• A Description of Why Google Now is Superior to Siri

    Updated: 2012-09-30 06:23:47
    Google Now also introduces a new trick. It combines the constant stream of data a smartphone collects on its owner with clues about the person’s life that Google can sift from Web searches and e-mails to guess what he or she would ask it for next. This enables Google Now not only to meet a [...]

  • First Use of Passbook

    Updated: 2012-09-30 06:03:17
    So I got to use Passbook on the iPhone recently for a movie reservation and I really enjoyed it. It was Fandango, and I think I’m going to like this experience. Also, given the security issues with NFC I think it’s going to see more adoption than NFC anyway. I look forward to seeing the [...]

  • AT&T LTE Speeds

    Updated: 2012-09-30 01:31:50
    Posted via email from danielmiessler.com | posterous Related Content4S FlowerStudent FailFlowers and StoneCrescent Tree Shadows from EclipseMe in the Army

  • Bertrand Russell’s Message to the Future

    Updated: 2012-09-29 23:17:44
    via youtube.com I particularly like his first point. I wonder if was reading him that led me to agree with this position long ago. Posted via email from danielmiessler.com | posterous Related ContentSome of Sam Harris’ Best PointsPhenomenal Speech by a War VeteranNew Headz Up App | SNLTwo Things to Keep in Mind | Bertrand [...]

  • Fedora, Redhat, and CentOS

    Updated: 2012-09-29 19:36:33
    , ,

  • Mitt Romney’s Real Agenda | Rolling Stone

    Updated: 2012-09-29 18:28:49
    The GOP legislation awaiting Romney’s signature isn’t simply a return to the era of George W. Bush. From abortion rights and gun laws to tax giveaways and energy policy, it’s far worse. Measures that have already sailed through the Republican House would roll back clean-air protections, gut both Medicare and Medicaid, lavish trillions in tax [...]

  • How You Can Get Involved in National Cyber Security Awareness Month

    Updated: 2012-09-29 15:00:16
    The following is a guest blog from Michael Kaiser, executive director of the National Cyber Security Alliance. October is National Cyber Security Awareness Month. National Cyber Security Awareness Month is about everyone doing their part to make sure our online lives are kept safe and secure. The Internet is a shared resource and securing it [...]

  • Researchers Demonstrate 3D Spy Trojan for Mobile Phones

    Updated: 2012-09-28 23:30:00
    A team at the University of Indiana has created a program that once it infects a mobile phone can use the device as a remote-control spy that creates a 3D representation of places where the victims walks, such as an office or room in the home.

  • Chinese Gain Access to US Power Grid Management Systems | TechEye

    Updated: 2012-09-28 21:54:33
    The company whose software and services remotely administers and monitor large sections of the US energy industry began warning customers about a sophisticated hacker attack. Telvent Canada said that digital fingerprints left behind by attackers point to a Chinese hacking group tied to repeated cyber-espionage campaigns against key Western interests. It looks like the hackers [...]

  • Adobe certification revocation for October 4th, (Fri, Sep 28th)

    Updated: 2012-09-28 20:20:08
    Yesterday Adobe came out in a bog post stating an inappropriate use of an Adobe code signing c ...(more)...

  • The Morally Pure Way to Settle America

    Updated: 2012-09-28 18:59:18
    I’ve been thinking a lot about content for the book I’m working on, and given that the theme is speaking clearly and honestly about topics that are controversial I began wondering about the proper way to educate children about the colonization of America by Europe. For those not familiar, it used to be that Columbus [...]

  • Cloud Security Vendor Qualys Goes Public

    Updated: 2012-09-28 18:00:00
    The company, which sells its flagship QualsGuard Cloud Platform, wants to raise more than $98 million to invest in people, capital, sales and R&D.

  • Cisco Customers Discuss Its Future

    Updated: 2012-09-28 17:20:00

  • Ruby on Rails 101 with Ryan O’Boyle

    Updated: 2012-09-28 15:30:13
    Veracode Security Researcher Ryan O'Boyle educates us about Ruby on Rails. He answers the following questions: What is Ruby on Rails? What makes Ruby on Rails a popular framework? What types of companies are using Ruby on Rails?

