Metasploit Modules: Update 2011-12-19
The following modules have been added to the Metasploit SVN between SVN version 14390 and 14425 /modules/post/windows/gather/credentials/razorsql.rb...
View ArticleLady Gaga’s Facebook page hit by iPad scam
A scam claiming to offer free iPads has appeared on the Facebook page of pop phenomenon Lady Gaga. With over 45 million fans on Facebook, the scammers must have been rubbing their hands in glee -...
View ArticleThe Personalization of Risk
I realized when I received several comments regarding my September 12, 2011 column “Risk Mismanagement – Scoring vs. Monte Carlo vs. Scoring” from Doug Hubbard and others, that I hadn’t been clear...
View ArticleArab prince buys Twitter stake; recoils from Arab Spring The price is chum
Arab prince buys Twitter stake; recoils from Arab SpringThe price is chump-change for the prince, who's thought to be worth around $20 billion. In IT Blogwatch, bloggers boggle at the...
View ArticleWhy Bears Prefer Minivans
A study from 2009 tries to explain why bears in Yosemite attack minivans far more than any other vehicle. From 2001 to 2007 bears broke into 908 vehicles at the following rates: minivan (26.0%),...
View ArticleGuest Post: 2012 Cyber Security Predictions from the Websense Security Labs
By Patrik Runald, Sr. Manager, Security Research, Websense With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? Last year’s Websense Security Labs...
View ArticleSBN Sponsor Post
Register for the RSA Conference December 7th Webcast: Metrics are Bunk!? The Zombie Apocolypse, Baseball, and Security Metrics.http://bit.ly/s2FJ1x
View ArticleFighting The Advanced Attacker: 9 Security Controls You Should Add To Your...
We have a new post over at the ThreatSim Blog “Fighting The Advanced Attacker: 9 Security Controls You Should Add To Your Network Right Now“. It is a list of 9 things that everyone should be doing...
View ArticleWhere You Want to Be This Week for 2011-12-19
Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night....
View ArticleBackdoors and Beyond
Backdoors! But wait, there’s more… You recently heard our CTO, Chris Wysopal discuss in his blog post the warnings issued by ICS-CERT on backdoors in a standard network module for control systems. The...
View ArticleTesco warns customers of £250 gift voucher Facebook event scam
Supermarket chain Tesco has warned its customers about a scam that has spread on Facebook, claiming that attending an event on the social network can will earn them a free £250 gift voucher.
View Article2011: The Year in Review
Posted by Derek BrownAs the calendar year draws to a close we want to take the opportunity to disseminate some of the data that the Zero Day Initiative (ZDI) has acquired through the vulnerability...
View ArticleThe next step in cloud computing?
The economics of cloud computing is based on the assumption that cloud providers can get better deals on things like servers and power than smaller businesses can because they buy things in huge...
View ArticleNational Security: DARPA ADAPT and ISR
A fascinating, new Defense Advanced Research Projects Agency initiative has come to the forefront of ISR related application development within the DOD agency; focusing on activities within the scope...
View ArticleData Breaches On The Rise As Patient Records Digitized
One afternoon last spring, Micky Tripathi received a panicked call from an employee. Someone had broken into his car and stolen his briefcase and company laptop along with it. So began a nightmare...
View ArticleNew Infosecurity blog article
Small Eruption in Peru: Not Many Infected Or why even the sparse Mac threat landscape has changed contours since the 1990s. David Harley CITP FBCS CISSP
View ArticleRisk, Risk, Risk
In order to effectively manage risk, we need to be able to effectively measure risk. Before we can ever hope to effectively measure risk, we should all agree on exactly what is the definition of risk....
View Article