Paul's Security News Articles

  1. Microsoft Disables Wi-Fi Sense on Windows 10
  2. 2012 LinkedIn Breach Just Got a Lot Worse: 117 Million New Logins For Sale
  3. Ubiquiti Networks Gear Targeted By Worm
  4. SkinTrack Turns Your Arm Into a Touchpad. Here’s How It Works
  5. Apple bans Stefan Esser's iOS security info app
  6. OkCupid Study Reveals the Perils of Big-Data Science
  7. Google Chrome Will Switch Off Flash Content By Default
  8. Hacker Fans Give Mr. Robot Website Free Security Checkup
  9. TeslaCrypt's Master Key Released To The Public
  10. Vidyo Flaw Leaks Videos And Local Files
  11. You'll still be able to hack Linksys WRT routers with open source firmware despite new FCC rules
  12. Torvalds on the Internet of Things: Security plays second fiddle
  13. Windows 10 won't let you share WiFi passwords any more
  14. Hacker Finds Vulnerability In Mr Robot Website
  15. GCHQ Wants You To Stop Resetting Your Password
  16. Kiddicare Compromised
  17. Panama Papers Now Searchable
  18. Researcher Arrested For Disclosing Election Vulnerabilities
  19. WordPress Redirect Hack via - Sucuri Blog
  20. Caleb Madrigal
  21. Freaking out over the DBIR
  22. 5 Things Devs Wish CISOs Knew About DevOps
  23. Top 3 Reasons Why Neglecting Application Security Is Risky Business
  24. Economist Detained for Doing Math on an Airplane
  25. The day we discovered our parents were Russian spies | World news | The Guardian
  26. Push Your ICS Vendor / Integrator To Do It Right
  27. Wendy’s: Breach Affected 5% of Restaurants
  28. Wendy’s admits to payment card malware infection
  29. Pornhub bug bounty program will pay hackers up to $25,000
  30. Documenting the Chilling Effects of NSA Surveillance
  31. I'm Writing a Book on Security
  32. Lean Threat Intelligence, (Mon, May 2nd)
  33. Bringing HTTPS to all blogspot domain blogs
  34. Practical Reverse Engineering Part 2 - Scouting the Firmware · Hack The World
  35. Economy of mechanism – The road to hell is paved with SAML Assertions
  36. Jailbreaking the Microsoft fitness band – b0n0n's cottage
  37. — Hacking Mattermost: From Unauthenticated to System...
  38. Building a Home Lab to Become a Malware Hunter - A Beginner’s Guide | AlienVault
  39. GitHub - reverse-shell/routersploit: The Router Exploitation Framework
  41. Snort Lab: Custom SCADA Protocol IDS Signatures
  42. IoT Security: Medical Devices Are the Next Target for Hackers
  43. Why it would have been a relief to know who’s behind bitcoin
  44. 10-year-old Finnish boy uncovers Instagram comments vulnerability
  45. Are Your Web Applications Vulnerable to ImageTragick? Scan Them with Netsparker
  46. Craig Wright Revealed As Bitcoin Creator Satoshi Nakamoto
  47. I Am Craig Wright, Inventor Of Craig Wright
  48. Miniature Car Maker Drops Massive Malware
  49. How The Pwnedlist Got Pwned
  50. Instagram Hacked By 10-Year-Old Boy
  51. ​Two highly dangerous OpenSSL security bugs have been patched
  52. Kippos Cousin Cowrie, (Wed, Apr 27th)
  53. Gamekeeper turns poacher? The ex-Tor developer who unmasked Tor users for the FBI
  54. US-CERT to Windows Users: Dump Apple Quicktime — Krebs on Security
  55. Linux infosec outfit does a Torvalds, rageblocks innocent vuln spotter
  56. Time for a patch: six vulns fixed in NTP daemon
  57. Batten down the hatches! OpenSSL preps fix for high impact vuln
  58. Spotify Denies Hack After Users' Personal Data Shows Up On Pastebin
  59. Businesses Pay $100,000 To DDoS Extortionists Who Never DDoS Anyone
  60. All Phones In India To Be Equipped With Panic Buttons From 2017
  61. Why it’s easier to fix a broken product than a broken team
  62. German Nuclear Power Plant Infected With Malware
  63. 10 Newsmakers Who Shaped Security In the Past Decade
  64. How To Stay Secure At The Hotel On A Business Trip
  65. Opera is the first big web browser with a built-in VPN
  66. Hackers turn their back on exploiting Java to focus on Flash flaws
  67. Misunderstanding Indicators of Compromise
  68. Security Lessons from C-3PO, Former CSO of the Millennium Falcon
  69. Cisco Patches Denial-of-Service Flaws Across Three Products
  70. 29% of Android devices can’t be patched by Google
  71. How Hacking Team Got Hacked
  72. Judge tosses evidence obtained by FBI malware planted on dark website
  73. Hyping vulnerabilities is no longer helping application security awareness | TechCrunch
  74. RDP Replay Code Release
  75. Cisco Talos Blog: Ransomware: Past, Present, and Future
  76. Millions of Arris cable modems vulnerable to denial-of-service flaw | ZDNet
  77. 'CyberUL' Launched For IoT, Critical Infrastructure Device Security
  78. NoScript and other popular Firefox add-ons open millions to new attack | Ars Technica
  79. Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World
  80. SANS Penetration Testing | Scapy Cheat Sheet from SANS SEC560 | SANS Institute
  81. Windows 10 debuts Blue QR Code of Death – and why malware will love it
  82. New JavaScript attack infects your phone and changes your router's DNS settings
  83. 0-day exploits more than double as attackers prevail in security arms race
  84. Journalist sentenced to 24 months in prison after hacking-related conviction
  85. New report claims gray hat hackers, not Cellebrite, helped crack San Bernardino iPhone
  86. Is Cloud Security An Exaggerated Concern? - Dark Reading
  87. Explicit Furry Podcast Airs On US Radio After Hack
  88. Half Of People Plug In USB Drives They Find In The Parking Lot
  89. Do US universities deserve an “F” in teaching cybersecurity?
  90. We’ve got stalkers in our pockets
  91. ‘Blackhole’ Exploit Kit Author Gets 8 Years
  92. BADLOCK – Are ‘Branded’ Exploits Going Too Far?
  93. The ransomware attack that knows where you live
  94. Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers -
  95. IoT IP camera teardown and getting root password
  96. Neighbour sick of you parking in his driveway? You'd better hack-proof your car
  97. Hacking Team lost its license to sell surveillance malware outside Europe
  98. Reddit Has Lost Its Warrant Canary
  99. Hacker Reveals $40 Attack That Steals Police Drones From 2km Away
  100. Turkey's Entire Citizenship Database May Have Been Leaked
  101. Hackers Demo Persistent, Quiet Attacks Through Windows DSC
  102. How To Make Big Bucks Hunting Cyber Bugs
  103. Defenders Need to Embrace Offensive Security Skillsets
  104. The latest Flash zero-day was used to spread Cerber ransomware
  105. Healthcare Organizations Must Consider The Financial Impact Of Ransomware Attacks
  106. China's Great Firewall inventor forced to use VPN live on stage to dodge his own creation
  107. Your car's computers might soon get malware protection
  108. Ubuntu Patches Kernel Vulnerabilities
  109. OSVDB Shuts Down For Good
  110. Flash zero-day in the wild to be fixed by Adobe
  111. FBI: $2.3 Billion Lost to CEO Email Scams
  112. Waaay Too Many Things Are Exposing VNC On The Internet
  113. Six Charged For Hacking Lottery To Spew Only Winning Tickets
  114. A Hundred Million Truecaller Users Vulnerable To Privacy Bug
  115. Some Old SAP Systems Have Default Kernel User Accounts
  116. LiveJournal Hit With Angler Exploit Kit
  117. FBI Investigates Hacks Against U.S. Law Firms
  118. Bash, better biometric security, Cortana and a flood of chatbots coming to Windows 10
  119. Cisco, Snort Scramble To Plug Malware Hole
  120. Nearly 1,500 Vulnerabilities Found In Automated Medical Equipment
  121. New self-protecting USB trojan able to avoid detection
  122. SDR Radio Academy: Reverse engineering a wireless car key fob.: phasenoise
  123. More on Purple Teaming Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
  125. How to Avoid a King’s Ransom
  126. Dark Web’s got a bad rap: 7 in 10 want it shut down
  127. 1418 Vulnerabilities In A Medical Device – What Now?
