Alerts
Jan 18, 2009 (12 hours ago)
DNS queries for ".", (Sun, Jan 18th)
from SANS Internet Storm Center, InfoCON: green
Several folks are reporting odd queries hitting their DNS servers at a steady rate of about two per ...(more)...
7:36 AM (6 minutes ago)
3322. org, (Sun, Jan 18th)
from SANS Internet Storm Center, InfoCON: green
Earlier today, an ISC reader sent us a looong capture of what looked like a buffer overflow attack. ...(more)...
Security News
5:07 AM (2 hours ago)
Hotspot horrors
from Network World on Security by James E. Gaskin
Laptops are the main business tool for most mobile workers, and connecting those devices to the Internet via free public Wi-Fi hotspots has become common practice. So how well do your mobile workers follow security guidelines for safe mobile computing?
5:07 AM (2 hours ago)
Fake sites spreading malware claim Obama won't take oath
from Network World on Security
Sites claiming President-Elect Barack Obama will refuse to take the oath of office Tuesday are serving up attack code believed to be programmed by the same hackers responsible for the notorious Storm bot Trojan, researchers said this weekend.
10:59 PM (8 hours ago)
YouTube begins experimenting with downloadable videos
from Ars Technica by david@arstechnica.com (David Chartier)
Tools for grabbing videos from YouTube have existed for some time now, but Google's video portal began experimenting this weekend with allowing users to download a high-quality H.264 version directly from a video's site. The feature appeared first on the Obama campaign's ChangeDotGov account, and it is expected to roll out to the rest of YouTube users in the coming weeks.
Jan 18, 2009 (12 hours ago)
IRS Taxpayer Data is Insecure
from PC World Latest Technology News
Two audits suggest the IRS needs to clean up its network access and secure taxpayer data.
Jan 18, 2009 (18 hours ago)
Securing the Presidential BlackBerry
from PC World Latest Technology News
Security efforts explain how the military-level encryption and restricted use could enable Obama to keep his handheld.
-- Aurora Report says quality not quantity: Learn how to dive deep into a buffer overflow attempt, what's up with free wi-fi, irs follies and blackbery security - not a bad start to the week.
Monday, January 19, 2009
Subscribe to:
Post Comments (Atom)
My Blog List
-
-
Amazon security boss blames Russia's GRU for years-long energy-sector hacks - 'Sustained focus on Western critical infrastructure' Russia's Main Intelligence Directorate (GRU) is behind a years-long campaign targeting energy, teleco...7 hours ago
-
Microsoft Patch Tuesday, December 2025 Edition - Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 ...6 days ago
-
We have achieved FreeBSD 15.0-REL with KDE Plasma - Houston, we have installed #FreeBSD 15.0-REL with KDE Plasma 6.4.5 on a Lenovo ThinkPad X1 Carbon Gen 6 laptop. I have come full circle. I used to dail...2 weeks ago
-
Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like - Systemic ransomware events in 2025, how Jaguar Land Rover’s shutdown exposed Category 3 supply chain risk, with lessons from Toyota, Nissan and Ferrari.2 weeks ago
-
Today's NYT Mini Crossword Answers for Tuesday, Oct. 7 - Here are the answers for The New York Times Mini Crossword for Oct. 7.2 months ago
-
Today's NYT Mini Crossword Answers for Tuesday, Oct. 7 - Here are the answers for The New York Times Mini Crossword for Oct. 7.2 months ago
-
Announcing SecTemplates.com release #6: Security Partner Program Pack v1 - I have built several security partner programs at companies such as Box Inc. and Coinbase, with over 8 years of experience leading them. I have consistentl...6 months ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...1 year ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.2 years ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.2 years ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...4 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...4 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...5 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.6 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...6 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...7 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...8 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...8 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...9 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...12 years ago
-
-
-
-
-
-
-
-
-
No comments:
Post a Comment