• Not so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours, (Fri, Aug 31st)

    Updated: 2012-08-31 19:13:32
    Polish security firm Security Explorations has sent an advisory, with a proof-of-concept exploit, to ...(more)...

  • Co3 Systems

    Updated: 2012-08-31 16:52:10
    Please join us for a webinar on Data Loss/Breach Solutions: The Market Need and Solution Requirements. A data breach response plan is crucial to have in place before an incident occurs

  • VMware Updates, (Fri, Aug 31st)

    Updated: 2012-08-31 14:07:13
    VMware released one new security advisory, and updated 2 older once. New: VMSA-2012-0013 [1] The u ...(more)...

  • Romney’s Game Plan for RNC Speech

    Updated: 2012-08-31 03:55:31
    http://www.theonion.com/articles/romneys-acceptance-speech-to-avoid-mentionin… Posted via email from danielmiessler.com | posterous Related ContentPhenomenal Speech by a War VeteranStarving Third World Masses Warned Against Evils Of Contraception | The OnionLook, Are We Going To Spend The Rest Of This Board Meeting Talking About Why I’m Covered In Blood And Feces Or Are We Going To Talk Business? | The [...]

  • ISC StormCast for Friday, August 31st 2012 http://isc.sans.edu/podcastdetail.html?id=2773, (Fri, Aug 31st)

    Updated: 2012-08-31 02:30:26
    ...(more)...

  • Mahdi Malware Keeps Infecting Computers in U.S. and Abroad

    Updated: 2012-08-31 00:59:31
    The now notorious Mahdi espionage malware has hit more than 150 victims since June, a sign that attackers are modifying the surveillance malware so it can continue to infect computers by eluding detection, security experts say. - The Mahdi malware publicized in July has now spread its list of targets to organizations in the United States. According to Seculert, since June, Mahdi has been able to successful target more than 150 new victims around the world, including some tied to the U.S. and Germany. The latest round of vic...

  • Java Pwns Everyone…Again.

    Updated: 2012-08-30 20:44:08
    Java has a nasty habit of getting you owned. This latest 0day is no exception to the long-lived trend of reliable Java-based exploitation. Here’s what you need to know: How does it work? The current exploitation method being employed in the wild right now leverages two zero day flaws in Java. The first flaw leverages an [...]

  • Oracle Releases Java Security Updates, (Thu, Aug 30th)

    Updated: 2012-08-30 19:34:17
    A short while ago, Oracle released updates for both Java 6 and Java 7 in response to the critical 0- ...(more)...

  • Securing Your Application Perimeter: Get Results

    Updated: 2012-08-30 17:39:32
    : Company Products Services Resources Veracode Blog All Things Security Our take on the daily happenings in the world of Application Security All Things Security Research Infographics Veracode Security Blog : Application security research , security trends and opinions ALL THINGS SECURITY Securing Your Application Perimeter : Get Results Securing Your Application Perimeter : Get Results Posted by Jasmine Noel in ALL THINGS SECURITY , August 30, 2012 Comments 0 In my last blog I discussed why web application inventory knowledge is so powerful . So I’m following that with what happens when enterprises actually get the inventory data for the first . time Usually the first reaction is OMG We have a lot of stuff . This is especially true when the discovery process detects applications outside

  • Editorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial, (Thu, Aug 30th)

    Updated: 2012-08-30 15:09:27
    ------ Johannes B. Ullrich, Ph ...(more)...

  • Tenable Recognized by Inc. Magazine for Outstanding Growth

    Updated: 2012-08-30 14:50:10

  • ISC StormCast for Thursday, August 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2770, (Thu, Aug 30th)

    Updated: 2012-08-30 04:03:14
    ...(more)...

  • HyTrust Adds 'Secondary Approval' Security to Protect Virtual Environments

    Updated: 2012-08-30 02:55:20
    HyTrust, producer of policy management and access control technology to protect virtual environments, has added a critical feature to prevent accidental– or intentional–damage to virtual resources. - HyTrust, which delivers policy management and access control technology to virtual environments, has added a new feature to its new HyTrust Appliance 3.0 that requires two people to approve certain tasks to protect against accidental or malicious actions that could harm the virtual environment. Cal...

