• New IBM Network Security Appliance Launched

    Updated: 2012-07-31 07:41:22
    IBM announced the availability of a new network security appliance, the IBM Security Network Intrusion Prevention System. - IBM has announced a new class of network security appliance that delivers a more granular view of an organizations IT security and delivers a simplified security management interface. The IBM appliance helps enterprises control new risks posed by social media and web browsing, IBM said. The new ne...

  • Friends in Vegas

    Updated: 2012-07-31 07:34:29
    I already did a post on my recent Vegas trip, but there’s a piece of it that I didn’t mention. Working in my current job I have had the privilege to be able to hire many of my friends, and going to Vegas this time (our team meeting) I was able to see it for [...]

  • The Nicest Place on the Internet

    Updated: 2012-07-31 07:17:31
    thenicestplaceontheinter.net Love. Related ContentSubway: CheckOne of the Best Pieces on Free Markets I’ve Ever ReadThe End Of The Internet?Paul Graham: How To Do What You LoveGoogle IM vs. Skype

  • Avoid Junk Information Like You Avoid Junk Food

    Updated: 2012-07-31 07:09:08
    Smart, educated people tend to avoid junk food. They tend to be thinner and have better diets because they’re simply more aware of the downsides of eating crap, including the negative effect it has on productivity. It should be the same for junk information. This includes not just television shows and entertainment news, but more [...]

  • Planned vs. Random Leisure

    Updated: 2012-07-31 06:44:36
    .

  • ISC StormCast for Tuesday, July 31st 2012 http://isc.sans.edu/podcastdetail.html?id=2701, (Tue, Jul 31st)

    Updated: 2012-07-31 02:41:51
    ...(more)...

  • List of osCommerce website that has vul. by Metropolist hacker

    Updated: 2012-07-31 01:45:00

  • Symantec Web Gateway 5.0.3.18(deptUploads_data.php) Blind SQL Injection Vulnerability

    Updated: 2012-07-31 01:35:00

  • BlackHat 2012 Recap Plus Powerbroker Mobile and Retina CS 3.5 Launch!

    Updated: 2012-07-30 23:56:49
    It’s been a very busy July here at BeyondTrust, especially the last two weeks! We’ve just returned from the annual BlackHat conference, where we had tremendous response to demonstrations of our Context Aware Security Intelligence solutions.  BlackHat, as many of you know, is the industry’s most well respected technical security conference, so we were very [...]

  • Ubisoft Patches Browser Plugin that Left Game-Players Open to Cyber-Attack

    Updated: 2012-07-30 23:06:43
    Ubisoft Entertainment says it has patched a security vulnerability in a browser plugin that, if exploited, could have left users open to cyber-attack. - Videogame maker Ubisoft Entertainment says it has patched a security vulnerability uncovered in a plugin used by players that could have potentially exposed them to malware. The issue apparently lies in the browser plugin installed by Uplay, the digital rights management (DRM) software that allows ...

  • Cloud Atlas Extended Trailer #1

    Updated: 2012-07-30 23:03:15
    via youtube.com ZOMFG. Posted via email from danielmiessler.com | posterous Related ContentMario Bros. Indie Film TrailerNew Headz Up App | SNLPraha Opening‘The Star Wars That I Used To Know’Seriously Fast Lyrics

  • Cyber-Spy Malware Eavesdrops on Corporate, Government Targets Worldwide

    Updated: 2012-07-30 22:57:57
    A study of cyber-espionage activities shows that more than 200 unique families of malware have been used to eavesdrop on corporate and government employees, including attacks on the Japanese government. - More than 200 unique families of malware have been used to eavesdrop on corporate and government employees, including attacks on the Japanese government, according to the results of a study of cyber-espionage activities released on July 25. Unlike the massive botnets used by cyber-criminals to ste...

