Not so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours, (Fri, Aug 31st)
Updated: 2012-08-31 19:13:32
Polish security firm Security Explorations has sent an advisory, with a proof-of-concept exploit, to ...(more)...

: Company Products Services Resources Veracode Blog All Things Security Our take on the daily happenings in the world of Application Security All Things Security Research Infographics Veracode Security Blog : Application security research , security trends and opinions ALL THINGS SECURITY Securing Your Application Perimeter : Get Results Securing Your Application Perimeter : Get Results Posted by Jasmine Noel in ALL THINGS SECURITY , August 30, 2012 Comments 0 In my last blog I discussed why web application inventory knowledge is so powerful . So I’m following that with what happens when enterprises actually get the inventory data for the first . time Usually the first reaction is OMG We have a lot of stuff . This is especially true when the discovery process detects applications outside
A great way to enable digital forensics of control system networks is to implement network security monitoring. Captured network traffic is a great source for evidence when analyzing an attackers steps as he attempts to hack a SCADA system. The newly added support for the IEC-104 protocol in Networ[...]
Here’s a quality link for those who wish to know what Obama has done with his time in office. It’s broken down by category and has a very crisp structure to it. So for anyone looking to: Learn for yourself what Obama has done. Provide data to others regarding what Obama has actually done. …this [...]
Photo by Till Achinger Here’s what we should be saying to people who attack us, and to those who panic when we are attacked. Actually, it’s quite easy to attack us. And we like it that way. That’s what freedom is. We’re not going to defend every street corner and mall with armed guards. No, [...]
Most seem to think you should exercise to avoid dying early. That’s an acceptable reason, I suppose, but it misses what I believe to be much more important. Exercise enables you to function the way you should function. It’s a magnifier of value. It helps you finish writing that book, to travel the world, and [...]
Enterprises have been scanning web applications for security vulnerabilities for some time now. So what’s the big deal between doing some application scans and securing your application perimeter?
Well the first thing is the sheer size and scale of today’s enterprise application perimeter – which we define as all of your Internet facing applications– including the enterprise applications accessed by mobile users...
While the entire security world looks to Microsoft on Patch Tuesday, we’re also keeping an eye on other critical technology vendors for their vuln announcements as well. Today, as part of our Patch Tuesday audit update, we’ll also be adding two new audits to our Retina scan engine to close a security vulnerability that can enable [...]
Over the next 2 to 3 weeks we'll be authoring a number of posts about our annual Hackathon that ran last week as one of our goals this time around was to share a lot more than we did for our inaugural Hackathon last year. Last week we kicked things off with our brief intro announcing the start of the Hackathon and today we keep things going with our photo round up.
In this article, we'll discuss the basics of SMB security and show you how to enable and configure some of these new SMB security features.