  • Security Researchers Document Wiper Malware`s Disappearing Act

    Updated: 2012-08-30 02:02:05
    Following the unrelated "copycat" Shamoon attack, Kaspersky Lab discusses its research into a mysterious attack on Iranian systems earlier this year, stressing that the program known as Wiper did such a good job of deleting itself that little evidence exists. - Late last year and earlier this year, attackers snuck into Iranian systems and did something. Exactly what happened will likely never be known, however, because their last act was to run a program now known in the security community as quot;Wiper quot; malware that deleted almost every trace of t...

  • SCADA Network Forensics with IEC-104

    Updated: 2012-08-30 01:03:00
    A great way to enable digital forensics of control system networks is to implement network security monitoring. Captured network traffic is a great source for evidence when analyzing an attackers steps as he attempts to hack a SCADA system. The newly added support for the IEC-104 protocol in Networ[...]

  • Accused LulzSec Hacker Indicted for Attack on Sony Network

    Updated: 2012-08-29 19:53:49
    FBI agents arrested an Arizona man who has been indicted on charges of impairing a protected computer and conspiracy in connection with a hack on Sony Pictures Entertainments network. - Another reputed member of the LulzSec hacking crew has been charged with attacking the computer network of Sony Pictures Entertainment last year. Raynaldo Rivera of Tempe, Ariz., was arrested Aug. 28 by FBI agents. On Aug. 22, Rivera was indicted by a federal grand jury in Los Angeles on charge...

  • "Data" URLs used for in-URL phishing, (Wed, Aug 29th)

    Updated: 2012-08-29 14:51:28
    The use of data URLs in cross site scripting and other attacks isn't exactly new. But th ...(more)...

  • Windows Server 2012 Virtualized Domain Controllers

    Updated: 2012-08-29 09:00:04
    In this article, we will discuss some of the issues involved in deploying and managing secure virtualized domain controllers

  • Etherwall : Tool For Prevents Man in The Middle Attack

    Updated: 2012-08-29 05:04:00
    <a href="http://feedads.g.doubleclick.net/~a/IP3opZHBgLMWGbgsZ0QDd5z0T8c/0/da"

  • ISC StormCast for Wednesday, August 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2767, (Wed, Aug 29th)

    Updated: 2012-08-29 03:21:31
    ...(more)...

  • Network Security Podcast, Episode 286

    Updated: 2012-08-29 01:45:22
    We shouldn’t let Rich take care of the show notes.  Sometimes he simply reuses last week’s show notes and forgets to change the flavor text at all.  In which case we give him a hard time.  After short break, the whole gang is together again this week, though Rich let it drop that this streak [...]

  • The Good, Bad and Ugly about Assigning IPv6 Addresses, (Mon, Aug 27th)

    Updated: 2012-08-28 22:55:46
    As you are planning to roll out IPv6, one of the questions that keeps coming up is how to assign add ...(more)...

  • HP ShadowLabs is Looking for an Infrastructure Ninja

    Updated: 2012-08-28 20:26:50
    HP Shadowlabs is looking for someone with extremely strong skills in the following areas: Linux Oracle InfoSec Uber sysadmin skills Wicked Problem Solving General kickassedness We’re looking for someone with a good amount of experience in these areas. People interested must be willing to deal with working from home for an awesome team with a [...]