  • Internet Explorer Shines in NSS Labs Browser Security Test

    Updated: 2012-09-28 04:30:00
    An analysis of Google Chrome, Apple Safari, Mozilla Firefox and Internet Explorer showed IE performed the best when it comes to fighting click fraud and malicious downloads.

  • Poll: Favorite Linux Distro For Servers

    Updated: 2012-09-28 01:10:25
    :

  • ISC Feature of the Week: Glossary, (Thu, Sep 27th)

    Updated: 2012-09-27 19:55:28
    Overview Our feature today is a page we just launched, the Glossary:Terms and Definitions pa ...(more)...

  • Paying Lip Service (Mostly) To User Education

    Updated: 2012-09-27 17:15:44
    Company Products Services Resources Veracode Blog All Things Security Our take on the daily happenings in the world of Application Security All Things Security Research Infographics Veracode Security Blog : Application security research , security trends and opinions ALL THINGS SECURITY Paying Lip Service Mostly To User Education Paying Lip Service Mostly To User Education Posted by Paul Roberts in ALL THINGS SECURITY , September 27, 2012 Comments 0 How well do consumer cyber security awareness efforts work That’s a good question , and one somebody might consider answering The connection between improved security and user education is so well-established as to be almost axiomatic . Better technology , coding practices and testing can only accomplish so much . If customers or employees

  • Booth Photos from the Gartner Information Security Summit Sept. 2012

    Updated: 2012-09-27 17:10:55
    We're back from the Gartner UK event in London! Thank you to everyone who came by our booth or attended our Solutions Provider Session. Here are a few pictures of the Veracode booth at the Mixology reception:

  • Perimeter Launches Mobile-Device-Management Solution

    Updated: 2012-09-27 17:00:00
    With BYOD initiatives introducing personal devices into the office, Perimeter launches an MDM solution to ease integration and bolster security.

  • Government Agencies, Utilities Among Targets in ‘VOHO’ Cyber-Spy Attack

    Updated: 2012-09-27 16:45:00
    An analysis of a cyber espionage attack finds that a stealthy Trojan infected nearly 1,000 organizations using the uncommon "waterhole" attack.

  • Microsoft Forefront Threat Management Gateway- Voted WindowSecurity.com Readers' Choice Award Winner - Firewall Software

    Updated: 2012-09-27 08:00:04
    Microsoft Forefront Threat Management Gateway was selected the winner in the Firewall Software category of the WindowSecurity.com Readers' Choice Awards. Check Point VPN-1 UTM and McAfee Firewall Enterprise were runner-up and second runner-up respectively.

  • New Java Vulnerability Allows Sandbox Bypass, Security Firm Says

    Updated: 2012-09-27 05:45:00
    Security researchers have discovered a new vulnerability impacting Java Standard Edition versions 5, 6 and 7 that allows attackers to bypass code sandbox defenses.

  • ISC StormCast for Thursday, September 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2833, (Thu, Sep 27th)

    Updated: 2012-09-27 02:00:30
    ...(more)...

  • Cisco IOS Security Advisory Bundle - http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html, (Thu, Sep 27th)

    Updated: 2012-09-27 01:58:44
    ...(more)...

  • Moving From Poisoning the Ocean to Poisoning the Watering Hole

    Updated: 2012-09-26 16:30:25
    RSA has published, “THE VOHO CAMPAIGN: AN IN DEPTH ANALYSIS” which describes an APT style campaign against several targets. The campaign used malicious content on several websites dubbed “watering holes” in order to compromise the campaign target’s client machines. Injecting malicious content into vulnerable websites that will then become a drive-by client attack to a [...]

  • There’s No ‘I’ in Team–Or App and Network Performance Management

    Updated: 2012-09-26 16:26:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Jim Rapoza Bio Archive Jim Rapoza Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center

  • More Java Woes, (Wed, Sep 26th)

    Updated: 2012-09-26 15:37:13
    A number of readers alerted us of news reports stating that new full sandbox escape vuln ...(more)...

