Great research
Good research, well written report, it's always good to read something like this:http://resources.infosecinstitute.com/ghost-domain-names/ Permalink | Leave a comment »
View ArticleNessus 5 Making My Pentesting Workflow Easier
With the recent release of Nessus 5 it comes with several improvements like better filtering in policy creation, analysis, reporting and a faster lighter engine for scanning. From this new features my...
View ArticleSSCC 83 – Patch Tuesday, Apple app privacy and RSA
This week's Chet Chat finds Paul Ducklin and Chester Wisniewski discussing the vulnerabilities patched this Tuesday in Microsoft, Adobe and Oracle products, mobile phone application privacy issues and...
View ArticleGoogle Wallet Provisioning Vulnerability Mitigated
Meanwhile, in vulnerability mitigation news… Google Inc. (NasdaqGS: GOOG) has apparently managed to cough up the dough to patch the Mountain View, CA based search leviathan’s self-titled Google Wallet...
View ArticleAll Your Informations Are Belong To Unauthorized Personnels
via the inimitable Cory Doctorow; read the backstory in prepare to be astonished. ↀ
View ArticleDEFT 7 – A linux distro for forensics and more!
We stumbled across this distribution the other day while building a forensic workstation for the lab. SIFT just didn’t perform the way we wanted and DEFT seems to be rock solid out of the box with...
View ArticleApple’s Gatekeeper security feature leaves a lot to be desired
Apple is introducing a new security feature called Gatekeeper in its upcoming OS X 10.8 Mountain Lion release. Read on to find out what it does and how it measures up.
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleMore $$$$$ for Infosec Professionals!
It sounds like infosec has become one of the top recession-proof careers in today’s market. Even as the economy continues to plunge down, the demand for experience and qualified infosec professionals...
View ArticleResearchers take another crack at SSL
Just how unique is is your private key? Is there a chance that someone else, without any malice aforethought, might unexpectedly end up with a key pair that is identical or at least dangerously similar...
View ArticleUsing Graphite to Graph DTrace Metrics
If you haven’t heard of Graphite you are missing out on a serious operations power tool. Let me make a gross over simplification and slightly inaccurate assertion to get you in the ballpark of...
View ArticleAPM Through the SDLC
On Wednesday evening I attended another meeting of the London Web Performance Group at the Lamb Tavern in Leadenhall Market. The subject was Application Performance Management (APM) across the...
View ArticleFriday Summary: February 17, 2012
I managed to take a couple days off last week, and got out of town. I went camping with a group of friends, all from very different backgrounds, with totally unrelated day jobs – but we all love...
View Article2nd IEEE International Symposium on Trust and Security in Cloud Computing...
帮朋友做个广告,有朋友感兴趣分享自己云计算安全的研究成果吗?请关注TSCloud 2012。 The 2nd IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud 2012) to be held in Liverpool, England, UK, 25-27 June 2012...
View ArticleWhat, Why and How of Employee Monitoring
It is common knowledge that companies monitor what employees do in the workplace and on office equipment. I put together a comprehensive view of what was monitored, why it was monitored and how it...
View ArticleWhat We’re Reading, Week of 2/13
PCWorld, How to Choose a Router for Your Business Infosecurity, Safe Authentication for Remote Sys-Admin Tasks MedCity News, Tips for Securing Healthcare Data on Mobile Devices Security Week, Why the...
View ArticleWeekly News Roundup
It’s finally Friday and the start to a long weekend! Here are this week’s hot security topics, as reported by our esteemed peers in the industry: Applications uploading data from your iPhone’s address...
View Article