Security

Last Updated on 19 Sept. 2014, Total: 41 Blog Posts

  1. Webmin contains a cross-site scripting vulnerability

    Webmin 1.670, and possibly earlier versions, contains a cross-site scripting vulnerability... Read More

  2. PassiveDNS Tool

    PassiveDNS sniffs traffic from an interface or reads a pcap-file and outputs the DNS-server answers to a log file... Read More

  3. Free Cloud-based Vulnerability Scanner

    Tripwire SecureScan provides free vulnerability scanning for up to 100 IPs and includes comprehensive detection rules for Heartbleed to uncover the vulnerability wherever it may lie on your network... Read More

  4. How to Educate Employees on Cyber Security

    A robust Information Security policy and regular, mandatory training for all staff on information security is imperative... Read More

  5. GetGo Download Manager buffer overflow vulnerability

    Julien Ahrens (aka MrTuxracer) publishes root-cause analysis of GetGo Download Manager http response header buffer overflow remote code execution... Read More

  6. What is Passive DNS?

    Passive DNS or Passive DNS replication is a technique invented by Florian Weimer in 2004 where inter-server DNS messages are captured by sensors and forwarded to a collection point for analysis... Read More

  7. Buffer overflow vulnerability in Wireshark

    Wesley Neelen from Hoffmann Investigations discovered an MPEG file parser buffer overflow in Wireshark... Read More

  8. Police Ransomware Threat Assessment

    The European Cybercrime Centre at Europol publishes its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the European Union (EU) over the last two years... Read More

  9. Office 365 Multi-Factor Authentication

    Multi-factor authentication increases the security of user logins for cloud services above and beyond just a password... Read More

  10. Enterprise Risk Management Simplified

    SimpleRisk is a free and open source web application, released under Mozilla Public License 2.0, and is extremely useful in performing risk management activities... Read More

Featured Links