  128. Ports Are Meaningless
  129. Stealthy USB Trojan hides in portable applications, targets air-gapped systems
  130. Mobile Security: Why App Stores Don't Keep Users Safe
  131. FBI — Cyber’s Most Wanted
  132. TP-Link blocks open source router firmware to comply with new FCC rule | Ars Technica
  133. Once thought safe, DDR4 memory shown to be vulnerable to “Rowhammer” | Ars Technica
  134. What does Oman, the House of Cards, and Typosquatting Have in Common? The .om Domain and the Dangers of Typosquatting | ENDGAME
  135. Emergency Java Patch Re-Issued for 2013 Vulnerability
  136. FBI Warns On Risks Of Car Hacking
  137. MITRE Rolls Out New CVE System After Reg Reveal
  138. Only 0.1% Of You Are Doing Web Server Security Right
  139. Hacktivists caught tampering with water treatment plant
  140. Firmware bug in CCTV software may have given POS hackers a foothold
  141. Researchers Find Hole In SIP, Apple's Newest Protection Feature
  142. Vulnerability Scanners Turn Up Mostly False Positives
  143. Ironic: CCTV systems slide open a backdoor into your biz network
  144. Surprise! You have mystery PCs
  145. Attackers Packing Malware Into Powershell
  146. Threat Intelligence's Big Data Problem
  147. Even Sex Toys Aren’t Safe From Hackers, Tech Companies Warn
  148. It is time to prioritize security for Internet of Things and wearables
  149. Hotel light control hack illuminates lamentable state of IoT security
  150. Amazon goes after patent so you can pay by selfie
  151. LinkedIn Being Used To Prime Phishing Targets
  152. One of the Celebgate hackers pleads guilty to phishing iCloud and Google logins
  153. Home Depot To Pay $19.5 Million In Data Breach Settlement
  154. Safari, Flash Fall at Pwn2Own 2016 Day One
  155. SSH Honeypots (Ab)used as Proxy, (Sun, Mar 13th)
  156. Defence In Depth For Web Applications
  157. Erin Andrews awarded $55m over nude video shot through hotel door peep hole
  158. My last days at WhiteHat and setting sights on the future
  159. Why Your Security Tools Are Exposing You to Added Risks
  160. Quick Analysis of a Recent MySQL Exploit - SANS Internet Storm Center
  161. HTCAP
  162. A Warning for Wearables: Think Before You Emote
  163. Patch Management Still Plagues Enterprise
  164. DROWN Vulnerability Remains ‘High’ Risk, Firms Say
  165. Trivial Path For DDoS Amplification Attacks Found
  166. Boffins Bust Biometrics With Inkjet Printer
  167. Security market to exceed $170 billion by 2020, analysts say
  168. Opera Becomes First Major Web Browser to Introduce Native Ad-Blocking Feature
  169. The @ legacy of Ray Tomlinson
  170. Before Moving on From RSA…
  171. Cisco Patches A Bunch Of Cable Modem Vulns
  172. Tablets dead after six years
  173. Palo Alto Networks CEO At RSA: Security Isn't About Technology, It's About Trust
  174. Apple Reissues Security Update After Blocking Ethernet on Mac OS X
  175. Samsung now shipping 15.36TB PM1633a SSD -- world's largest capacity solid state drive
  176. Reinvented Ransomware Now Targeting WordPress Sites
  177. Over 700 Million Records Breached In 2015
  178. Is Your Smartphone Listening To You?
  179. DROWN Flaw Illustrates Dangers Of Intentionally Weak Crypto
  180. Hardcoded God-Mode Code Found In RSA 2016 Badge-Scanning App
  181. I got hacked mid-air while writing an Apple-FBI story
  182. Troy Hunt: Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs
  183. GitHub - firmadyne/firmadyne: Main repository
  184. GitHub - AFITWiSec/EZ-Wave: Tools for Evaluating and Exploiting Z-Wave Networks using Software-Defined Radios.
  185. CCDC Quals Notes (metasploit) Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
  186. Hacker Summer Camp Planning Guide · System Overlord
  187. What It Takes to Master Security (Hint: It's Not Certs) - OpenDNS Blog
  188. GitHub - enddo/smod: MODBUS Penetration Testing Framework
  189. Practical TEMPEST Attack
  190. Hackers could hijack your computer via its vulnerable wireless mouse or keyboard
  191. Life with the Nest Protect: Are “smart” smoke detectors a dumb idea?
  192. Linux Mint Forum Database Compromised for at Least a Month Before Announcement
  193. Patient monitors altered, drug dispensary popped in collosal hospital hack
  194. With few options, companies pay hush money to data thieves
  195. How an audit can shore up your security strategy
  196. Nissan LEAF cloud security fail leaves drivers exposed
  197. Judge Confirms DoD Funded Research to Decloak Tor Users
  198. Confirmed: Carnegie Mellon University Attacked Tor, Was Subpoenaed By Feds
  199. Is The Cybersecurity Bubble About To Burst?
  200. NetworkMiner - The NSM and Network Forensics Analysis Tool
  201. GCHQ intel used to develop Stuxnet, claims new documentary
  202. Hack VMware, Score US$75K. Hack Flash, Get Much Less.
  203. Cisco Customers On Alert Over New Vulns
  204. Instagram Is Adding Two-Factor Authentication
  205. Glibc Vuln Puts All Linux Machines At Risk
  206. Sergey Lozhkin on How He Hacked His Hospital
  207. Popular home security system SimpliSafe can be easily disabled by burglars
  208. The Great EMV Fake-Out: No Chip For You!
  209. Using Eagles to Intercept Drones
  210. Instagram bug could have allowed others to read your direct messages
  211. Judge Demands that Apple Backdoor an iPhone
  212. Underage Hacker Is behind Attacks against US Government
  213. More IoT insecurity: The surveillance camera that anyone can log into
  214. 5 Big Incident Response Mistakes
  215. D-Link DSL-2750B Remote Command Execution
  216. ASUS Router Administrative Interface Exposure
  217. Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor, (Wed, Feb 10th)
  218. Weird Fitbit data helps one man discover his wife is pregnant
  219. We might use your IoT stuff to spy on you, says top spook James Clapper
  220. IoT’s Day of Reckoning on the Horizon
  221. Power Grid Honeypot Puts Face on Attacks
  222. We're Going To Use Your Toothbrush To Spy On You, Says Clapper
  223. How To Hack The Power Grid Through Home Air Conditioners
  224. Cisco Security Kit Wide-Open To IKE Bug
  225. Hackers aren't smart -- people are stupid
  226. Moving to a Plugin-Free Web (Java Platform Group, Product Management blog)
  227. Week 5 In Review – 2016
  228. Sources: Security Firm Norse Corp. Imploding — Krebs on Security
  229. FortiGuard SSH backdoor found in more Fortinet security appliances | CSO Online
  230. Damn Vulnerable Safe - Insinuator
  231. GitHub - cve-search/cve-search: cve-search - a tool to perform local searches for known vulnerabilities
  232. Critical Wi-Fi Flaw Patched on Android
  233. Harvard Paper Rebuts Going Dark
  234. Toys Patched Against Flaws That Put Children’s Data, Safety At Risk
  235. Socat Warns Weak Prime Number Could Mean It’s Backdoored
  236. Chromodo Browser Disables Same-Origin Policy
  237. Getting A Reverse Shell On Your Seagate Personal NAS
  238. eBay Refuses To Fix Flaw Exposing Users To Malware And Phishing Attacks
  239. Google Lumps MalwareBytes With A Bad Security Report
  240. In A UEFI World, "rm -rf /" Can Brick Your System
  241. More CISOs looking to recruit cyber-security trainers than leaders, analysts, engineers or pen testers
  242. Automating Vulnerability Scans, (Wed, Feb 3rd)
  243. EMET 5.5 Released, (Wed, Feb 3rd)
  244. Websites running WordPress hacked to display money-making ads for hackers
  245. The Internet of Things Will Be the World's Biggest Robot
  246. Interview: John Matherly On Check Point Blacklisting Shodan
  247. Hard-Coded Password Found In Lenovo File-Sharing App
  248. Magento Update Addresses XSS, CSRF Vulnerabilities
  249. Show us the code! You should be able to peek inside the gadgets you buy – FTC commish
  250. Hacker Who Sent Heroin To Brian Krebs Pleads Guilty
  251. MiniUPnP Vulnerability Clears Way for Stack Smashing Attack
  252. NSA’s top hacking boss explains how to protect your network from his attack squads
  253. BlackEnergy APT Group Spreading Malware via Tainted Word Docs
  254. Oracle plans to kill an attacker's favorite: the Java browser plug-in
  255. OpenSSL Patches Serious Flaw that Puts ‘Popular Applications’ At Risk
  256. DDoS World Record Broken With 500 Gbps Attack In 2015
  257. Angler Exploit Kit Now Hooking Execs With Xmas Flash Hole
  258. Police destroy evidence with 10 failed passcode attempts on iPhone
  259. Worried about cyberattacks on US power grid? Stop taking selfies at work -
  260. SEC Consult: Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices
  261. Hot Potato – Windows Privilege Escalation
  262. Autopwn every Android < 4.2 device on your network using BetterCap and the "addJavascriptInterface" vulnerability. - Simone Margaritelli
  263. 6 Tips for Turning Developers Into AppSec Allies
  264. Purple Teaming - Lessons Learned & Ruxcon Slides
  265. Casino Sues Security Firm for Failing to Contain Malware Infection
  266. The Evolution of the Wireless Penetration Test | Immunity Services
  267. OpenSSH Private Crypto Key Leak Patch | Threatpost | The first stop for security news
  268. /tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!, (Wed, Jan 20th)