  • End of Days for MS-CHAPv2, (Mon, Jul 30th)

    Updated: 2012-07-30 22:36:09
    Moxie Marlinspike and David Hulton gave a talk at Defcon 20 on a presentation on cracking MS-CHAPv2 ...(more)...

  • The Brain is a Simple Grid | ExtremeTech

    Updated: 2012-07-30 21:50:08
    “Before, we had just driving directions. Now, we have a map showing how all the highways and byways are interconnected,” says Van Wedeen, a member of the Human Connectome Project. “Brain wiring is not like the wiring in your basement, where it just needs to connect the right endpoints. Rather, the grid is the language [...]

  • Mobile Security Is a No-Win Game When Cyber-Criminals Have the Upper Hand

    Updated: 2012-07-30 18:57:03
    NEWS ANALYSIS: Mobile security is at best a zero-sum game in which the bad guys are the only ones with a positive payoff potential. Corporate network and data security managers can only hope to keep cyber-crooks at bay. - By now, you are likely wondering why Im talking about game theory when discussing mobile security. The reason came when I chaired a panel at the NetEvents Americas Press Summit on the topic, and realized that the very best a network security manager can do is keep the bad guys at bay. Whats worse is...

  • BYOD Environments: 10 Hidden Networking Costs and How to Overcome Them

    Updated: 2012-07-30 18:24:39
    : IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews BYOD Environments : 10 Hidden Networking Costs and How to Overcome Them IT Security Network Security News Reviews : BYOD Environments : 10 Hidden Networking Costs and How to Overcome Them By Chris Preimesberger on 2012-07-30 Bring your own device , or BYOD , in the enterprise is the recent trend that shows how far IT has come in understanding and responding to what employees want and need to be productive . Employees coming into the workforce ,

  • Popular Security Protocols Under Fire at Defcon

    Updated: 2012-07-30 17:18:15
    PPTP (Point-to-Point Tunneling Protocol) has long been used by SMBs to create secure connections and access resources at the corporate network. While PPTP VPN connections have been a simple and workable solution for SMBs, many in the security community have scrutinized the protocol as insecure. This year’s Defcon security conference has taken that scrutiny to the next level, releasing tools that can be used to crack PPTP encryption in under a day. This means any traffic sent through the PPTP connection can be decrypted and an attacker can view the entire session including user credentials and data.

  • Vegas 2012

    Updated: 2012-07-30 12:49:48
    So I just finished up my annual Vegas trip. Much was accomplished. Attended a ton of great talks that will get parsed into additions to our testing methodologies Had valuable face time with the team Saw Daniel Tosh for the first time Saw the Jabberwalkies for the first time Saw Paul Oakenfold for the first [...]

  • BIND 9 Security Updates, (Mon, Jul 30th)

    Updated: 2012-07-30 12:29:37
    BIND has released 4 new versions that takes care of 2 security issues. They can be downloaded here ...(more)...

  • ISC StormCast for Monday, July 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2698, (Mon, Jul 30th)

    Updated: 2012-07-30 03:05:30
    ...(more)...

  • Windows – Open/Close Port With Windows Firewall Rule

    Updated: 2012-07-30 01:07:00

  • Howto: Fix the error Mod_Security[libxml2.so.2] on Ubuntu12.04

    Updated: 2012-07-28 16:32:00

  • Transmission BitTorrent XSS Vulnerability

    Updated: 2012-07-27 17:01:00

  • HP, Cloudera Extend Hadoop Ties, Plan Appliance

    Updated: 2012-07-27 14:21:00

  • Cuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/, (Fri, Jul 27th)

    Updated: 2012-07-27 12:40:34
    ...(more)...

  • Microsoft 2012 Blue Hat Security Prizes Total $260,000

    Updated: 2012-07-27 05:40:21
    Security content winners all took aim at return-oriented programming, or ROP, in an effort to eliminate one of the most common attack vectors against Windows. - LAS VEGAS A year ago at the Black Hat 2011 event, Microsoft announced the Blue Hat Prize. The goal is simple: It motivates security researchers to come up with a new defensive technology for Windows. At the 2012 Black Hat conference, Microsoft followed up with a new set of Blue Hat prizes ...

