Blog Posts Tagged with "Vulnerabilities"


DDoS Attacks Aim to Censor Human Rights Groups

November 02, 2010 Added by:Anthony M. Freed

A rash of DDoS attacks were levied against the websites of at least six human rights organizations in an attempt at cyber censorship for the airing of controversial video footage that allegedly shows human rights abuses on the part of the Indonesian government against several Papuan civilians...

Comments  (1)


Managing Risk and Keeping Your Network Secure

October 20, 2010 Added by:Sasha Nunke

The goal of security is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. The management of Risk and Vulnerability Management is one of the counter‐measures easily justified by its ability to optimize risk...

Comments  (0)


Is Your Network Proactively Safe?

October 12, 2010 Added by:Evandro Rodrigues

IDS is a system that detects all network traffic and identifies suspicious activities that may indicate an external or internal attack, targeting systems and network decrease. But IDS is passive, it just monitors attacks, intrusions and exploits, and generating alerts and reports...

Comments  (0)


Ligatt Site Still Vulnerable to Basic Code Injections

October 07, 2010 Added by:K S Abhiraj

The iframe injection is a kind of injection of one or more iframe tags into a page's content. The iframe can typically do many malicious things, such as downloading an executable application that containing malware which may directly compromise a visitor's system...

Comments  (2)


Vulnerability Management in the Cloud

October 07, 2010 Added by:Lawrence Pingree

Cloud providers will more than likely need to provide application programming interfaces which will allow the scan engines/management consoles to read-in current asset or deployment information from the cloud and then dynamically update the IP address information before scans commence...

Comments  (1)


DARPA: Building Super Security

October 06, 2010 Added by:Daniel Ruggles

DARPA in June 2010 announced the Clean‐Slate Design of Resilient, Adaptive Secure Hosts - CRASH. It relies on human biology to develop super-smart, highly adaptive, supremely secure networks. CRASH program looks to translate human immune system strategies into computational terms....

Comments  (0)


Revenge of the Bind Shell

September 30, 2010 Added by:Rob Fuller

At the April 2010 NoVA Hackers meeting I discussed some of the offensive uses of IPv6 on current networks. Well, around that time Microsoft issued a patch to all of the supported versions of Windows that broke my methodology. Obviously I wasn’t the only one doing this...

Comments  (0)


Top 10 Reports for Managing Vulnerabilities

September 29, 2010 Added by:Sasha Nunke

This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability management lifecycle and shows what reports today's best-in-class organizations are using to reduce risks on their network infrastructure...

Comments  (0)


Stuxnet Worm Reveals Default Password Vulnerabilities

September 27, 2010 Added by:Jamie Adams

NATO spokesman James Appathurai denied that the computers were regularly compromised. However, I didn't hear him dispute the fact that the systems were missing many of the basic security patches. So, is it just a matter of time? Or have the systems already been comprised but NATO is unaware?

Comments  (22)


SAMBA Vulnerability Could Be Dangerous

September 22, 2010 Added by:Brent Huston

If you are not already looking at the newest SAMBA issue, you should be paying attention. It is a stack-based buffer overflow, exploitable remotely without credentials. The MetaSploit folks are already hard at work on an exploit and some versions are rumored to be floating about the underground...

Comments  (0)


It's a Feature - Remote Tapping a Snom VoIP Phone

September 07, 2010 Added by:shawn merdinger

An attacker could search for Snom phones exposed on the Internet, determine if they are using HTTP authentication or not, and easily connect the the Snom VoIP phone's webserver and punch in the number to dial -- clearly opening up avenues to cause grief. Pretty bad stuff, right?

Comments  (0)


Web Proxies and NetBIOS Targeted by Hackers

September 03, 2010 Added by:Simon Heron

A high number of firewall blocks are coming from the US and Korea, and UDP:137, the name service of NetBIOS is the second most attacked port. There are obviously still systems out there with this port open to the internet. Our message to IT managers is check your firewall rules...

Comments  (4)


Brute Force vs. Dictionary Attacks

August 03, 2010 Added by:Bryan Miller

There are tools that perform brute force, and there are tools that perform dictionary attacks. There are even some tools that allow the option. Moral of the story is to understand the difference when you’re writing tools and selling them to people who know the difference...

Comments  (0)


Half of Home Routers Vulnerable to DNS Exploit

July 30, 2010 Added by:Dan Dieterle

Which routers are susceptible to this attack? Confirmed affected routers include models manufactured by Linksys, Belkin, ActionTec, Thompson, Asus and Dell, as well as those running third-party firmware such as OpenWRT, DD-WRT and PFSense...

Comments  (0)


Evil Software Development

July 29, 2010 Added by:Dr. Steve Belovich

There are no universal software quality, reliability and safety standards. This is in sharp contrast to consumer products where safety standards and testing laboratories are in abundance. Software development and purchasing remains very much caveat emptor...

Comments  (0)


Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)

Page « < 24 - 25 - 26 - 27 - 28 > »