IDS/IDP

99edc1997453f90eb5ac1430fd9a7c61

Cracking Wifi Passwords With Kali Linux

October 29, 2014 Added by:Javvad Malik

In under a dozen commands you can potentially grab a wifi password, which is script kiddie territory. The real question goes a lot deeper what can be done with this information?

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On MSSP SLAs

October 28, 2014 Added by:Anton Chuvakin

SLAs play a role here as well, and – you guessed it – what you need here also depends on the maturity of your change management processes.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: How Gaps In SSH Security Create an Open Door for Attackers

October 27, 2014 Added by:InfosecIsland News

Please join us on Thursday, Oct. 30th at 1PM ET for a special webcast on how Gaps In SSH Security Create an Open Door for Attackers.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Mana Tutorial: The Intelligent Rogue Wi-Fi Router

October 21, 2014 Added by:Dan Dieterle

Like other rogue Wi-Fi AP programs Mana creates a rogue AP device, but Mana does so much more.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Two-Factor Authentication is Too Important to Ignore

October 21, 2014 Added by:Patrick Oliver Graf

Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security Companies Hit Hikit Backdoor Used by APT Group

October 16, 2014 Added by:Brian Prince

A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

SandWorm Hacking Team Exploited 0-day Against NATO and Other Government Entities

October 14, 2014 Added by:Pierluigi Paganini

According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Lessons from Complex, Dynamic Environments

October 14, 2014 Added by:Rafal Los

Security is hard, folks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Shellshock Leaves Deep Impact on Network Security

October 09, 2014 Added by:Patrick Oliver Graf

For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security community into reaction mode.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

What Is ICS Cybersecurity – You Don't Need Digital Assets

October 08, 2014 Added by:Joe Weiss

I have a great concern about many people in nuclear (and other) industries only focusing on malicious cyber attacks to the exclusion of unintentional cyber incidents.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Network Security for CIOs: A Marathon or a Sprint?

October 02, 2014 Added by:Patrick Oliver Graf

The world of IT is going through the same transition, away from the traditional support of “marathoning” to meet goals.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Patch for ShellShock ASAP!

September 30, 2014 Added by:Brent Huston

Source IPs for probes looking for the vulnerability are growing slowly in number and scope of scans. (As of 9/30/14, 10am Eastern).

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

New Bash Bug Could Wreak Havoc on Linux and OS X Systems

September 25, 2014 Added by:Malwarebytes

It would have been hard to imagine anything as bad as the HeartBleed bug was going to happen but the recent discovery of a flaw in the popular bash command shell very well could be.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

A Tenuous Grasp on Reality

September 23, 2014 Added by:Wendy Nather

One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »