June 27, 2011 Added by:Jamie Adams
When I first heard ridiculous-sounding terms like smurf attack, fraggle attack, Tribal Flood Network (TFN), Trinoo, TFN2K, and stacheldraht, I didn't take them too seriously for a couple of reasons — I worked mainly on non-Internet facing systems, and I was never a victim...
June 24, 2011 Added by:Danny Lieberman
The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...
June 02, 2011 Added by:Lee Munson
If you are a computer security consultant, there is no better tool to use than Backtrack. If you own a company that has to store important data, then it is vital for you to have a tool like this so your security people can test your network with the same tools the bad guys are using...
April 06, 2011 Added by:Headlines
“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."
April 06, 2011 Added by:Headlines
There is more than a touch of irony to the notion that a "jailbroken" PlaySation3 running an unsanctioned Linux operating system, the very impetus for the legal action brought by Sony against Hotz and Egorenkov, would be employed in a DDoS attack against Sony domains...
March 30, 2011 Added by:Bozidar Spirovski
Manufacturers lock their consoles through a firmware protection mechanism that allows only signed code to run, and a lot of people attempt to bypass these protections to run custom code. Bypassing is illegal, but we are going to discuss some methods for different consoles...
March 13, 2011 Added by:Anthony M. Freed
"Apple doesn't have a perceived security problem by customers and so they haven't had a need to invest heavily in it. I've done what I can to try to educate people that Apple products aren't magical and can have security problems like every other product..."
March 11, 2011 Added by:Dan Dieterle
It looks like Microsoft may be forced into making a decision. To change and adapt to the times, or continue with business as usual and end up becoming obsolete. But hey, they still have the XBox right?
March 01, 2011 Added by:Jamie Adams
On February 28 the U.S. Government Configuration Baseline (USGCB) for Red Hat Enterprise Linux 5 was released. The long awaited Security Content Automation Protocol (SCAP) content is the next phase in supplanting the legacy Bourne shell scripts known as the System Readiness Review (SRR) scripts...
February 22, 2011 Added by:Rod MacPherson
Once a hacker (if they have malicious intent we'll call them crackers) has found a way onto a system s/he then usually needs to jump to the Administrator or system or root account. Ninja is a program for Linux (and presumably most Unix like OSes) that monitors for such privilege escalation...
February 16, 2011 Added by:PCI Guru
You have options to avoid a failing vulnerability scan because of an unsupported OS. The best method, and the one I most recommend, is do not use unsupported operating systems in the first place. However, as a former CIO, I do understand the real world and the issues IT departments face...
February 10, 2011 Added by:Jamie Adams
Organizations which use Red Hat Enterprise Linux 5 and must adhere to the DISA UNIX STIG have been stuck with documentation and assessment tools which only support up to Red Hat Enterprise Linux 4. This frustrates system administrators because they must deal with false positives From SRR scripts...
February 03, 2011 Added by:Ron Baklarz
The protocol allows for 340 undecillion addresses, which is 340 trillion groups of one trillion networks each that can handle a trillion devices. If the IPv4 pool of 4.3 billion addresses were the size of a golf ball, the new 340 undecillion IPv6 addresses would be about the size of the sun...
January 26, 2011 Added by:Danny Lieberman
If you are a real hacker, look for companies with security administrators who are certified for Microsoft ISA server and you will have nothing to worry about. But if your target security administrators are facile with Wireshark, Ratproxy and Fiddler and Metasploit, then you should be really worried...
January 18, 2011 Added by:Guy Huntington
The open source formula usually delivers free software with a low yearly license. Use of this software should lower enterprises overall physical security budget over time as opposed to paying proprietary vendors large purchase amounts and annual license fees...
January 10, 2011 Added by:Jamie Adams
Secure Shell is the best method for remote access due to its flexibility and security. It makes it attractive for system administrators as well as system developers and architects. The ability to easily execute commands on remote systems and retrieve files over “secure” channels is seductive...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013