  • Shellcode Converter Released by Levis

    Updated: 2012-09-26 09:47:00

  • Windows 8 Tablets: Secure enough for the Enterprise?

    Updated: 2012-09-26 08:00:07
    In this article, we'll look at both the obstacles and the reasons Windows 8 tablets just might be able to overcome barriers and take the enterprise by storm.

  • Auditing Open Ports on Windows Systems Using Nessus

    Updated: 2012-09-26 04:25:53
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Security Firm Identifies Top Words Used in Spear-Phishing Attacks

    Updated: 2012-09-26 03:50:00
    A new report from security software company FireEye details the top words used in malicious attachments and emails distributed by spear-phishers.

  • ISC StormCast for Wednesday, September 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2830, (Wed, Sep 26th)

    Updated: 2012-09-26 02:27:43
    ...(more)...

  • Some Android phones can be reset to factory default by clicking on links, (Wed, Sep 26th)

    Updated: 2012-09-26 02:03:44
    Many mobile browsers do support tel urls, These URLs start with tel: instead ...(more)...

  • Network Security Podcast, Episode 290

    Updated: 2012-09-26 00:58:33
    All three of us managed to make our recording time this week, and we had so much good stuff to talk about that we even skipped an interview Martin has in the can.  It went a little long, but hopefully folks will be willing to forgive us if the quality is good enough.  The quality [...]

  • Retina Helps Identify Weak Certificates

    Updated: 2012-09-26 00:08:42
    Microsoft has released a Security Advisory for the upcoming patch to increase minimum bit levels of certificates to 1024 bit security advisory 2661254.  The expected release date for this patch is Oct 9th at which time the update will be available through Windows Update. This change to the minimum bits level of certificates will change [...]

  • Iran Pursues Stronger, More Restrictive Cyber Strategies

    Updated: 2012-09-25 19:30:00
    ,

  • Upcoming IT Events for Networking and Storage Professionals

    Updated: 2012-09-25 17:01:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your company

  • BYOD Initiatives Require Careful Thought, Implementation

    Updated: 2012-09-25 16:15:00
    ,

  • Facebook Enables Users to Review Own Search History -- and Delete It, If Necessary

    Updated: 2012-09-25 15:30:00
    ,

  • Data Migration a Security Threat: Varonis

    Updated: 2012-09-25 15:30:00
    :

  • ITALIAN NATIONAL BANK Was Hacked

    Updated: 2012-09-25 09:35:00

  • 20 Security and Privacy Apps for Androids and iPhones

    Updated: 2012-09-25 07:51:00
    <a href="http://feedads.g.doubleclick.net/~a/iusCf5G-fhqVhyaUHI-SxePCFLk/1/da"

  • Penetration Testing With Online Tools.

    Updated: 2012-09-25 04:04:00

  • ISC StormCast for Tuesday, September 25th 2012 http://isc.sans.edu/podcastdetail.html?id=2827, (Tue, Sep 25th)

    Updated: 2012-09-25 03:42:58
    ...(more)...

  • Remote Wipe Samsung Galaxy S Series

    Updated: 2012-09-25 01:53:00

  • FERC Creates Office to Address Cyber-Security Threats to Energy Sector

    Updated: 2012-09-24 23:00:00
    The Federal Energy Regulatory Commission has established the Office of Energy Infrastructure Security to help identify and address both physical and cyber threats to the energy industry.

  • Security News Roundup | September 2012

    Updated: 2012-09-24 20:09:51
    September was an active month in terms of security commentary and news; ranging from an alleged Apple data hack to an IE 0day out-of-band patch release. Since I’m sure many of you are still catching up on the news, for your convenience I’ve included some of the more insightful September coverage below. I also encourage [...]