  • ISC StormCast for Friday, July 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2695, (Fri, Jul 27th)

    Updated: 2012-07-27 04:33:21
    ...(more)...

  • Security Products That Fend Off Network Attacks Demonstrated at Black Hat

    Updated: 2012-07-27 00:28:44
    Two new products that were demonstrated at the Black Hat 2012 security conference use different techniques to try to prevent cyber-attackers from penetrating enterprise networks. - Two new products aimed at network attack prevention were demonstrated at the recently adjourned Black Hat 2012 network security conference in Las Vegas. One product discovers likely avenues for cyber-attacks before they happen and the other attempts to isolate the network from malware. Security so...

  • ISC Feature of the Week: The 404Project - now with IP Mask, (Thu, Jul 26th)

    Updated: 2012-07-26 22:59:41
    Overview We've covered the 404 Project https://isc.sans ...(more)...

  • Black Hat 2012: Best Giveaways and Booths

    Updated: 2012-07-26 16:38:25
    Veracode’s remedy for the Application Security headache is in full swing at the Black Hat Conference. Swing by the booth (#229) and you can pick up an “I See our picks!

  • Black Hat: Credit Card Payment Terminals at Risk

    Updated: 2012-07-26 16:32:59
    At the Black Hat conference, a security researcher and the hacker known as Nils showed how they can use a maliciously created credit card to steal money. A fix is supposedly in the works. - LAS VEGAS Payment terminals are ubiquitous in modern society, enabling us to pay for anything we want with a credit card. At the Black Hat security conference here, a pair of security researchers demonstrated in front of a live audience that those payment terminals are not as secure as they should...

  • Security Researchers Find Flame Malware Mention in Mahdi Code

    Updated: 2012-07-26 16:18:50
    Researchers at Seculert have discovered what could be a link between the Mahdi malware and the cyber-espionage Trojan known as Flame. - Researchers at Seculert have uncovered what could be evidence of a link between the Mahdi malware and the infamous Flame malware discovered earlier this year. Though no strong connections have been found between the Flame and Mahdi campaigns, a small clue may have been unearthed in the code, accor...

  • 2012 Confidential Documents at Risk Study

    Updated: 2012-07-26 14:47:57
     Ponemon Institute is pleased to present the results of the 2012 Confidential Documents at Risk Study. Sponsored by WatchDox, this is the first research study on the state of document-centric security in today’s corporate environment

  • Novell Jumps Into the Mobile Device Management Pool–Again

    Updated: 2012-07-26 14:45:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Lee H . Badman Bio Archive Lee H . Badman Network Computing Blogger Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security

  • Spam, Malware, Virus Outbreaks Rise in 2012: Report

    Updated: 2012-07-26 12:47:12
    In the first six months of this year, the U.S. was back on the list of the top 10 spam senders worldwide, landing in sixth place. - The distribution of unwelcome or dangerous emails was on the rise again in the first half of 2012, despite the fact that numerous spam-sending botnets have been shut down in the past two years, according to the results of analyses by the research team at German email security specialist Eleven. Th...

  • Windows 8 Security Garners Praise at Black Hat

    Updated: 2012-07-26 05:20:14
    For years, hackers have had an easy time exploiting Windows heap memory manager. However, all that is going to change with Windows 8, according to new research released at Black Hat. - LAS VEGAS Microsoft's Windows 8 is not yet generally available the operating system officially lands on store shelves Oct. 26 but that's not stopping security researchers from trying to find flaws in the OS. However, hackers who have had an easy time with Windows might find some new security featu...