  • Using Veracode’s SaaS Engine to Quickly Roll Out Scanning Programs

    Updated: 2012-08-28 16:25:52
    Company Products Services Resources Veracode Blog All Things Security Our take on the daily happenings in the world of Application Security All Things Security Research Infographics Veracode Security Blog : Application security research , security trends and opinions ALL THINGS SECURITY Using Veracode’s SaaS Engine to Quickly Roll Out Scanning Programs Using Veracode’s SaaS Engine to Quickly Roll Out Scanning Programs Posted by Neil DuPaul in ALL THINGS SECURITY , August 28, 2012 Comments 0 Subscribe by RSS Meet Our Bloggers Chris Wysopal , Co-Founder and Chief Technology Officer Chris Eng , Vice President of Research Tyler Shields , Senior Security Researcher Brandon Creighton , Senior Security Researcher Isaac Dawson , Senior Security Researcher Christien Rioux , Co-Founder and Chief

  • Persistent Cannabis Users Show Neuropsychological Decline

    Updated: 2012-08-28 06:55:26
    Persistent cannabis use was associated with neuropsychological decline broadly across domains of functioning, even after controlling for years of education. Informants also reported noticing more cognitive problems for persistent cannabis users. Impairment was concentrated among adolescent-onset cannabis users, with more persistent use associated with greater decline. Further, cessation of cannabis use did not fully restore [...]

  • Gene Sequencing and Ethical Puzzles | NYTimes.com

    Updated: 2012-08-28 06:39:38
    In laboratories around the world, genetic researchers using tools that are ever more sophisticated to peer into the DNA of cells are increasingly finding things they were not looking for, including information that could make a big difference to an anonymous donor. The question of how, when and whether to return genetic results to study [...]

  • Getting to Know the OWASP ASVS | HP Enterprise Security

    Updated: 2012-08-28 06:33:53
    The Open Web Application Security Project OWASP is well known for its Top 10 list, and perhaps for its testing methodology as well, but comparitively few people are aware of its Application Security Verification Standard (ASVS) Project.  The ASVS, as the name alludes to, is a standard for verifying the security of applications as opposed to a methodology [...]

  • A Lists of Obama’s Accomplishments

    Updated: 2012-08-28 02:40:25
    Here’s a quality link for those who wish to know what Obama has done with his time in office. It’s broken down by category and has a very crisp structure to it. So for anyone looking to: Learn for yourself what Obama has done. Provide data to others regarding what Obama has actually done. …this [...]

  • Java Zero-Day Attack Threats Widening, Security Experts Warn

    Updated: 2012-08-28 01:05:12
    Attackers exploit a previously unknown vulnerability in Java to attack at least one firm, but the speedy inclusion of the attack in popular exploit kits threatens wider compromises. - Security firms warned business users and consumers to remove Java if possible, after one company identified an attack against its customers using a previously unknown vulnerability in Java. On Aug. 24, threat-protection firm FireEye stopped an attack targeting the flaw and over the weekend confirme...

  • Saudi Aramco Oil Company Says It Fought Off Malware Attack

    Updated: 2012-08-27 20:56:17
    Approximately 30,000 workstations were hit in a cyber-attack this month, but the company says it has cleaned the systems and restored them to service. - Saudi Aramco, the national oil company of Saudi Arabia, has cleaned its workstations and resumed operations after a malware attack struck the company's systems, according to company officials. On Aug. 15, the company was hit with a cyber-attack, and in response it disconnected its electronic system...

  • Dropbox Introduces Two-Step Security Authentication

    Updated: 2012-08-27 18:45:17
    Popular cloud-based storage site Dropbox adds two-step authentication in an effort to beef up security. - The online storage and file-sharing site Dropbox is rolling out two-step security authentication in the wake of high-profile security breaches affecting Dropbox users and other cloud-based companies. The company announced the news via one of its community tech forums. Two-step verification, offered ...

  • The Hardest Part of BYOD Management? Policy

    Updated: 2012-08-27 15:41:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Lee H . Badman Bio Archive Lee H . Badman Network Computing Blogger Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security

  • Put up or shut up: Lead with action, not words

    Updated: 2012-08-27 04:15:37
    Oracle CSO, Mary Ann Davidson, says information sharing isn’t happening based on her experience as CSO and President of an IT Information Sharing and Analysis Center (IT-ISAC) chapter.  I think someone who says information sharing isn’t going on is looking in the wrong places and has her head stuck in the sand.  Her conclusions are [...]

  • Christopher Hitchens Destroys Ayn Rand

    Updated: 2012-08-27 02:10:46
    via youtube.com I’m invited to be unpleasant at the expense of Ayn Rand.Hilarious. A beautiful simplification: Basically, there is no need for additional selfishness in the United States, and that’s precisely what Ayn Rand and her morally vapid Objectivism is promoting. It’s no wonder it’s so popular with the Tea Party and other idiots on [...]

  • Me and White Wine

    Updated: 2012-08-27 00:33:27
    The only conundrum is why I keep trying to drink white wine at all. At this point in my early understanding of wine, it’s cab or nothing. Related Content‘You Are Not So Smart’: Why We Can’t Tell Good Wine From Bad | AtlanticNew Jersey Wine Competes with French Wine, at 5% of the CostThe Beverage [...]

  • Crisis Virus Poses Low Risk to Virtual Machines, Danger Seen in Future

    Updated: 2012-08-26 16:59:24
    The Crisis virus poses no real danger for virtual machines, but the malware does presage a likely move by criminals and attackers toward finding better ways of infecting virtualized servers and infrastructure. - The Crisis virus poses no real danger for virtual machines, but the malware does presage a likely move by criminals and attackers toward finding better ways of infecting virtualized servers and infrastructure, security experts said this week. While Crisis can infect Windows machines and spread from...

  • Cyber-Crime Crackdown Results in 357 Arrests in Philippines

    Updated: 2012-08-25 15:18:05
    Police in the Philippines arrested 357 foreign nationals Thursday as part of an investigation into banking cyber-crime that mainly targeted victims in China. - Police in the Philippines arrested 357 foreign nationals Thursday as part of an investigation into banking cyber-crime that mainly targeted victims in China. Most of those arrested were Taiwanese or from mainland China, according to authorities. Samuel D. Pagdilao Jr., chief of the Criminal Investi...

  • Nordic vs. American Justice | The Atlantic

    Updated: 2012-08-25 08:24:49
    .

  • The Teachings of Vim Master Wq

    Updated: 2012-08-25 04:12:55
    http://blog.sanctum.geek.nz/vim-koans/ Posted via email from danielmiessler.com | posterous Related ContentBlog Using Email Using PosterousAnti-viral Breakthrough AcheivedThe Annoyed Geek’s Response to Stupid Computer QuestionsPreview: Instapaper on iPad – Instapaper BlogDown the RogueAV and Blackhat SEO Rabbit Hole | SANS

  • Windows Update Phishing Scam Steals Your Online Accounts

    Updated: 2012-08-24 20:34:21
    Be on the lookout for this new phishing threat making the rounds today. This tricky attack warns the user about a “deadly virus” that will damage the users hard drive. The link in the email leads a phishing website asking the user to log into their Yahoo, Gmail, Windows Live, AOL, or other email account, stealing the users credentials along the way.

  • The Answer to Terrorism is Resilience

    Updated: 2012-08-24 17:21:28
    Photo by Till Achinger Here’s what we should be saying to people who attack us, and to those who panic when we are attacked. Actually, it’s quite easy to attack us. And we like it that way. That’s what freedom is. We’re not going to defend every street corner and mall with armed guards. No, [...]

  • Take a Logic Class

    Updated: 2012-08-24 17:07:04
    In summary, reasoning training altered multiple measures of white matter structure in young adults. While the cellular underpinnings are unknown, these results provide evidence of experience-dependent white matter changes that may not be limited to myelination. via frontiersin.org Posted via email from danielmiessler.com | posterous Related ContentPaint Your Roofs White, by Bill Clinton | The [...]

  • Computing Environment Optimizations

    Updated: 2012-08-24 06:20:12
    I’ve been slowly adding some optimizations to my overall computing environment. Here are a few–some of which I’ll write about extensively: Switched to zsh as my default shell in OS X. Used the Oh My Zsh configuration options to do so, and the article here for further config. Had a brilliant Vim session with Steven [...]

  • Adobe Flash Player Bug Spreading Via Word Documents in Emails

    Updated: 2012-08-24 01:21:45
    Symantec offers some more details on the attack targeting a now-patched flaw in Adobe Flash Player. The attacks were continuing as of Aug. 21, targeting unpatched machines. - Attackers are targeting a patched bug in Adobe Flash Player spread via malicious Microsoft Word documents. The attacks are focused on CVE-2012-1535, a remote code execution vulnerability that impacts Windows, Macs and Linux systems. Adobe Systems patched the flaw Aug. 14 in a regular security up...

  • McAfee Offers New Privacy Protection to Android Device Users

    Updated: 2012-08-23 22:03:09
    New features in McAfees Mobile Security software are aimed at keeping dangerous Android apps from stealing personal information. - McAfee is expanding its mobile security solution with privacy features to protect Android tablet and smartphone users from apps that may look to access personal information on their devices. At a time when the number of cyber-attacks on Android-based devices is skyrocketing, McAfees Mobile Security...

  • Google Recruiting Privacy, Security Specialist in Wake of FTC Fines

    Updated: 2012-08-23 21:38:31
    Google is looking for a new data privacy engineer for its Privacy Red Team to help the company continue to improve its data security practices in the wake of a $22.5 million fine for allegedly bypassing privacy settings for the Safari Web browser. - On the heels of a $22.5 million fine from the Federal Trade Commission in July for allegedly bypassing the privacy settings of Apple's Safari Web browser, Google is looking to hire a new privacy engineer for its Privacy Red Team that adds an extra layer of scrutiny to its security practices. In...

  • Microsoft Windows Server Update Services - Voted WindowSecurity.com Readers' Choice Award Winner - Patch Management

    Updated: 2012-08-23 09:00:04
    Microsoft Windows Server Update Services was selected the winner in the Patch Management category of the WindowSecurity.com Readers' Choice Awards. Altiris Client Management Suite and GFI LANguard were runner-up and second runner-up respectively.

  • Newly Detected Crisis Virus Infects Windows, Macs and Virtual Machines

    Updated: 2012-08-23 01:14:48
    The malicious Java executable, which hasnt been observed in the wild, spreads not only among Windows machines, but includes code to infect Macs and VMware virtual machines. - A computer virus that aims to infect Windows machines and steal data can also opportunistically infect Apple's Mac OS X and VMware virtual machines, security firms said this week. The malware, called Crisis, can spread through the autorun functionality of removable disk drives, install component...

  • Researchers Say Shamoon Possibly Linked to Attack on Saudi Oil Company

    Updated: 2012-08-23 00:31:38
    Kaspersky Lab says a coding error makes it unlikely the developers of the Shamoon malware are linked to a previous attack on Iranian systems earlier this year. - Evidence has surfaced linking the Shamoon malware attack to a group of hacktivists who claim that they are protesting oppression in the Arab world. Eugene Kaspersky, CEO of Kaspersky Lab, confirmed in a tweet Aug. 22 that the date and time hardcoded into Shamoon matched the date and time of an a...

  • Google to Merge Postini Email Security Services Into Google Apps

    Updated: 2012-08-22 21:17:33
    Five years after Google bought Postini, the company is changing how it will deliver the email security services to customers. Along with this change, Google is encouraging Postini customers to try Google Apps. - Google is ending its stand-alone Postini email security offering and merging it into its Google Apps products as part of a consolidation move to simplify its services. The move comes almost five years after Google purchased Postini in September 2007 for about $625 million. Since the acquisition, Go...

  • Intelligence vs. Effort | Arronsw

    Updated: 2012-08-22 18:42:51
    .

  • Five Systems You’re Forgetting to Patch

    Updated: 2012-08-22 16:22:00

  • Malwares impact, serious and long lasting

    Updated: 2012-08-22 08:00:00
    In this article, the author will focus on malware like Flame and others, and measures that can be taken to counter these threats.