  269. 123456 Still The Most Common Password For 2015
  270. Serious Linux Kernel Vulnerability Patched
  271. Oracle Unleashes 248 Security Updates In First Patch Release Of 2016
  272. Hot Potato Exploit Mashes Old Vulns Together
  273. Numbers don’t lie—it’s time to build your own router
  274. Linux vulnerability puts millions of people at risk -- Android users should panic
  275. FireEye buys iSight Partners for $200M
  276. HD Moore exiting Rapid7 for VC-land
  277. 26 of the craziest and scariest things the TSA has found on travelers
  278. HD Moore To Build New Venture Capital Firm
  279. DSA-3444 wordpress - security update
  280. Fortinet SSH Backdoor Found In Firewalls
  281. Was Sean Penn really responsible for El Chapo’s arrest? | Fusion
  282. Denial-of-Service Flaw Patched in DHCP
  283. Curious Tale of a Microsoft Silverlight Zero Day
  284. Adobe Patches Code Execution Flaws in Reader, Acrobat
  285. The Infamous 'Hacker Manifesto' Just Turned 30
  286. $30 Webcam Spun Into Persistent Network Backdoor
  287. Microsoft finally has a proper way to opt out of Windows 7/8 to Windows 10 upgrades
  288. Why thinking like a criminal is good for security
  289. IoT Security: $1-per-Thing To Protect Connected Devices
  290. Cisco fixes unauthorized access flaws in access points, wireless LAN controllers
  291. Powerball lessons for infosec
  292. Mythical vuln-disclosure program
  293. The Biggest Security Threats We'll Face In 2016
  294. IPv6 Celebrates Its 20th Birthday By Reaching 10 Percent Deployment
  295. Zerodium Offers $100k For Adobe Flash Bypasses
  296. Microsoft To Axe Support For Older Internet Explorer Next Week
  297. 'You're updated!' Drupal says, with fingers crossed behind back
  298. Exploiting Silent Circle's Secure Blackphone
  299. Uber to pay $20,000 in settlement over data breach
  300. SLOTH Attacks Up Ante on SHA-1, MD5 Deprecation
  301. Vulnerable Joomla! Installation under active attack | Symantec Connect Community
  302. Juniper ScreenOS Backdoor Password | Threatpost | The first stop for security news
  303. Advent tip #17: “Reply All” is probably not what you want
  304. Attacks Ramp Up Against Joomla Zero Day
  305. It was Shodan easy! MacKeeper user database left wide open
  306. IoT startup Afero goes end to end for security
  307. Got A Drone? It's Registration Time, Says The FAA
  308. Google's Project Zero Uncovers FireEye Vulnerability
  309. Windows 10: Microsoft now offers users two choices - "upgrade now" or "upgrade tonight"
  310. Over 680TB of data exposed in MongoDB databases
  311. Press Backspace 28 times to own unlucky Grub-by Linux boxes
  312. Boiled passports leave a bad taste in the mouth of authorities
  313. Congress Slips CISA Into A Budget Bill That's Sure To Pass
  314. The Programming Languages That Spawn The Most Software Vulnerabilities
  315. Lock up your top-of-racks, says Cisco, there's a bug in the USB code
  316. France Looking At Banning Tor, Blocking Public Wi-Fi
  317. Vulnerabilities found in Lenovo, Toshiba, Dell support software
  318. Linksys routers vulnerable through CGI scripts
  319. Trump Says "Closing The Internet" Is A Good Way To Fight Terrorism
  320. Known Security Flaw Found In More Antivirus Products
  321. Toys Could Be Used As Spying Devices, MPs Told
  322. Cisco Warning of Vulnerabilities in Routers, Data Center Platforms
  323. The Employee Password Habits That Could Hurt Enterprises
  324. Internet Root Name Servers Survive Unusual DDoS Attack
  325. Enforcing USB Storage Policy with PowerShell, (Wed, Dec 9th)
  326. New Burp Feature - ClickBandit, (Thu, Dec 10th)
  327. In patches we trust: Why software updates have to get better
  328. Bitcoin’s Creator Satoshi Nakamoto Is Probably This Unknown Australian Genius
  329. Australian Police Raid Chap's Home In Hunt For Bitcoin Creator
  330. Bitcoin whodunit leads to Oz - CNET
  331. Some notes on fast grep
  332. Adobe Flash Is Dead in Name Only
  333. Hacker Turns Raspberry Pi Zeros Into Selfie Slayers
  334. Could Hackers Break My Heart Via My Pacemaker?
  335. Microsoft tries to ease Windows 10 upgrade process - CNET
  336. More than 900 embedded devices share hard-coded certs, SSH host keys
  337. GreenDog's blog: 3 Attacks on Cisco TACACS+: Bypassing the Cisco's auth
  338. Dude, You Got Dell’d: Publishing Your Privates - Blog - Duo Security
  339. Samy Kamkar: MagSpoof - credit card/magstripe spoofer
  340. Version 2.2 Release · jmk-foofus/medusa@5a7b76e · GitHub
  341. Hello Barbie Security: Part 1 - Teardown — Somerset Recon
  342. 5 Tips for Pentesters Using Python 3
  343. My SecTor Story: Root Shell on the Belkin WeMo Switch
  344. The Gartner Magic Quadrant: Four Traits From Top Performers
  345. Did Carnegie Mellon Attack Tor for the FBI?
  346. KeeFarce – Extract KeePass Passwords (2.x) From Database
  347. Paris Terrorists Used Double ROT-13 Encryption
  348. Federal Legislation Targets “Swatting” Hoaxes
  349. Clearing the Air on Wi-Fi Software Updates |
  350. It’s Way Too Easy to Hack the Hospital
  351. BadBarcode Internet Of Things Hack PacSec 2015 | Threatpost | The first stop for security news
  352. Siri's Lockscreen Bypass A Growing Privacy Issue For iOS Users
  353. US-China Security Review Commission Discusses 'Hack-Back' Laws
  354. Martel Police Body Camera Virus Found Embedded into Camera | iPower Technologies
  355. Failed Windows 3.1 system blamed for shutting down Paris airport | Ars Technica
  356. Trouble Brewing As iThing Coffee Machine Seems To Be Hackable
  357. Anonymous Declares War On Islamic State
  358. US Lawmakers Advised To Consider Hacking China Back
  359. The Lingering Mess from Default Insecurity
  360. ISA100 / WirelessHART Sentinel To Detect Jamming?
  361. How a mobile app firm found the XcodeGhost in the machine
  362. Wireless jammers cast a dark shadow on IoT security
  363. Fake IT admin tricked Cox rep into handing over customer database
  364. Court Says Tracking Web Histories Can Violate Wiretap Act
  365. Thanks for playing: New Linux ransomware decrypted, pwns itself
  366. Solving Security: If You Want Something New, Stop Doing Something Old
  367. Face-slapping alarm clock refuses to let you sleep in
  368. Exploit Writing and Mitigation Going Hand in Hand
  369. [webapps] - vBulletin 5.1.x - PreAuth 0day Remote Code Execution Exploit
  370. The top 10 apps that companies hate
  371. Hackers Claim Million Dollar Bounty For iOS Zero Day Attack
  372. Kevin Spacey Hired To Put The Hollywood Into Cyber Security
  373. No C&amp;C server needed: Russia menaced by <i>offline</i> ransomware
  374. Mature & Unconfident: The Best Information Security Teams Ever!
  375. Library of Congress Says It's OK to Hack Your Car | WIRED
  376. Saving Systems from SQLi | WhiteHat Security Blog
  377. Boasting about your binges on Facebook could hurt your credit score
  378. Undercover cop answers Craigslist ad for a hacker
  379. How to become a pentester | Corelan Team
  380. Mathy Vanhoef: Advanced WiFi Attacks Using Commodity Hardware
  381. How to Commandeer a Store PA System
  382. Don’t Be Fooled by Fake Online Reviews Part II
  383. Apple tells judge it's "impossible" to unlock a device running iOS 8 or higher
  384. Fitbit Vulnerability Means Your Tracker Could Spread Malware
  385. IoT security threats and how to handle them
  386. Smartwatch – A Fashionable and Dangerous Gadget
  387. Attackers hijack CCTV cameras and network-attached storage devices to launch DDoS attacks
  388. To Find The Needle, Chop Down the Haystack: 5 Steps For Effective Threat Monitoring