  • RSA Research Unit Hunts Cyber-Threats 'That Don't Have Names'

    Updated: 2012-07-26 04:14:35
    NEWS ANALYSIS: As members of the cyber-security industry gather for the Black Hat 2012 conference, one industry researcher says the key to better IT security is to identify the signs of attacks before they are launched. - At the Black Hat 2012 conference taking place July 21-26 in Las Vegas, cyber-security firms are sharing information on how to keep up with rapidly evolving threats. One researcher says it's not enough to fight known threats you also have track down the developing threats as they just start to eme...

  • ISC StormCast for Thursday, July 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2692, (Thu, Jul 26th)

    Updated: 2012-07-26 03:40:44
    ...(more)...

  • 'Gameover' Financial Botnet Compromises Nearly 700,000 Victims

    Updated: 2012-07-26 00:11:22
    Security researchers peer into the network of compromised computers and find a well-run operation that steals money from banking customers and has infected systems at 14 of the top 20 Fortune 500 companies. - A peer-to-peer botnet has infected more than 675,000 systems, including those at 14 of the top 20 Fortune 500 companies, according to research released July 25 at the Black Hat security conference. The botnet, known as Gameover, uses a private version of the Zeus framework, a collection of software...

  • Former FBI Agent Warns of Cyber-Threat, Asks Hackers for Help at Black Hat

    Updated: 2012-07-25 21:36:36
    A former FBI executive director asked hackers to join the U.S. government as it tackles new cyber-security threats that jeopardize the country's security and infrastructure. - LAS VEGAS The United States is at war in the cyber-theater, and its a pervasive threat that all Americans need to take seriously. Thats the message from a former, high-ranking FBI agent, who delivered a July 25 keynote address at the Black Hat conference here. For 24 years, Shawn Henry worked ...

  • HP Security Expert: Exploit Kits More Sophisticated, Harder to Detect

    Updated: 2012-07-25 20:26:02
    At the Black Hat show, Jason Jones of HP will discuss the evolving nature of Web exploit kits, which increasingly are targeting Java vulnerabilities. - Web exploit kits are getting more complex and harder to detect, and the cyber-criminals developing such toolkits as Blackhole and Phoenix are themselves becoming more sophisticated as they leverage a more traditional software business model, according to a security expert from Hewlett-Packard. In a...

  • Two MDM Vendors Make Tablets Into Purpose-Specific Devices

    Updated: 2012-07-25 17:24:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your company

  • PowerBroker Mobile Now Available

    Updated: 2012-07-25 16:49:39
    What do you get when you cross industry leading vulnerability assessment with a SaaS based mobile device management (MDM) solution? You get a mobile device solution that incorporates the top features of security, configuration, and compliance management with seamless integration into Retina CS. You gain complete visibility into corporate and “bring your own device” (BYOD) [...]

  • Apple Releases Safari 6, (Wed, Jul 25th)

    Updated: 2012-07-25 16:31:44
    Even if you don't plan to upgrade to Mountain Lion, as of today Safari 6 is available as an update f ...(more)...

  • Christien Rioux: Speaking at Black Hat Briefings USA 2012

    Updated: 2012-07-25 15:53:58
    I’ll be speaking at Black Hat Briefings in Las Vegas this year, on “Lessons Of Static Binary Analysis”. The talk will be a two hour intensive workshop covering the details of binary transformation that make Veracode possible. The topics will range from an introduction to decompilation theory, to the details of how to build an [...]

  • Apple OS X 10.8 (Mountain Lion) released, (Wed, Jul 25th)

    Updated: 2012-07-25 15:41:33
    You probably saw by now that Apple unleashed Mountain Lion earlier today. If you are lucky to make i ...(more)...

  • Juniper, Riverbed Announce Joint Product Development Deal

    Updated: 2012-07-25 14:52:00
    , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your

  • Security Compliance and Microsoft SCM

    Updated: 2012-07-25 08:00:05
    This article provideds an overview of what SCM v. 2.5.40 does and how it does it.