  • The Real Reason to Exercise

    Updated: 2012-08-20 21:06:28
    Most seem to think you should exercise to avoid dying early. That’s an acceptable reason, I suppose, but it misses what I believe to be much more important. Exercise enables you to function the way you should function. It’s a magnifier of value. It helps you finish writing that book, to travel the world, and [...]

  • Securing Your Application Perimeter: What to Test for Vulnerabilities

    Updated: 2012-08-20 17:41:31
    Enterprises have been scanning web applications for security vulnerabilities for some time now. So what’s the big deal between doing some application scans and securing your application perimeter? Well the first thing is the sheer size and scale of today’s enterprise application perimeter – which we define as all of your Internet facing applications– including the enterprise applications accessed by mobile users...

  • Reimagining Cisco: You Aren’t a Box Seller

    Updated: 2012-08-20 17:31:00
    : Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Art Wittmann Bio Archive Art Wittmann Managing Director , InformationWeek Reports Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing ,

  • Reimaging Cisco: You Aren’t a Box Seller

    Updated: 2012-08-20 17:31:00
    : Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Art Wittmann Bio Archive Art Wittmann Managing Director , InformationWeek Reports Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing ,

  • The solution to bad teachers isn’t…

    Updated: 2012-08-20 04:47:58
    “Here in America,” Sahlberg said at the Teachers College, “parents can choose to take their kids to private schools. It’s the same idea of a marketplace that applies to, say, shops. Schools are a shop and parents can buy what ever they want. In Finland parents can also choose. But the options are all the [...]

  • Self-publishing via DNA | Discover Magazine

    Updated: 2012-08-20 04:32:54
    I have been meaning to read a book coming out soon called Regenesis: How Synthetic Biology Will Reinvent Nature and Ourselves. It’s written by Harvard biologist George Church and science writer Ed Regis. Church is doing stunning work on a number of fronts, from creating synthetic microbes to sequencing human genomes, so I definitely am [...]

  • Betrand Russell on Free WIll

    Updated: 2012-08-20 04:18:34
    When a man acts in ways that annoy us we wish to think him wicked, and we refuse to face the fact that his annoying behavior is the result of antecedent causes which, if you follow them long enough, will take you beyond the moment of his birth, and therefore to events for which he [...]

  • Keystone Habits | Joel Is

    Updated: 2012-08-20 02:40:14
    After I’d finished in the gym, I went straight home and had my usual breakfast of 4 Weetabix. As soon as I’d finished, I opened my MacBook Air, turned on the Pomodoro app and set the timer ticking for 30 minutes. I spent 30 minutes replying to emails from my “to-reply” label in Gmail, and [...]

  • My Favorite Dancer Does It Again | NonStop

    Updated: 2012-08-20 02:04:11
    via youtube.com Un. Believable. Posted via email from danielmiessler.com | posterous Related ContentAn Intro to DubstepMy Favorite IllusionNew Headz Up App | SNLPraha OpeningA Creative Song

  • What do you want to know about "Pentesting"

    Updated: 2012-08-19 15:55:00

  • Reverse IPv6 By Struct.it

    Updated: 2012-08-19 15:51:00

  • Howto: Upgrade from Backtrack 5 R2 to Backtrack 5 R3

    Updated: 2012-08-19 14:57:00

  • How to hack website with Metasploit[Thai Language]

    Updated: 2012-08-17 18:44:00

  • Just Released Blink 6.0: Advanced Endpoint Protection

    Updated: 2012-08-16 15:00:31
    It has been a long time since any vendor has introduced game changing features to end point protection solutions. We have seen claims of better anti-virus protection, advanced persistent threat protection (APT), and even claims of massive resource savings using their latest versions. BeyondTrust believes in a defense in depth approach to end point protection [...]