  389. The First Rule Of Zero-Days Is No One Talks About Zero-Days
  390. Teen Who Hacked CIA Director's Email Tells How He Did It
  391. German Govt Mulls Security Standards For SOHOpeless Routers
  392. Hackers Make Cars Safer. Don't Ban Them From Tinkering
  393. Apple CEO Tim Cook Blasts Encryption Backdoors
  394. HP adds protection against firmware attacks to enterprise printers
  395. Can myriad wireless networks connect as one fast, secure system?
  396. FireEye Myth and Reality
  397. No End In Sight For Exposed Internet Of Things, Other Devices
  398. Google Patches Chrome, Changes Mixed Content Warnings
  399. WordPress Fixes Critical Stored XSS Error in Akismet
  400. Shocker: Net anarchist builds sneaky 220v USB stick that fries laptops
  401. You can hack a PC just by looking at it, say 3M and HP
  402. Cash Reward For Takeover Man
  403. Hackers Can Steal Your Brain Waves
  404. Half Of IRS's Servers Still Run Doomed Windows Server 2003
  405. Hackers Can Silently Control Siri From 16 Feet Away | WIRED
  406. 87% of Android devices are exposed to at least one critical vulnerability
  407. 'Fixed' app that fights parking tickets blocked in 3 cities
  408. Ongoing Flash Vulnerabilities, (Thu, Oct 15th)
  409. Scottrade Breach Affects 4.6 Million Customers
  410. Experian Breach Spills Data on 15 Million T-Mobile Customers
  411. Targeted Attack Exposes OWA Weakness
  412. Canceled Talk Re-Ignites Controversy Over Legitimate Security Research
  413. How A Single Car Could Spread Malware To Thousands More
  414. Home Routers Vaccinated By Benign Virus
  415. Edward Snowden Fails At Twitter And Notification Settings
  416. Data Easily Recovered From eBayed Smartphones, Disks
  417. Autonomous Vehicles as Bombs
  418. What’s in a Boarding Pass Barcode? A Lot
  419. Amazon AWS Web Application Firewall (WAF ) Launched
  420. Threatening to post a sex tape on Facebook isn't a crime, US court rules
  421. Information in Your Boarding Pass's Bar Code
  422. Stagefright 2.0 Vuln Affects Nearly All Android Devices
  423. Shell Shock Labs: [Part 1][EN] Hacking NETGEAR JWNR2010v5 Router - Authentication Bypass
  424. Terminal escape sequences - the new XSS for Linux sysadmins
  425. The Inside Story Behind MS08-067 - Defender Mindset - Site Home - TechNet Blogs
  426. Jump ESP, jump!: How I hacked my IP camera, and found this backdoor account
  427. Week 39 In Review – 2015
  428. Mistakenly-deployed test patch leads to suspicious Windows update , (Wed, Sep 30th)
  429. Apple removes iPhone app that reports US drone strikes
  430. State Trooper Vehicles Hacked
  431. Microsoft's enterprise-grade security is coming to Windows 10 IoT
  432. D-Link Accidentally Leaks Private Code-Signing Keys
  433. Unsupported Honeywell Experion PKS Vulnerable to Public Attacks
  434. Monica Lewinsky lawyer named as first outsider on secret US spy court
  435. It's baaaack: Stagefright 2.0 0day hoses all Android devices
  436. Poker Players Targeted By Card-Watching Malware
  437. Two-Week Old WordPress Malware Attack Is Blossoming Into Real Threat
  438. Security Wares Like Kaspersky Can Make You More Vulnerable To Attacks
  439. 650,000 Chinese Smartphones Used To Launch Ad Network DDoS Attack
  440. Week 37 In Review – 2015
  441. How $100 And Knowledge Of Wireless Protocols Could Bring Cities To A Standstill - Forbes
  442. First-ever monthly Android security updates start to roll out | Ars Technica
  443. Microsoft Pushes a Dozen Security Updates — Krebs on Security
  444. September 2015 Adobe Shockwave Security Patch | Threatpost | The first stop for security news
  445. Spawning Binds with Bluetooth
  446. Proxying Bluetooth devices for security analysis using btproxy · Conor Patrick
  447. thinkst Thoughts...: - Quick, Free, Detection for the Masses
  448. attactics[dot]org: Extracting Hashes & Plaintext Passwords from Windows 10
  449. The Wordpress Plugins Playground, (Mon, Sep 14th)
  450. Hacking Team, Computer Vulnerabilities, and the NSA
  451. Remember those Facebook "Dislike Button" scams? This time it's real...
  452. WordPress Patches Serious Shortcodes Core Engine Vulnerability
  453. Maker Kid Busted for Clock Handcuffed Wearing NASA T-Shirt
  454. Scary, sophisticated malware found attacking Cisco routers
  455. Apple iOS 9 is out – with a LOT of security holes patched
  456. Exploiting MS15-100 Vulnerability (CVE-2015-2509)
  457. iOS AirDrop vulnerability allows for malware installation on Apple devices
  458. Self-Destructing Computer Chip
  459. 5 Most Common Firewall Configuration Mistakes
  460. Zero-day vulnerabilities reportedly found in Kaspersky and FireEye security products
  461. 5 Free Security Analytics Tools
  462. Is John McAfee running for US president? 'My campaign manager told me not to comment'
  463. FireEye, Kaspersky Lab Scramble To Fix Bugs In Security Tools
  464. John McAfee Announces He's Running For President
  465. Cops Wardriving To Find MACs Of Stolen Gear
  466. Jessy Irwin on Password Security, Opsec and User Education
  467. Will New Security Features Win Over Windows Users?
  468. 10 things to do before you lose your laptop
  469. GM Took 5 Years To Fix A Full-Takover Hack In Millions Of OnStar Cars
  470. Yahoo! Refuses! To! Fix! Emoticon! Exploit! In! Messenger!
  471. Valasek: Today’s Furby Bug is Tomorrow’s SCADA Vulnerability
  472. Save WiFi: Act Now To Save WiFi From The FCC | Hackaday
  473. espreto/wpsploit · GitHub
  474. Yes, they just droned a hacker
  475. How CISOs can beat the information security skills-gap
  476. Victims Of US Government Mega-Breach Still Haven't Been Notified
  477. Ecuador Considered Smuggling Julian Assange In A Bag
  478. Netflix releases reflected XSS audit tool for biz
  479. The myth of the cybersecurity skills shortage
  480. What Windows Update for Business is, and what it is not
  481. Google Patches Critical Vulnerabilities in Chrome 45
  482. Secret Service agent pleads guilty to stealing money from Silk Road dealers
  483. Secret Service agent pleads guilty to stealing money from Silk Road dealers | Ars Technica
  484. Linux Foundation Releases Paranoid Internal Infosec Guide
  485. Goole, Mozilla, Microsoft Are Ending RC4 Support
  486. TSA Master Key Duplication & Why "Security Through (Not So) Obscurity" Fails - TrustedSec - Information Security
  487. ColdFusion Bomb: A Chain Reaction From XSS to RCE - Bishop Fox
  488. How to use Intel AMT and have some fun with Mainboards - Insinuator
  489. Sophisticated Security: What I learned from cracking 4000 Ashley Madison passwords
  490. It's Surprisingly Simple to Hack a Satellite | Motherboard
  491. These hackers warned the Internet would become a security disaster. Nobody listened. | The Washington Post
  492. Hacked! Credit Card information of 93,000 Customers Compromised
  493. Flash: Web Browser Plugins Are Vulnerable
  494. WordPress Compromises Behind Spike in Neutrino EK Traffic
  495. Patched Ins0mnia Vulnerability Keeps Malicious iOS Apps Hidden
  496. Why is the smart home insecure? Because almost nobody cares
  497. We're Just At The Beginning Of The Auto-Hacking Era
  498. Samsung Smart Fridge Leaves Gmail Logins Open To Attack
  499. Suicides Have Started Over The Ashley Madison Hack
  500. Ashley Madison Leak Reveals Its Ex-CTO Hacked Competing Site
  501. Grsecurity Stable Being Free To All Is Over
  502. Yet another Android security flaw: This time EVERYTHING is affected
  503. DIY Swiss Army Barbie multi-tool is ready for anything
  504. Industrial Control System Owners Unaware of Internet Connectivity
  505. Attackers are hijacking critical networking gear from Cisco, company warns | Ars Technica
  506. Four Often Overlooked Factors to Give Your Security Team a Fighting Chance
  507. Vulnerabilities Identified in Several WordPress Plugins
  508. Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool
  509. Ambient Sound Could Be The New Two-Factor Authentication System
  510. Uber is going on a security hiring binge
  511. Linus Torvalds on the state of software security, the Internet of Things, and the future of Linux - GeekWire
  512. Microsoft Drops Rush Internet Explorer Fix For Remote Code Exec Hole
  513. Zero Day Flaw Found In Mac OS X Yosemite Security Update
  514. Russian hackers accessed Pentagon's unclassified email system
  515. New malware turns your computer into a cellular antenna
  516. Ubiquity Stung $46.7 Million USD In E-Mail Spoofing Fraud
  517. XSS flaw put Salesforce accounts at risk of hijacking
  518. How to hack a Corvette with a text message
  519. It's alive! Patch Tuesday survives for Windows 10
  520. Dropbox Ups Its Security Game With USB Two Factor Authentication
  521. Your BMW Or Benz Could Also Be Vulnerable To That GM OnStar Hack
  522. Lenovo Hit With Criticism Over Second Rootkit-Like Utility
  523. Cisco warns customers about attacks installing rogue firmware on networking gear
  524. Buffer Overflow & Format String Attacks: Basics-Part 1
  525. Critical Remotely Exploitable Bug Haunts BIND
  526. Researchers Manipulate Rifle’s Precision Targeting System
  527. OwnStar Device Can Remotely Locate, Unlock, and Start GM Cars
  528. Goodbye Internet Explorer, Hello Edge
  529. Under 18s should get the right to remove themselves from the internet
  530. Researchers Hack Air-Gapped Computer With Cell Phone
  531. Gamers Steaming Over Dumb Valve Password Vuln
  532. Major Flaw In Android Phones Would Let Hackers In With Just A Text
  533. Security Industry Failing To Keep Pace With Hacker Innovation
  534. Xen fixes another “virtual machine escape” bug
  535. Want To Know How Your Board Thinks About Cybersecurity?
  536. Online Cheating Site AshleyMadison Hacked
  537. CVSS for ICS
  538. EFF Hopeful Car Hacking Demo Could Help Yield DMCA Exemption
  539. Hacking Team Claims It Always Sold ‘Strictly Within the Law’
  540. Four Zero Days Disclosed in Internet Explorer
  541. Chris Valasek on Car Hacking
  542. WordPress Patches Critical XSS Vulnerability in All Builds
  543. Ashley Madison Hacked: Site For People Who Can't Be Trusted Can't Be Trusted
  544. Adobe And Google Partner To Bolster Flash Security Via Project Zero
  545. Hackers Remotely Kill A Jeep On The Highway For Fun And Profit
  546. Going Too Far to Prove a Point
  547. LifeLock's woes continue as FTC claims violation of 2010 settlement
  548. The Jeep HACK – What You Need To Know
  549. New research: Comparing how security experts and non-experts stay safe online
  550. Remotely Hacking a Car While It's Driving
  551. Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical
  552. Apple's Thinking About Showing People Ads Based on Their Bank Balances
  553. Security Support Ends For Remaining Windows XP Machines
  554. Authentication Bypass Bug Hits Siemens Energy Automation Device
  555. Wi-Fi Alliance ushers in new era of intrusive apps
  556. Windows 10: you'll get UPDATES LIKE IT or NOT – unless you have Enterprise Edition
  557. Hacking Team: We Were Taken Out By A Government Conspiracy
  558. Third Hacking Team Flash Zero-Day Found
  559. Adobe, MS, Oracle Push Critical Security Fixes
  560. After Flash, what will exploit kits focus on next?, (Thu, Jul 16th)
  561. Celebrity caught on police camera causes Twitter uproar
  562. Software and the bogeyman
  563. Your Wi-Fi Network’s Soft Underbelly
  564. DMZ and Headless Chickens
  565. Finnish Decision is Win for Internet Trolls
  566. The Risks of Mandating Backdoors in Encryption Products
  567. Infamous Hacking Team Has Been Hacked
  568. Steer Clear Of Low-Tech Hacks: How To Keep Your Information Safe
  569. Ford's 400,000 Car Recall Could Be Tip Of An Auto Security Iceberg
  570. Adobe Tackles New Flash Threat After Hacking Team Leak
  571. Yet Another High Severity Bug Found In OpenSSL
  572. Three UK Politicians 'Hacked' Using Insecure WiFi
  573. Amazon just wrote a TLS crypto library in only 6,000 lines of C code
  574. Attackers Revive Deprecated RIPv1 Routing Protocol in DDoS Attacks
  575. Adobe patches zero-day Flash Player flaw used in targeted attacks
  576. Default SSH Key Found In Many Cisco Appliances
  577. Hundreds of Dark Web sites cloned and "booby trapped"
  578. Apple lets rip with update spate: OS X, iOS, Safari, iTunes, QuickTime
  579. TV's newest hacker drama "Mr. Robot" is technically sound, morally ambiguous
  580. Windows 10 Wi-Fi Sense feature shares your Wi-Fi network with your friends
  581. CyberUL is a dumb idea
  582. The disruptive effect of open-source startups
  583. US Navy caught trying to buy zero-day security flaws
  584. LinkedIn Goes Public with Its Private Bug Bounty
  585. You’re as secure as your apps’ developers allow them to be
  586. Wi-Fi Hacker Case Reveals Risks Faced By Home Users
  587. The Cardinals May Have Hacked The Astros
  588. EFF, ACLU Appeal License Plate Reader Case To California Supreme Court
  589. PowerShell ♥ the Blue Team - Windows PowerShell Blog - Site Home - MSDN Blogs
  590. HackerOne Connects Hackers With Companies, and Hopes for a Win-Win - The New York Times
  591. Research on The Trade-off Between Free Services and Personal Data
  592. Google launches Android bug bounty program
  593. Apple OS X and iOS in the vulnerability spotlight - meet "CORED," also known as "XARA"
  594. Should I panic because Lastpass was hacked?
  595. Hack Of LastPass Exposes Hashed Master Passwords
  596. Americans Resigned To Giving Up Their Privacy, Says Study
  597. Hacker Can Send Fatal Dose To Hospital Drug Pumps
  598. iOS 9 Users To Use 6 Digit Passcodes And 2-Step Auth
  599. Who's behind mysterious flights over US cities? FBI -
  600. USA Freedom Act Passes: What We Celebrate, What We Mourn, and Where We Go From Here | Electronic Frontier Foundation
  601. Nmap Development: Sourceforge Hijacks the Nmap Sourceforge Account
  602. Users with weak SSH keys had access to GitHub repositories for popular projects | ITworld
  603. Full Disclosure: More than 60 undisclosed vulnerabilities affect 22 SOHO routers
  604. OpenSesame - hacking garages in seconds
  605. Apple Moving to 2FA, Six-Digit Passcodes in iOS 9
  606. The Promises And Perils Of The Healthcare Internet Of Things
  607. [webapps] - WordPress zM Ajax Login & Register Plugin 1.0.9 Local File Inclusion
  608. [webapps] - Wordpress Really Simple Guest Post <= 1.0.6 - File Include
  609. What's the state of iPhone PIN guessing
  610. [webapps] - WordPress Encrypted Contact Form Plugin 1.0.4 - CSRF Vulnerability
  611. Sniffing and tracking wearable tech and smartphones
  612. An Exploit Kit dedicated to CSRF Pharming | Malware don't need Coffee
  613. Exploit Kit Delivers Pharming Attacks Against SOHO Routers | Threatpost | The first stop for security news
  614. moha99sa/EvilAP_Defender · GitHub
  615. Cyber insurance: Only fools rush in | ITworld
  616. Cyber insurance: Only fools rush in | ITworld
  617. Google Online Security Blog: New Research: Some Tough Questions for ‘Security Questions’
  618. [webapps] - IPLINK IP-DL-801RT-B - (Url Filter Configuration Panel) Stored XSS
