS queries

    Updated: 2012-06-17 18:45:00
    There was recently a question on the Wireshark users mailing list about “how to get the query name from a dns request packet with tshark”. This is a problem that many network analysts run into, so I decided to write a blog post instead of just replying to the mailing list. Note: the pcap file used[...]

  • Remote Access Woes: Microsoft Windows Remote Desktop Protocol (RDP)

    Updated: 2012-06-15 12:45:20
    : : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Media RoundUp | Patch Tuesday June 2012

    Updated: 2012-06-14 22:52:27
    The June 2012 installment of Patch Tuesday was easily one of the most active of the year so far, in terms industry commentary and predictions, driven by the more than two-dozen security vulnerabilities across several of Microsoft’s products. As I’m sure many of you are still catching up on the news, for your convenience I’ve [...]

  • escanner Escalation Pentesting Tool

    Updated: 2012-06-14 15:26:00

  • XAMPP Windows 1.7.7 multiple XSS/Blind SQL Injection Vulnerabilities

    Updated: 2012-06-14 03:49:00

  • Video: User Rights - Server vs Domain Controller

    Updated: 2012-06-13 07:00:15
    This video explains the concept of user rights for a Windows server, compared to that of a Windows domain controller.

  • eSoft Joins the Spiceworks Community!

    Updated: 2012-06-12 18:36:17
    eSoft has now joined the Spiceworks Community! Spiceworks is a great site for IT professionals, offering community forums, reviews and chatter from over 2 million IT professionals. Spiceworks also offers free IT management applications to manage everything from IT Inventory to Help Desk trouble tickets. This software is easy to use, flush with features and has an excellent price point (free). For those of you not already part of the community, head over to spiceworks.com and sign up for an account. Be sure to follow eSoft for the latest discussions, product updates and more! http://community.spiceworks.com/pages/esoft

  • 5 ways to protect your sensitive data in the cloud – webinar with IBM

    Updated: 2012-06-12 17:05:53
    In 2 weeks, we’ll be hosting a live webinar with IBM’s Ed Bottini, Cloud Ecosystem Program Director and our own, Jim Zierick, EVP of Product Operations to discuss ways to protect your sensitive data in the cloud. We know cloud security is on everybody’s mind so be sure to join us on Tuesday, June 26 at 9AM-10AM PDT. [...]

  • Social Media: The Double-Edged Sword for the Security Community

    Updated: 2012-06-12 04:30:17

  • F5 BIG-IP remote root authentication bypass Vulnerability (Update Link and payload for Metasploit)

    Updated: 2012-06-11 19:04:00

  • Escaping Restricted Linux Shells

    Updated: 2012-06-11 07:50:00

  • Interesting Vulnerability Today(2012-06-11) Microsoft IIS 6.0, Microsoft IIS 7.5

    Updated: 2012-06-11 05:40:00

  • iCrack Online/Offline MD5 Cracker [Python Script]

    Updated: 2012-06-11 05:35:00

  • MySQL Authen Bypass Vulnerability On Ubuntu (*update python script)

    Updated: 2012-06-11 05:31:00

  • Win a Samsung Galaxy Tab 2 (10.1)!

    Updated: 2012-06-08 08:43:19
    Participate in the 2012 WindowSecurity.com site survey for your chance to win a Samsung Galaxy Tab 2 (10.1).

  • Which processes are using the Internet[Linux, Mac OSX]

    Updated: 2012-06-07 04:28:00

  • Your LinkedIn password is in the news or not?

    Updated: 2012-06-07 04:18:00

  • Dumping LinkedIn passwords

    Updated: 2012-06-06 23:54:49
    *** Dire Warning ***If you’re in the habit of reusing passwords AT ALL, 1) stop it! 2) if you have a LinkedIn account change your password immediately on as many sites as you can remember.  Then get yourself a password management program (like 1Password or LastPass) with a random password creator and learn to use [...]

  • Security Considerations for Cloud Computing (Part 5) - Rapid Elasticity

    Updated: 2012-06-06 07:00:00
    In this part of the series, we'll turn our attention to another essential characteristic of cloud computing: rapid elasticity.

  • Network Security Podcast, Episode 280

    Updated: 2012-06-06 00:42:23
    This is our last podcast before we take a month-long hiatus! Rich is currently on what he calls “vacation” (an alien concept to some of us), with Martin planning to do the same soon. Zach is prepping his liver^Wbrain for SummerCon this weekend in NYC. Network Security Podcast, Episode 280, June 5, 2012 Time: 37:12 Show [...]

  • Flame Burns a Little Brighter

    Updated: 2012-06-05 06:56:33
    Did you know that Microsoft’s Terminal Server Licensing Service (we’ll call it TSLS for convenience) generated certificates that could be used to sign code? No? Neither did Redmond. Flame leveraged a “0day” (zero day) within TSLS to sign its own code, allowing it to appear as if the code came from Microsoft. This allowed Flame [...]

Current Feed Items | Previous Months Items

May 2012 | Apr 2012 | Mar 2012 | Feb 2012 | Jan 2012 | Dec 2011