  • Tenable Inks Deal With In-Q-Tel

    Updated: 2012-09-24 14:33:20

  • Evilmaid_CHKDSK

    Updated: 2012-09-24 10:00:00

  • ISC StormCast for Monday, September 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2824, (Mon, Sep 24th)

    Updated: 2012-09-24 06:31:24
    ...(more)...

  • IE 0day Fixed in Out-of-Band Patch

    Updated: 2012-09-21 22:02:34
    Microsoft has released a patch to fix the IE 0day, CVE-2012-4969, along with four other privately reported CVEs that lead to remote code execution (CVE-2012-1529, CVE-2012-2546, CVE-2012-2548, and CVE-2012-2557). One interesting thing to note is that CVE-2012-2546 and CVE-2012-2548 only affect the most recent version of Internet Explorer, IE 9. The now-patched 0day, CVE-2012-4969, affects [...]

  • Remote Network Access: 10 Signs Its Time to Deploy Updated Control Software - Enterprise Networking - News & Reviews - eWeek.com

    Updated: 2012-09-21 19:50:59
    :

  • Notes from SOURCE Seattle

    Updated: 2012-09-21 13:53:25
    I got to attend my first SOURCE event last week, thanks to a lucky confluence of events which freed up my time.  Mainly, I didn’t have to go to the PCI Council’s Community Meeting and was able to take advantage of SOURCE Seattle instead.  I know many of the people involved in SOURCE and I’d [...]

  • Multiple interesting vulnerability of Product[2012-09-21]

    Updated: 2012-09-21 05:04:00

  • Why I’m Camping for the iPhone 5

    Updated: 2012-09-21 02:40:00
    When things are roughly similar, I value form over function. It’s that simple. Elegance, beauty, and design are all magnifiers of experience for me, and my daily device is the place where this matters most. But I also see the other side. Google Now is overwhelmingly superior to Siri. Google Maps makes the current version [...]

  • IBM X-Force Midyear Report: Vulnerabilities Up, Mobile Exploits Down

    Updated: 2012-09-20 19:26:00
    : , Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your

  • Howto: Jailbreak iOS6

    Updated: 2012-09-20 17:44:00

  • The Secure Software Supply Chain Toolkit

    Updated: 2012-09-20 17:38:33
    With yesterday's launch of our VAST (Vendor Application Security Testing) program comes our Secure Software Supply Chain Toolkit. This kit is aimed to get you on the road to reducing your company’s risk. We hope you find these best practices and tools helpful as you you and your vendors take steps to securing their applications.

  • Exploring Private Cloud Pipes

    Updated: 2012-09-19 18:48:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Joe Onisick Bio Archive Joe Onisick Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center

  • How important is Android 4 to BYOD?

    Updated: 2012-09-19 16:52:59
    Android 4 (so far dubbed Ice Cream Sandwich for 4.0.x or Jelly Bean for 4.1.x) is a significant upgrade to the user experience adding in many refinement and features.  For enterprises dealing with the Bring Your Own Device (BYOD) movement, some of these upgrades can be a double-edged sword. First let’s cover the positive — [...]

  • Cisco Flexes Custom Silicon Muscle for High-Frequency Trading Crowd

    Updated: 2012-09-19 16:43:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your company

  • Introducing VAST: Vendor Application Security Testing

    Updated: 2012-09-19 16:17:31
    Navigating the security superhighway of application perimeters, vendor software and in house development efforts can be a complex and intimidating task. We aim to shift your efforts to the fast lane with our new program, VAST! Today marks the official launch of our new Vendor Application Security Testing (VAST) program, designed to help enterprises manage the risks inherent in vendor-supplied software applications.

  • Accessing Active Directory Information with LDP

    Updated: 2012-09-19 07:00:03
    In this article, the author will expose some security issues related to LDAP and Active Directory, using a free Microsoft tool called LDP.exe

  • Network Security Podcast, Episode 289

    Updated: 2012-09-19 03:32:39
    Zach is out this week, but Rich and Martin hold the show together with some stories before cutting to an interview with Dwayne Melancon and Cindy Valladeres from TripWire.  Between Rich, Martin and the interview, this episode goes a little longer than normal. Network Security Podcast, Episode 289, September 18, 2012 Time:  45:56 Show notes: [...]