  619. Slew of Vulnerabilities Found in D-Link Storage Devices
  620. Microsoft Windows 10: Three Security Features To Know About
  621. Board Rooms Becoming More Security-Savvy
  622. Script tool a Docker shocker blocker
  623. New Exploit Leaves Most Macs Vulnerable To Permanent Backdooring
  624. New SOHO router security audit uncovers over 60 flaws in 22 models
  625. 95% Of Weapons, Explosives Missed In TSA Tests
  626. IoT Devices Hosted On Vulnerable Clouds In 'Bad Neighborhoods'
  627. The Dark Web Drug Lords Who Got Away
  628. Microsoft accidentally announced its new WiFi service
  629. IoT DANGERS: BYOD’s trashier cousin becoming a right tearaway
  630. Microsoft to Support SSH in Windows
  631. Mad John McAfee: 'Can you live in a society that is more paranoid than I'm supposed to be?'
  632. Branded Vulnerabilities May Change Enterprise Security
  633. Understanding TSA Math
  634. Study: Average Cost Of Data Breach Is $6.5 Million
  635. Password reset sites expose crackable PeopleSoft creds
  636. 1 In 20 Android Apps Hit By Apache Cordova Flaw
  637. Trojanized, info-stealing PuTTY version lurking online
  638. Changes to Export Control Arrangement Apply to Computer Exploits and More | Center for Internet and Society
  640. Stink Bombs for Riot Control
  641. Possible Wordpress Botnet C&C:, (Tue, May 26th)
  642. Race Condition Exploit in Starbucks Gift Cards
  643. IRS: Crooks Stole Data on 100K Taxpayers Via ‘Get Transcript’ Feature
  644. Phones' accelerometers allow you to be tracked on the metro
  645. WordPress FeedWordPress 2015.0426 SQL Injection
  646. WordPress WP Photo Album Plus 6.1.2 Cross Site Scripting
  647. Phantom Menace Hack Strikes Oil Industry
  648. United Airlines Bug Bounty Pays With Miles
  649. Lets Call Stunt Hacking What it is, Media Whoring.
  650. Our Lord of the Flies moment
  651. How I Got Here: Marcus Ranum
  652. Toyota Prius batteries being targeted by car thieves
  653. 1.1 Million Hit In Another BlueCross BlueShield Breach
  654. Security Researchers Wary of Proposed Wassenaar Rules
  655. NetUSB Flaw Puts Millions Of Routers At Risk
  656. ‘90s-style security flaw puts “millions” of routers at risk
  657. How your next password could be your brain
  658. The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
  659. Half Of Retail, Healthcare Sites 'Always Vulnerable'
  660. A practical history of plane hacking: Beyond the hype and hysteria
  661. Compromised WordPress sites leaking credentials
  662. Vendors Step Up & Step Down
  663. License Plate Scanners Hidden in Fake Cactus
  664. PHP Hash Comparison Weakness A Threat To Websites, Researcher Says
  665. "Skynet" is real, and it could flag you as a terrorist
  666. Home Automation Software Z-Way Vulnerable to Remote Attacks
  667. Taking A Security Program From Zero To Hero
  668. Heartbleed, eat your heart out: VENOM vuln poisons countless VMs
  669. Home routers co-opted into self-sustaining DDoS botnet
  670. Dan Kaminsky on VENOM
  671. VENOM Vulnerability
  672. Venom Bug Threatens Virtual Machines
  673. Malvertising strikes on dozens of top adult sites | Malwarebytes Unpacked
  674. Netflix Releases FIDO Incident Response Tool
  675. Usbkill Script Can Render Computers Useless
  676. In charge of security? We need to talk...
  677. Would you buy an Ubuntu phone that doubled as a desktop PC?
  678. The Internet of Things will take a beating at DefCon
  679. Vixie Proposes 'Cooling-Off Period' For New Domains To Deter Cybercrime
  680. Infusion pump is hackable … but rumours of death are exaggerated
  681. Millions of WordPress websites at risk from in-the-wild exploit
  682. 84,000 Ad Injectors Found Targeting Chrome
  683. Attackers exploit vulnerabilities in two WordPress plugins
  684. How to interview prospective employers
  685. iPad crash grounds dozens of American Airlines flights
  686. Tesla Twitter Account And Website Hijacked, Elon Musk Pwned
  687. Comments considered harmful: WordPress web hijack bug revealed
  688. WordPress Rushes Out Fix For Zero-Day Flaw
  689. Surgery Bot Can Be Hacked To Hack You To Pieces
  690. Note To Vendors: CISOs Don't Want Your Analytical Tools
  691. RSA Highlighted Impending IoT Troubles
  692. How To Crack Many Master Lock Combinations In 8 Tries Or Less
  693. Google Releases Password Alert Extension for Chrome
  694. A Year Later, XSS Vulnerability Still Exists in eBay
  695. WordPress Ecommerce Plugin Vulnerability Details Disclosed
  696. Wi-Fi Woes Continue To Plague Infosec
  697. To Evangelize Security, Get Out Of Your Comfort Zone
  698. Hackers gaining upper hand, security conference told
  699. 6 Most Dangerous New Attack Techniques in 2015
  700. Wi-Fi client vulnerability could expose Android, Linux, BSD, other systems to attacks
  701. CozyDuke Hackers Infiltrate The White House With 'Funny Monkey' Videos
  702. iOS Vulnerability Could Force Devices Into Endless Reboot Loop
  703. Man guns down computer after getting fed up with Blue Screen of Death
  704. Unsolicited Response Podcast: Rios on WhiteScope and Medical Device Security
  705. An Incredibly Insecure Voting Machine
  706. IRC Botnets alive, effective & evolving
  707. Security, Fast and Slow
  708. Reversing Belkin’s WPS Pin Algorithm
  709. Hacking the D-Link DIR-890L
  710. What the Ridiculous Fuck, D-Link?!
  711. D-Link router patch creates NEW SOHOpeless vuln
  712. Drug Pump's Security Flaw Lets Hackers Raise Dose Limits
  713. Hacked French Network Exposed Its Own Passwords During TV Interview
  714. 8th Grader Charged With Felony For Snagging Password
  715. Snowden's 'Sexy Margaret Thatcher' Password Isn't So Secure
  716. Unpatched 18 Year Old Windows MiTM Vuln Revived
  717. Prosecutors Suspect Man Hacked Lottery Computers
  718. Hackers Could Commandeer New Planes Through Passenger Wi-Fi
  719. SQLite 22 Bugs
  720. WordPress Ajax Store Locator 1.2 SQL Injection
  721. Flaw in WordPress caching plug-in could affect over 1 million sites
  722. Snapchat blocks access to all third-party apps in bid to improve security
  723. Researchers: IoT devices are not designed with security in mind
  724. Hacks On Critical Infrastructure Are More Common Than You Think
  725. Long Live the Botnet
  726. Watcher – Passive Web Application Vulnerability Scanner
  727. Court might force US to reveal details of secret WiFi kill switch
  728. FBI warns WordPress users of ISIS threat: Patch and update now
  729. Penetration Testing: You’re Doing it Wrong (?) – Part One
  730. Hillary’s emails: Deleted but not gone
  731. Hotel WiFi Vuln Puts Guests At Risk
  732. RSA Bans Booth Babes
  733. The US Has Used Zero-Day Exploits For Quite A While
  734. Men Disguised As Women Storm NSA HQ
  735. Uber Denies It Was Hacked
  736. Flaw Deletes YouTube Videos In Just A Few Clicks
  737. Evidence Links China To GitHub Attack
  738. Cross-Site Scripting Vulnerability Discovered In WordPress Photo Gallery Plugin | Fortinet Blog
  739. Rush To Release Resulting In Vulnerable Mobile Apps
  740. Pin-pointing China's attack against GitHub