  • VMware Finally Gets a Network Strategy

    Updated: 2012-07-24 17:59:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Greg Ferro Bio Archive Greg Ferro Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center

  • Nessus app for android version 1.0.1 Credential Disclosure

    Updated: 2012-07-24 17:25:00

  • Symantec Web Gateway 5.0.3.18 LFI Remote ROOT RCE Exploit

    Updated: 2012-07-24 17:15:00
    <br/

  • Symantec Web Gateway 5.0.2 (blocked.php id parameter) Blind SQL Injection

    Updated: 2012-07-24 17:13:00

  • How the Norwegians Reacted to Terrorism | Schneier

    Updated: 2012-07-23 20:22:21
    An antidote to the American cycle of threat, fear, and overspending in response to terrorism is this, about Norway on the first anniversary of its terrorist massacre: And at the political level, the Prime Minister Jens Stoltenberg pledged to do everything to ensure the country’s core values were not undermined. “The Norwegian response to violence [...]

  • Symantec Web Gateway 5.0.3.18 Blind SQLi Backdoor via MySQL Triggers

    Updated: 2012-07-23 20:06:00
    <img src="http://feeds.feedburner.com/~r/r00tsecblog/~4/fnewYGklaRQ" height="1" width="1"/

  • Total Cost of Ownership for Full Disk Encryption (FDE)

    Updated: 2012-07-23 14:17:52
    We are pleased to present the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute

  • July Patch Tuesday Assessment On Demand

    Updated: 2012-07-23 04:36:16
    Miss our live VEF webinar earlier this month? In case you did, I’ve put all of the content together for you below. Enjoy! Additionally, access this month’s Security Bulletin, a list of all the Audit IDs, and the PDF of the presentation. If you have additional questions you’d like to ask the research team about [...]

  • Dell SonicWALL Scrutinizer 9.0.1 (statusFilter.php q parameter) SQL Injection

    Updated: 2012-07-23 02:34:00

  • Dinesh D’Souza Doing a Movie About Obama

    Updated: 2012-07-20 17:03:30
    Oh Jesus. Related ContentBike Parkour‪Java TrailerCultivating Gratefulness | TEDObama Blasts GOP Candidates on Booing of Gay Soldier at DebateMagnet Through Copper Pipe

  • DEUCE - Bypassing DLP with Cookies

    Updated: 2012-07-20 03:00:00

  • IIS 6.0/7.5 Vulnerabilities [moderate risk] - ISOWAREZ BDAY RELEASE

    Updated: 2012-07-20 02:14:00

  • Detecting Mobile Device Vulnerabilities Using Nessus

    Updated: 2012-07-19 14:02:00
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • On the Vim Path

    Updated: 2012-07-19 10:23:55
    I just uninstalled TextMate. I also just revamped my git workflow, and am going full-on Vim everywhere. That’s MacVim, Janus, using git within Vim, posting to WordPress from Vim, using Vimium in Chrome… Everything. I’m going to consume a massive number of tutorials, screencasts, lessons-learned blog posts, a few core books, and use those to [...]

  • Create custom audits for Android devices. Come on, all the cool kids are doing it.

    Updated: 2012-07-18 16:56:55
    Have you ever wanted to root your Android device, so you could be like all the other cool kids on the block? If you did your research, you learned that it makes it easier for attackers to keep their malware on your device, if it were to be infected, through the use of a rootkit. [...]

  • Does Modern Philosophy Fetishize The Classical Thinkers?

    Updated: 2012-07-18 11:33:27
    It seems to me that every time I come across real philosophers they have an extremely pompous view of non-academic, amateur, or overly modern or political thinkers. In short, they relate everything to the greats: Kant, Plato, Aristotle, Hume, etc., and they seem to dismiss modern thought that’s more practical if it doesn’t seem sufficiently [...]

  • Technology + Crime + Time | Marc Goodman

    Updated: 2012-07-18 09:59:20
    Related ContentWhen Ideas Have Sex | TEDA Happiness FrameworkSam Harris Destroys Moral Relativism in Single TED TalkTED: SixthSense TechnologyTED: How Bacteria Communicate

  • Who Am I? Understanding Credentials

    Updated: 2012-07-18 08:00:01
    In this article the author discusses the authorization environment and access levels of logged on users which will help you troubleshoot conflicting issues.

  • Network Security Podcast, Episode 282

    Updated: 2012-07-18 00:13:05
    BlackHat, DEFCON, and BSidesLV are just around the corner, and Rich is in France watching people ride bicycles. If you’re in Vegas next week, and want to have a chat, or a beer, or whatever (or tell us we suck), let us know and/or come find us! Network Security Podcast, Episode 282, July 17, 2012 [...]

  • WPAD Man in the Middle

    Updated: 2012-07-17 20:51:00
    Metasploit was recently updated with a module to generate a wpad.dat file for WPAD man-in-the-middle (MITM) attacks. This blog post explains how this attack works and how to investigate such an attack by analyzing captured network traffic. Windows' WPAD feature has for many years provided attackers[...]

  • What to Do About the Scarcity of IPv4 Addresses

    Updated: 2012-07-17 17:32:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Mike Fratto Bio Archive Mike Fratto Network Computing Editor Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security ,

  • Best Practices around Integrating Security into the SDLC

    Updated: 2012-07-17 16:18:20
    Secure coding is a challenge that every software company in the world faces. Even the largest companies that attract the best developers in the world (Read: Google, Facebook) have multiple instances of vulnerabilities in their code ranging from XSS to SQL injection to backdoors. So how can you integrate security into your SDLC?

  • Skype Source Code Leak

    Updated: 2012-07-17 01:44:00

  • Interview with Trey Ford – Black Hat 2012

    Updated: 2012-07-16 16:06:49
    If you’re a security professional, it’s very likely that you or folks you know are putting their last minute travel arrangements in place to go to Black Hat, the premier information security event happening during the week of July 21-26, 2012 in Las Vegas.

  • If a Security Control Falls in the Forest..

    Updated: 2012-07-16 15:18:00
    : . Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Interview Shortcuts | JackG

    Updated: 2012-07-15 04:19:56
    I’m starting to realize I rely heavily on a set of heuristics to determine if someone is likely to be in the 10% group. These don’t involve asking the interviewee about his life goals and then staring deeply into his eyes as he answers. They are simple shortcuts–usually yes/no questions. Hackers who fit my profile [...]

  • Preparing to Build Burp Extensions | Console Cowboys

    Updated: 2012-07-14 07:12:11
    This quick blog post will document getting started with developing Burp extensions using java. Burp provides interfaces for developers to hook into the Burp application and extend the application or integrate with other tools, this interface is documented on the following site - http://portswigger.net/burp/extender/ via console-cowboys.blogspot.com Posted via email from danielmiessler.com | posterous Related ContentExtending Burp [...]

  • Fewer Nicer Things | Allen Tucker

    Updated: 2012-07-14 04:15:35
    Overpaying means getting exactly what you need, often custom made to your specs, not some imaginary average person. At the end of the day you end up with a very few items that you deeply love, rather than a house stuffed with junk that is worthless to you a year later.  Life is simpler. via [...]

  • Weekly News Roundup 7/13/2012

    Updated: 2012-07-13 17:18:15
    The demand for security professionals is looking to surge: ”Ease the Need for IT Security Pros by Writing More Secure Code” by Thor Olavsrud. Today there are about 2.2 million people working as information security professionals, that number is expected to almost double to 4.25 million by 2015. and that still may not be enough to [...]

  • MultiObfuscator 2.00

    Updated: 2012-07-13 10:03:00

  • Hitchens Speaking About Death Towards the End of His Life

    Updated: 2012-07-12 23:51:38
    via youtube.com Posted via email from danielmiessler.com | posterous Related Content‪Hitchens on the Catholic ChurchNeil deGrasse Tyson on the Death of American DreamsHow Not to Do a PresentationSoul Food | Key & PeeleSeriously Fast Lyrics

  • Some of Sam Harris’ Best Points

    Updated: 2012-07-12 23:45:23
    via youtube.com Harris is the new Russell. Mine anyway. Posted via email from danielmiessler.com | posterous Related ContentSam Harris on Free WillSam Harris Answers Reddit’s QuestionsHarris Gives The Single Best Summary of Why Religious Belief is HarmfulWicked Table Tennis Points from Recent TournamentsPhenomenal Speech by a War Veteran

  • Buffer Overflow – The Many Flavors of AppSec

    Updated: 2012-07-12 18:29:47
    The end of the week is nearing again which means it's time for the final drink in our series "The Many Flavors of AppSec". So far you have seen the Anonymous, AppSec in the Cloud, SQL Injection and The Veracoder cocktails. This week we present the Buffer Overflow.

  • A Backdoor in gawk by thegrugg

    Updated: 2012-07-12 12:56:00

  • Hacked Joomla! v. [1.6.x] [1.7.x] [2.5.0-2.5.2] - Escalation of Privileges

    Updated: 2012-07-11 18:50:00
    <p

  • Mobile security updates 2012

    Updated: 2012-07-11 07:00:06
    This article will focus on how you can improve the security of your mobile devices against new and old threats.

  • Howto: Use openvpn config files on Mac OS X

    Updated: 2012-07-11 05:09:00
    </a

  • Participating in Hacker Hug Bingo

    Updated: 2012-07-11 03:05:02
    I’m still not sure how this got started.  I’m not even sure what the point is.  But in any case I’ve been volunteered for a spot on Hacker Hug Bingo at Black Hat, Defcon and BSides Las Vegas this year.  The point is for participants to meet some of the rogue’s gallery of security people [...]

  • Network Security Podcast, Episode 281

    Updated: 2012-07-11 00:47:45
    After a month off, we’re back, and just a couple of weeks ahead of BlackHat, DEFCON, and BSides Las Vegas.  We’re all so busy and tired we don’t even have any witty dialogue left over from the podcast for the show notes.  Not that anyone ever reads these things in any case. Network Security Podcast, [...]

  • Off the beaten Google Market

    Updated: 2012-07-10 17:13:49
    There have been a number of recent articles and blog posts around Android devices infected with various malware and malicious apps.  One recent nasty piece of malware found in many Chinese Android app stores is ‘Trojan!MMarketPay.A@Android’.   The interesting feature of this malware is that it can run up an unsuspecting user’s cell phone bill by [...]

  • Are You at Risk for Burnout? The Top Causes…and a Sneak Peek at Findings from a New Tenable Study

    Updated: 2012-07-09 17:56:44

  • DNS Changer ทำงานยังไงกันแน่

    Updated: 2012-07-09 10:57:00

  • DarkComet RAT Analyser and Link Download Of DarkComet 5.3.1

    Updated: 2012-07-07 16:23:00

  • Can’t load this page? Check your DNS settings.

    Updated: 2012-07-06 22:09:21
    Writing a blog post about a problem that causes your system to be unable to load websites is a bit like the FAQ on your ISP’s website that includes the question, “How do I get online?”. You have to chuckle at the great lengths people must go to in order to read that answer when [...]

  • Windows Server 2012: What's New in Security (Part 1) - DirectAccess Improvements

    Updated: 2012-07-04 07:00:37
    In this multi-part series, we'll take a look at what's new (and what's not) in security for Windows Server 2012.

Current Feed Items | Previous Months Items

Jun 2012 | May 2012 | Apr 2012 | Mar 2012 | Feb 2012 | Jan 2012