  • Nessus - The Swiss Army Knife of Vulnerability Scanning

    Updated: 2012-08-16 13:45:02
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Tenable Receives Highest Rating of "Strong Positive" in Gartner Vulnerability Assessment MarketScope Report

    Updated: 2012-08-16 13:02:07

  • User Accounts, Group Accounts, and Access Control Lists

    Updated: 2012-08-15 07:00:02
    This article looks at the importance of properly confinguring access control lists (ACLs).

  • Network Security Podcast, Episode 285

    Updated: 2012-08-15 00:52:35
    This week we’re joined by Adrian Lane (Rich’s coworker, but it was Martin’s idea) to give us some more insight on his latest WAF research. The WAF situation is actually a lot more nuanced than the “sucks/wins” arguments we usually hear. And, as usual, we also discuss the latest security news (without Zach, who has [...]

  • August 2012 Patch Tuesday – Oracle PWNS Microsoft, story at 11!

    Updated: 2012-08-14 20:15:58
    Oracle can be the butt of a lot of jokes when it comes to software security researchers. This Patch Tuesday, however, Oracle has taken things to the next level by not just having poorly secured products of their own but also providing the world with a remote vulnerability within Microsoft Exchange. Microsoft security bulletin MS12-058 [...]

  • Oracle Gets in the Patch Tuesday Mix

    Updated: 2012-08-14 18:52:19
    While the entire security world looks to Microsoft on Patch Tuesday, we’re also keeping an eye on other critical technology vendors for their vuln announcements as well. Today, as part of our Patch Tuesday audit update, we’ll also be adding two new audits to our Retina scan engine to close a security vulnerability that can enable [...]

  • Howto: Install HTTPFS on Backtrack 5 R2

    Updated: 2012-08-14 16:42:00

  • Using "Git Clone" to get Pwn3D By SkullSecurity

    Updated: 2012-08-14 16:26:00

  • exploit-exercises.com - learning hacking virtual machines

    Updated: 2012-08-14 16:21:00

  • Veracode Hackathon 2012 in Pictures

    Updated: 2012-08-13 18:48:51
    Over the next 2 to 3 weeks we'll be authoring a number of posts about our annual Hackathon that ran last week as one of our goals this time around was to share a lot more than we did for our inaugural Hackathon last year. Last week we kicked things off with our brief intro announcing the start of the Hackathon and today we keep things going with our photo round up.

  • Clone All Programs In Your Debian Based Distro

    Updated: 2012-08-13 03:23:00

  • Tenable Releases SecurityCenter Continuous View

    Updated: 2012-08-09 18:57:34

  • Penetration testing with httpfs: RFI

    Updated: 2012-08-09 05:36:00

  • Web Shell Detector - To find and identify php shells

    Updated: 2012-08-09 04:17:00

  • Stuxnet: The New Face of 21st Century Cyber Warfare Infographic

    Updated: 2012-08-08 15:29:29

  • Secure SMB Connections

    Updated: 2012-08-08 07:00:02
    In this article, we'll discuss the basics of SMB security and show you how to enable and configure some of these new SMB security features.

  • Network Security Podcast, Episode 284

    Updated: 2012-08-08 00:00:07
    Martin has decided to give Zach and Rich the week off, since he’s on the road and won’t be able to record a proper show this week.  Or he had a couple of interviews he did at Black Hat that needed to get out and didn’t feel like releasing as microcasts.  Take your pick.  Bryan [...]

  • iAPCracker - AppStore in-app purchasing algorithms

    Updated: 2012-08-07 17:44:00

  • Windows Hacking Toolset

    Updated: 2012-08-07 11:37:00

  • Portspoof - service signature obfuscator

    Updated: 2012-08-07 01:05:00

  • 2012 Business Banking Trust Trends Study

    Updated: 2012-08-06 20:54:39
    Small businesses are increasing their use of online and mobile banking but the 2012 Business Banking Trust Trends Study reveals that they have mixed feelings about their primary financial institution

Current Feed Items | Previous Months Items

Jul 2012 | Jun 2012 | May 2012 | Apr 2012 | Mar 2012 | Feb 2012