  • Pyro [Simple Python Browser Exploitation Framework ]

    Updated: 2012-09-18 07:34:00

  • Mmm, Smells Like 0day

    Updated: 2012-09-17 19:30:50
    Just when you thought we were out of the woods, Internet Explorer 0day shows up, in the wild. Here’s what you need to know about the vulnerability: Internet Explorer 6, 7, 8, and 9 are vulnerable (UPDATE: Out-of-band patch available now!) Use-after-free when the CMshtmlEd object is deleted and then the same area in memory [...]

  • Default Credentials: Low-hanging Fruit in the Enterprise

    Updated: 2012-09-17 13:36:42

  • The Merits of Admitting When You’re Wrong | Aaronsw

    Updated: 2012-09-15 00:46:52
    When Oprah started defending fabulist James Frey, she was savaged by the press. So she invited her critics on the show and apologized, saying “You were right, I was wrong.” It didn’t destroy her reputation; it rescued it. When the space shuttle Columbia exploded, launch manager Wayne Hale took full responsibility: “The bottom line is [...]

  • On Cognitive Dissonance | Arronsw

    Updated: 2012-09-15 00:43:52
    We all know people don’t like to hear bad news about themselves. Indeed, we go out of our way to avoid it — and when we do confront it, we try to downplay it or explain it away. Cognitive dissonance psychologists have proven it in dozens of experiments: Force students through an embarrassing initiation to [...]

  • Fixies vs. Grothers | Aaronsw

    Updated: 2012-09-15 00:40:41
    .

  • Perhaps the Most Important Element of Success | Aaronsw

    Updated: 2012-09-15 00:39:16
    The difference, Dweck discovered, was one of mindset. Dweck had always thought “human qualities were carved in stone. You were smart or you weren’t, and failure meant you weren’t.” That was why the helpless kids couldn’t take it when they started failing. It just reminded them they sucked (they easily got confused, they had “a [...]

  • iPhone 5 Carrier Option Comparison

    Updated: 2012-09-15 00:13:12
    via mgalligan.com Great collection of information. Posted via email from danielmiessler.com | posterous Related ContentAndroid vs. iPhone Support LifecyclesThe iPhone is the World’s #1 CameraTry a BookHow to Nap | Boston GlobeThe Chart That Should Accompany All Discussions of the Debt Ceiling – The Atlantic

  • Apple Needs to Cut Down on Its Use of “Amazing”

    Updated: 2012-09-14 08:20:53
    If everything is amazing, then nothing is. There are synonyms, guys. Related ContentAmazing ArtistCompletely Sick Desktop UIThe Most Amazing Con in HistoryThe iPhone 5 Doesn’t Need to be RevolutionaryBlog Ego Map

  • Balsamiq 2.2 Released | Balsamiq

    Updated: 2012-09-13 20:30:21
    A new editor look and feel As a programmer, I have always cared more about making my software SOLID rather than having it look pretty. When I was back at Adobe, my friend and colleague Nigel Pegg would spend hours tweaking the speed of an animation tween and working with our designer Tim Allen to [...]

  • Modern American Political Conservatism

    Updated: 2012-09-13 19:46:48
    Rich people paying rich people to convince middle class people to hate poor people. Sickening, really. Related ContentAdam Smith on the Rich and PoorThe Rich and Selfish Have Enlisted the Poor to Fight For ThemAndrew Gelman Talks Voting Patterns and IncomeA Brilliant Piece on FashionU.S. No Longer Land Of Opportunity’ | Here & Now

  • Metasploit post exploitation scripts to steal iOS 5 backups

    Updated: 2012-09-13 04:51:00

  • Web Shell Detector - Find the web shell in your server.

    Updated: 2012-09-13 04:20:00

  • The Secure Boot Controversy: What does it mean to IT?

