Items Tagged with "Tools"


6429389c5e8a4c9555be876f8484331a

Webcast: The State of SSL on the Internet

June 20, 2011 Added by:Sasha Nunke

The SSL (TLS) protocol is the security backbone of the Internet, but surprisingly little is known about how it is deployed. This session will present the results of the first publicly available survey aimed at assessing the state of SSL. It will also provide documentation and free tools...

Comments  (0)

A6f6ba95b73de19f947cf4eceecb2bed

Introducing WPScan – A WordPress Security Scanner

June 16, 2011 Added by:Ryan Dewhurst

WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses in WordPress installations. Its intended use is for security professionals or WordPress administrators, and the code base is Open Source and licensed under GPLv3...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

New John the Ripper Password Cracker Release

June 06, 2011 Added by:Headlines

A new version of John The Ripper, a free password cracking software tool, has been released. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects hash types, and includes a customizable cracker...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Web Application Attack and Audit Framework 1.0 Released

June 03, 2011 Added by:Headlines

"w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more..."

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Return on Security Investment (ROSI) Calculator Launched

June 02, 2011 Added by:Dejan Kosutic

This is the most detailed ROSI Calculator that can be found on the Internet, and it aims to calculate as precisely as possible whether the potential decrease of security incidents (i.e. the risk mitigation) will outweigh the investment in security measures. It's completely free...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Gartner's SIEM Magic Quadrant 2011

May 29, 2011 Added by:Anton Chuvakin

I think the concept of Magic Quadrant is brilliant. However, many wrong SIEM purchase decisions I’ve seen made usually stem from the decision maker’s own ignorance and not from whatever document or market visualization he has in his possession. Keep this in mind…

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Web App Configuration Analyzer 2.0 Tool Released

May 20, 2011 Added by:Headlines

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. It can also be used by developers to ensure that their codebase works within a secure / hardened environment...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Think You Can’t Afford Code/App Testing? Think Again...

May 19, 2011 Added by:Brent Huston

Today, you have a plethora of code review automation tools and source code scanners. These tools make an easy way to pick the low hanging (and sometimes higher) vulnerabilities out of your code long before it is exposed to malicious outsider/insider contact...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

FCC's Ten Key Cybersecurity Tips for Businesses

May 17, 2011 Added by:Headlines

Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need cybersecurity tools and tactics to protect themselves, their customers, and their data from growing cyber threats...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mozilla Defies DHS Internet Censorship Request

May 09, 2011 Added by:Headlines

Mozilla, the non-profit company behind the Firefox Web browser, has initially refused a Department of Homeland Security request to remove a third-party tool that allows users to circumvent government URL blocking efforts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Penetration Testers: Backtrack 5 Release Slated for May

May 04, 2011 Added by:Headlines

BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), will support 32 and 64 bit architectures, and will officially support KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment...

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

Webapp Scanner Review: Acunetix Versus Netsparker

April 11, 2011 Added by:Mark Baldwin

Review: Two companies have developed commercial webapp scanners that rival the features, the speed, the usability and the accuracy of any commercial tool on the market. And they do it at a price point that just about any small business or independent consultant can afford...

Comments  (5)

Ebb72d4bfba370aecb29bc7519c9dac2

Open Source Log Management Tools List

April 08, 2011 Added by:Anton Chuvakin

This page lists a few popular free open-source log management and log analysis tools. The log cheat sheet presents a checklist for reviewing critical system, network and security logs when responding to a security incident. It can also be used for routine periodic log review...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Application Now Available For Android

March 28, 2011 Added by:Infosec Island Admin

We are pleased to announce the release of our news and information application on the Android Marketplace. It's now easier than ever to keep up to date with the latest headlines, informative articles from industry experts, security breaches and vulnerability alerts while you are on the move...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Beware of Erasure Problems on SSD Drives

March 18, 2011 Added by:Brent Huston

The traditional methods of magnetic cleansing (degaussing), and even file over-write tools that have been in use now for decades in many organizations, have little to no effect on removing sensitive data on these solid state drives...

Comments  (1)

F520f65cba281c31e29c857faa651872

Using Open Source Business Intelligence Tools

February 09, 2011 Added by:Rahul Neel Mani

Open source BI tools do not have the same richness of features that the large BI tools have. There is a downside to this gap because many people have a need for those more advanced features. The good is that the open source products are less complex to configure and use for basic purposes...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »