Blog Posts Tagged with "Vulnerabilities"

6429389c5e8a4c9555be876f8484331a

Managing Risk and Keeping Your Network Secure

October 20, 2010 Added by:Sasha Nunke

The goal of security is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. The management of Risk and Vulnerability Management is one of the counter‐measures easily justified by its ability to optimize risk...

Comments  (0)

Ba542f3617078b0be2f95e64e425e190

Is Your Network Proactively Safe?

October 12, 2010 Added by:Evandro Rodrigues

IDS is a system that detects all network traffic and identifies suspicious activities that may indicate an external or internal attack, targeting systems and network decrease. But IDS is passive, it just monitors attacks, intrusions and exploits, and generating alerts and reports...

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Ligatt Site Still Vulnerable to Basic Code Injections

October 07, 2010 Added by:K S Abhiraj

The iframe injection is a kind of injection of one or more iframe tags into a page's content. The iframe can typically do many malicious things, such as downloading an executable application that containing malware which may directly compromise a visitor's system...

Comments  (2)

7377f47f95a1202ea8d330061b674dea

Vulnerability Management in the Cloud

October 07, 2010 Added by:Lawrence Pingree

Cloud providers will more than likely need to provide application programming interfaces which will allow the scan engines/management consoles to read-in current asset or deployment information from the cloud and then dynamically update the IP address information before scans commence...

Comments  (1)

4a907eba6a8d0223e39ee7d45672e26b

DARPA: Building Super Security

October 06, 2010 Added by:Daniel Ruggles

DARPA in June 2010 announced the Clean‐Slate Design of Resilient, Adaptive Secure Hosts - CRASH. It relies on human biology to develop super-smart, highly adaptive, supremely secure networks. CRASH program looks to translate human immune system strategies into computational terms....

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Revenge of the Bind Shell

September 30, 2010 Added by:Rob Fuller

At the April 2010 NoVA Hackers meeting I discussed some of the offensive uses of IPv6 on current networks. Well, around that time Microsoft issued a patch to all of the supported versions of Windows that broke my methodology. Obviously I wasn’t the only one doing this...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Top 10 Reports for Managing Vulnerabilities

September 29, 2010 Added by:Sasha Nunke

This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability management lifecycle and shows what reports today's best-in-class organizations are using to reduce risks on their network infrastructure...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Stuxnet Worm Reveals Default Password Vulnerabilities

September 27, 2010 Added by:Jamie Adams

NATO spokesman James Appathurai denied that the computers were regularly compromised. However, I didn't hear him dispute the fact that the systems were missing many of the basic security patches. So, is it just a matter of time? Or have the systems already been comprised but NATO is unaware?

Comments  (22)

E313765e3bec84b2852c1c758f7244b6

SAMBA Vulnerability Could Be Dangerous

September 22, 2010 Added by:Brent Huston

If you are not already looking at the newest SAMBA issue, you should be paying attention. It is a stack-based buffer overflow, exploitable remotely without credentials. The MetaSploit folks are already hard at work on an exploit and some versions are rumored to be floating about the underground...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

It's a Feature - Remote Tapping a Snom VoIP Phone

September 07, 2010 Added by:shawn merdinger

An attacker could search for Snom phones exposed on the Internet, determine if they are using HTTP authentication or not, and easily connect the the Snom VoIP phone's webserver and punch in the number to dial -- clearly opening up avenues to cause grief. Pretty bad stuff, right?

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Web Proxies and NetBIOS Targeted by Hackers

September 03, 2010 Added by:Simon Heron

A high number of firewall blocks are coming from the US and Korea, and UDP:137, the name service of NetBIOS is the second most attacked port. There are obviously still systems out there with this port open to the internet. Our message to IT managers is check your firewall rules...

Comments  (4)

F8f122d50eba11c3af5607575b277bc6

Brute Force vs. Dictionary Attacks

August 03, 2010 Added by:Bryan Miller

There are tools that perform brute force, and there are tools that perform dictionary attacks. There are even some tools that allow the option. Moral of the story is to understand the difference when you’re writing tools and selling them to people who know the difference...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Half of Home Routers Vulnerable to DNS Exploit

July 30, 2010 Added by:Dan Dieterle

Which routers are susceptible to this attack? Confirmed affected routers include models manufactured by Linksys, Belkin, ActionTec, Thompson, Asus and Dell, as well as those running third-party firmware such as OpenWRT, DD-WRT and PFSense...

Comments  (0)

800ca77bf7ad76b2a830356569e524b7

Evil Software Development

July 29, 2010 Added by:Dr. Steve Belovich

There are no universal software quality, reliability and safety standards. This is in sharp contrast to consumer products where safety standards and testing laboratories are in abundance. Software development and purchasing remains very much caveat emptor...

Comments  (0)

A1579a5845ff87a92326174e52499707

Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)

Page « < 23 - 24 - 25 - 26 - 27 > »