    Updated: 2012-09-12 08:00:09
    In this article we'll talk about what the implications of the Secure Boot feature in Windows 8 are - both good and bad - for businesses

  • iTunes Receipt Malware Scam Launched with Apple Event

    Updated: 2012-09-12 07:21:14
    Cybercriminals are very good at taking advantage of the latest news to help further their intentions. Apple is in the middle of their latest product announcements and we’ve already gotten some malicious emails trapped in our spam traps. Clicking the links in this email leads them to a malicious website, delivering exploits and malware along the way. Below is an example of the iTunes receipt email, complete with all of the imagery to make it look authentic.

  • Network Security Podcast, Episode 288

    Updated: 2012-09-12 00:29:14
    Martin set up a new mailing list for his blog and the show, so be sure to sign up at the Network Security Blog. This week we take a moment to remember 9/11 and then move on to a full-staffed show. Network Security Podcast, Episode 288, September 11, 2012 Time: 31:56 Show notes: Preparing for [...]

  • September 11th – Lest We Forget.

    Updated: 2012-09-11 23:52:09
    Today marks the 11 year anniversary of the “September 11th” attacks. It is on these days of remembrance that our memory serves as a tool to heal us, to free us from the emotional burdens that can keep us from moving forward. This happens not by allowing these memories to fade from our consciousness, but [...]

  • Xen Server Escape Exploit News

    Updated: 2012-09-10 19:19:52
    In today’s ever expanding virtualized data center it’s critical to ensure hypervisors/host systems are properly secured and patched to prevent bleed over into often dense populations of the corporate infrastructure.  According to a recent blog post on Threatpost, French research firm VUPEN security has revealed exploit code that takes advantage of a vulnerability in Xen [...]

  • Install NetworkMiner with apt-get

    Updated: 2012-09-10 14:15:00
    Doug Burks has done a great work integrating NetworkMiner into Security Onion. One really cool thing he has done is to build a Debian repository that includes NetworkMiner. This means that NetworkMiner (and its dependencies) can be installed on Debian / Ubuntu machines by using apt-get! How to insta[...]

  • 4 Tips to Identify, Patch & Report on the Oracle Java Vulnerability

    Updated: 2012-09-07 22:24:05
    Last week our security research team provided some very enlightening information on a nasty Oracle Java vulnerability that until recently was a zero-day.  Oracle provided a patch for the vulnerability found in advisory (CVE-2012-4681)  and as a follow-up to the blog post by our security research team we wanted to share with you some easy [...]

  • Infocon: green

    Updated: 2012-09-06 00:01:46
    Adobe certification revocation for October 4th

  • $50 Million Series A Investment in Tenable from Accel Partners

    Updated: 2012-09-05 12:00:00
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Video: Security Compliance Manager 2.5: Understanding Baselines

    Updated: 2012-09-05 11:00:23
    This video introduces Microsoft Security Compliance Manager 2.5 and explains the concept of baselines.

  • Kon-Boot for Mac [Bypass login to your Mac]

    Updated: 2012-09-05 01:03:00

  • Howto: Installing Tor and Privoxy on Backtrack 5 R3

    Updated: 2012-09-05 00:55:00

  • Puppy-pl [MySQL/MSSQL Scanner & Injector]

    Updated: 2012-09-05 00:45:00

  • Check your Apple account was breach or not.

    Updated: 2012-09-05 00:24:00

  • Network Security Podcast, Episode 287

    Updated: 2012-09-04 23:39:16
    Martin and Zach take the helm sans Rich this week (deja vu!), and Martin edits this post to say something clever.  Or not. Network Security Podcast, Episode 287, September 4, 2012 Time: 35:45 Show notes: Oracle Knew About Currently Exploited Java Vulnerabilities for Months, Researcher Says Researchers find critical vulnerability in Java 7 patch hours [...]

  • 0-Day Java Vulnerabilities and Dealing with Vulnerable Client Software

    Updated: 2012-09-04 18:55:18
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

Current Feed Items | Previous Months Items

Aug 2012 | Jul 2012 | Jun 2012 | May 2012 | Apr 2012 | Mar 2012