  741. Remote Code Execution Possible Via Dell System Detect
  745. BIOS Hacking
  746. Maturing Your Vulnerability Management Program – Part 1 | Core Security Blog
  747. 5 Ways to a Kick A$$ Vulnerability Management Program-Part 2
  748. Reverse Engineering Incentives
  749. How I hacked my smart bracelet
  750. The Internet Of Bring-Your-Own Things
  751. Researchers Use Heat To Breach Air-Gapped Systems
  752. Wind Turbine Blown Away By Control System Vulnerability
  753. Romanian Man Extradited To U.S. To Face Hacking Charges
  754. A $60 Gadget That Makes Car Hacking Far Easier
  755. Gives Out A T-Shirt For XSS Issue Reported
  756. Cisco Patches IOS To Stop Automation Exploitation
  757. Most Companies Expect To Be Hacked In The Next 12 Months
  758. 10 Ways To Measure IT Security Program Effectiveness
  759. The End of Pen Testing As We Know It?
  760. The 7 Best Social Engineering Attacks Ever
  761. D-Link patches yet more vulns
  762. Despite what you may have heard, Internet Explorer is not dead
  763. Black Hat USA 2015: Focus on Infrastructure
  764. Don’t click on the porn video your Facebook friend shared
  765. Epic Google snafu leaks hidden whois data for 280,000 domains | Ars Technica
  766. Information Security: A Primer on IoT Security ... | SecurityStreet
  767. Door Skimmer + Hidden Camera = Profit
  768. Tool Release – CANBus Protector
  769. OpenSSL Patch to Plug Severe Security Holes
  770. Top 10 API Security Considerations
  771. Analysis of a Remote Code Execution Vulnerability on Fortinet Single Sign On
  772. Double FREAK! A cryptographic bug that was found because of the FREAK bug
  773. EMET 5.2 is available (update)
  774. What ever it is, CISA isn't cybersecurity
  775. Visual Studio VSTFS protocol handler command injection
  776. Identifying When Someone Is Operating a Computer Remotely
  777. Full Disclosure: PHPMoAdmin Unauthorized Remote Code Execution (0-Day)
  778. No Wireshark? No TCPDump? No Problem! - SANS Internet Storm Center
  779. Tool Release – Digital Bond CANBus-Utils « Digital Bond's SCADA Security Portal
  780. DanMcInerney/net-creds · GitHub
  781. Anatomy of a Hack
  782. Apartment complex threatens residents with $10k fines for negative online reviews
  783. Patch Tuesday patches FREAK, Universal XSS
  784. CIA spent last 10 years cracking Apple’s encryption
  785. What we know about security features on the Apple Watch
  786. Panda antivirus labels <em>itself</em> as malware, then borks EVERYTHING
  787. Mattel urged to scrap Wi-Fi mic Barbie after Register investigation
  788. Panda antivirus mistakenly flags itself as malware, bricks PCs
  789. Ford, Toyota and General Motors could be taken to court over hackable cars
  790. How To Keep Your Smart Home Safe
  791. Some notes on DRAM (#rowhammer)
  792. Latest WordPress bug highlights importance of securing the supply chain
  793. Lizard Squad Hackers Attack Lenovo After Superfish Scandal
  794. Twitter Triples Abuse Team, Knocks Dox
  795. US Air Traffic Control Vulnerable To Terrorist Hackers
  796. D-Link Removes Fingers From Ears, Preps Mass Router Patch
  797. The C99Shell Is Not Dead
  798. Abusing Blu-ray Players Pt. 1 – Sandbox Escapes | NCC Group
  799. Pulling Remote Word Documents from RAM using Kali Linux | CYBER ARMS - Computer Security
  800. w00tsec: Extracting RAW pictures from memory dumps
  801. albinowax/ActiveScanPlusPlus · GitHub
  802. The two most dangerous IT security sins, that everyone does
  803. Broadband routers: SOHOpeless and vendors don't care
  804. Listen to an actual Microsoft support scam as it happened
  805. How infosec hiring lost its way: Harsh findings in Leviathan report | ZDNet
  806. Lack of CSPRNG Threatens WordPress Sites | Threatpost | The first stop for security news
  807. Why We Should Design Some Things to Be Difficult to Use
  808. Information disclosure flaw exposes Netgear wireless routers to attacks
  809. Red Hat CEO: Today’s IT department is in a fight for its life
  810. Mozilla's Flash-Killer 'Shumway' Appears In Firefox Nightlies
  811. BadUSB Vulnerabilities Live in ICS Gear Too
  812. You’re Not Paranoid, Someone Is Spying on Your Company
  813. Israel targeted by malware packaged with pornographic video
  814. Christofer Hoff on Mixed Martial Arts, Active Defense, and Security
  815. Samsung smart TVs don't encrypt the voice data they collect
  816. ‘BadUSB’ Poses Threat to Industrial Control Systems, Says Security Researcher
  817. Microgrids and Smart Grid Resilience
  818. End Users Causing Bulk Of Infosec Headaches
  819. Critical 0-days in open source? The problem isn't code, it's CASH
  820. Today I Am Releasing Ten Million Passwords
  821. A Winning Strategy: Must Patch, Should Patch, Can't Patch
  822. Microsoft Plugs 41 Internet Explorer Flaws
  823. Chinese Hackers Compromised Using IE, Flash Zero Days
  824. Hacker kicks one bit XP to 10 Windows scroll goal
  825. Anthem data breach cost likely to smash $100 million barrier
  826. Hacker finds vulnerability in Facebook, can delete your photo albums
  827. Anthem Breach May Have Started in April 2014
  828. Exploiting “BadIRET” vulnerability (CVE-2014-9322, Linux kernel privilege escalation) | Bromium Labs
  829. Microsoft Packing More CVEs into Fewer Security Bulletins
  830. Nscan: Fast Internet Wide Scanner | Python for Pentesting
  831. AirPcap Channel Hopping With Python | Didier Stevens
  832. OWASP Proactive Controls - OWASP
  833. Droopescan – Plugin Based CMS Security Scanner
  834. The year the security dog caught the car
  835. D-Link routers vulnerable to DNS hijacking
  836. Welcome to my sit-stand desk nightmare | Ars Technica
  837. 3 Disturbing New Trends in Vulnerability Disclosure
  838. BMW's Software Security Patch A Sign Of Things To Come
  839. Adobe Flash Zero Days Prove Signatures Are Dead
  840. Adobe Begins Patching Third Flash Player Zero Day
  841. Siemens Sighs: SCADA Bugs Abound
  842. Attackers exploit zero-day flaw in popular WordPress plug-in
  843. Critical Ghost bug could haunt WordPress and PHP apps, too | Ars Technica
  844. Security 101: Show Your List!
  845. Anthem Hacked – US Health Insurance Provider Leaks 70 Million Records
  846. Yet Another Emergency Flash Player Patch — Krebs on Security
  847. The Shadow File: Patching, Emulating, and Debugging a Netgear Embedded Web Server
  848. GDS - Blog - BadSamba - Exploiting Windows Startup Scripts Using a Malicious SMB Server
  849. delvelabs/vane · GitHub
  850. WTF! It Should Not Be Illegal To Hack Your Own Car's Computer
  851. Building A Cybersecurity Program: 3 Tips
  852. Small Drone Found On White House Lawn
  853. Android Wi-Fi Direct Vulnerability Details Disclosed
  854. Mark Dowd finds bug in ultra secure BlackPhone that lets attackers stalk users
  855. Apple Patches Thunderstrike Bug in OSX, Fixes More Than 30 Flaws in iOS
  856. Top smut site Flashes visitors, leaves behind nasty virus
  857. The GHOST vulnerability – what you need to know
  858. Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK | Malware don't need Coffee
  859. Java Patch Plugs 19 Security Holes — Krebs on Security
  860. Guest Blog: httpscreenshot - A Tool for Both Teams
  861. Nobody thought BlackPhone was secure -- just securer
  862. Some notes on GHOST
  863. Meet Reuben Paul: 8 year old CEO, Cyber Security Ambassador and Haxpo Highlight Speaker
  864. Had a data breach? Well, SPEAK UP, big biz – Obama
  865. Lizard Squad’s DDoS-For-Hire Service Built on Hacked Home Routers
  866. Router creds admin/admin? Lizard Squad thanks you
  867. Remember Corel? It's just entered .DLL hell
  868. Insert 'Skeleton Key', unlock Microsoft Active Directory. Simples – hackers
  869. Why on Earth Is IBM Still Making Mainframes?
  870. Instagram Flashed Your Privates To Picture Pervs
  871. AMD Plugs Firmware Holes That Allowed Command Injection
  872. 4 Mega-Vulnerabilities Hiding in Plain Sight
  873. Warning: Using encrypted email in Spain? Do not pass go, go directly to jail
  874. It's 2015 and home routers still leave their config web servers wide open
  875. Security? Don't bother until it's needed says RFC
  876. Internet of Things promises analytics boom
  877. Four Disruptive Hacks to Come in 2015
  878. Marriott Agrees to Stop Blocking Guest WiFi Devices
  879. The International Conference on PASSWORDS 2014. - NTNU openVideo
  880. ASUSWRT - LAN Backdoor Command Execution
  881. pwntools – CTF Framework & Exploit Development Library
  882. Ouch! Home router security "bypass" actually means no security AT ALL
  883. DevOoops: Spoofing GitHub Users
  884. Obama's War on Hackers
  885. Attack Attribution in Cyberspace
  886. Internet of Things is a threat to privacy, says FTC
  887. Thieves Jackpot ATMs With ‘Black Box’ Attack
  888. Thunderstrike shocks OS X with firmware bootkit
  889. ‘Self-XSS’ flaw in found Microsoft Dynamics CRM
  890. OpenSSL Fixes Eight Security Vulnerabilities
  891. Anybody can take North Korea offline
  892. IoT Security: How to Protect Applications on the Edge
  893. The Elephant in the Room is Compliance
  894. Best Defense Against a Cyber-Attack Is to Know Your Adversary
  895. Home Wi-Fi security's just as good as '90s PC security! Wait, what?
  896. Poll: The Perimeter Has Shattered!
  897. How To Become a CISO: Top Tips
  898. 5 ways to prepare for Internet of things security threats
  899. Mobile security — top tips for protection for BYOD devices
  900. New WordPress Password Policy in WP Password Policy Manager Plugin
  901. 2014: The Year of Shaken Trust
  902. Internet Of Things: 3 Holiday Gifts That Will Keep CISOs Up At Night
  903. Employees Still Get More Access Than They Need
  904. It's nearly 2015 – and your Windows PC can still be owned by a Visual Basic script
  905. Why You Shouldn’t Use MAC Address Filtering On Your Wi-Fi Router
  906. Coming to Blackphone: An app store loaded with privacy tools
  907. Hacked payment card service transmitted some data in plaintext
  908. Intel's IoT vision encompasses more than chips
  909. Belden buys Tripwire for $710m: Will keep network burglars out of Internet of Things things
  910. Sony Hackers Leak Netflix Deal Info
  911. Judge Says Banks Can Sue Target (December 4 & 8, 2014)
  912. ‘Poodle’ Bug Returns, Bites Big Bank Sites
  913. Not Enough CISOs to Go Around
  914. The Sony Picture's Hack: Hollywood's Snowden Moment
  915. Critical Remote Code Execution Flaw Found in WordPress Plugin
  916. tcpdump multiple security vulnerabilities
  917. Apache Site Hacked Through SSH Key Compromise
  918. Sony just got hacked, doxxed, and shut down | News |
  919. Website Security - Protecting The Unknown - Software Vulnerabilities | Sucuri Blog
  920. DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS • The Register
  921. Do you use SSL/TLS on internal comms?
  922. Guest diary: Detecting Suspicious Devices On-The-Fly, (Tue, Nov 25th)
  923. Bugtraq: WordPress 3 persistent script injection
  924. google/firing-range · GitHub
  925. [DeepSec 2014] Trusting Your Cloud Provider. Protecting Private Virtual Machines – Armin Simma | Cатсн²² (in)sесuяitу / ChrisJohnRiley
  927. Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools | Motherboard
  928. Critical XSS Flaw Affects WordPress 3.9.2 And Earlier
  929. Apple TV multiple security vulnerabilities
  930. Remote Code Execution in Popular Hikvision Surveillance DVR
  931. Don't Discount XSS Vulnerabilities
  932. Regin: When did protection start?
  933. Strength in numbers: Why layered network protection is priority
  934. All Your Base, Encrypted They Are
  935. Reversing Industrial firmware for fun and backdoors I
  936. Reversing DELL's DRAC firmware
  937. Wireless attacks against 'air gapped' targets are possible, Israeli team claims
  938. You're Doing BYOD Wrong: These Numbers Prove It - Dark Reading
  939. DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests | WIRED
  940. BASHLITE Affects Devices Running on BusyBox
  941. Major iOS security flaw ‘Masque Attack’ reportedly uncovered, found to ‘pose much bigger threat’ than WireLurker | 9to5Mac
  942. Reverse Engineer a Verisure Wireless Alarm part 1 – Radio Communications | Fun Over IP
  943. SANS Digital Forensics and Incident Response Blog | Protecting Privileged Domain Accounts: Restricted Admin and Protected Users | SANS Institute
  944. HP TippingPoint + Mobile Pwn2Own: Day 2 - HP Enterprise Business Community
  945. HP TippingPoint + Mobile Pwn2Own = Zero Day Filter... - HP Enterprise Business Community
  946. Disarming and Bypassing EMET 5.1
  947. Additional information about CVE-2014-6324
  948. Week 45 In Review – 2014
  949. BBC News - Pirate Bay co-founder 'TiAMO' arrested in Thailand
  950. Chertoff Reminds Enterprises There is Hope in Security
  951. WireLurker Malware Infects iOS and OS X
  952. Whois someone else?, (Tue, Nov 4th)
  953. Password hash disclosure in Linksys Smart WiFi routers | Weblog | Sijmen Ruwhof
  954. Smeege Sec: Detecting and Exploiting the HTTP PUT Method
  955. How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper | Cyber Security Labs @ Ben-Gurion University of the Negev
  956. Reversing D-Link’s WPS Pin Algorithm
  957. NSA-Approved Samsung Knox Stores PIN in Cleartext | Threatpost | The first stop for security news
  958. Watch That Windows Update: FTDI Drivers Are Killing Fake Chips
  959. Symantec Intelligence Report: September 2014 | Symantec Connect
  960. [SecTorCA] Reverse Engineering a Web Application – for fun, behavior & WAF Detection | Cатсн²² (in)sесuяitу / ChrisJohnRiley
  961. Hacking with the Oldies!, (Thu, Oct 30th)
  962. 3 ways to make your Gmail account safer | Naked Security
  963. Millions of Drupal websites at risk from failure to patch
  964. telnetd rulez: Cisco Ironport WSA Telnetd Remote Code Execution Vulnerability, (Wed, Oct 22nd)
  965. Google goes beyond two-step verification with new USB Security Key
  966. Leave your passwords at the Checkout Desk
  967. Hackers hold 7 million Dropbox passwords ransom - CNET
  968. snapchat-decrypt/ at master · programa-stic/snapchat-decrypt · GitHub
  969. Index of /hitbsecconf2014kul/materials
  970. SIM Card Forensics | 0xicf
  971. Meet the NSA’s hacker recruiter
  972. Yahoo Servers Were Owned By Bash Bug Hackers
  973. ▶ nullcon Goa 2014: Pentesting Proprietary RF Communications by Justin Searle @meeas - YouTube
  974. The Best DerbyCon 2014 Talks for Red Teams | Strategic Cyber LLC
  975. Protocol Differential Analysis
  976. Some POODLE notes
  977. Microsoft Patches Critical Windows, .NET Zero Day Flaws
  978. Drupal Fixes Highly Critical SQL Injection Flaw
  979. Russian Hackers Made $2.5B Over The Last 12 Months
  980. Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
  981. Man bites dog: HTTPS-menacing POODLE is 'hard to exploit' – unless you're on public Wi-Fi
  982. Anonabox Kickstarter Project Raises Controversy At Reddit
  983. Smart Meters Can Be Hacked To Cut Power Bills
  984. BadUSB Update
  985. OpenSSL Releases Patch for POODLE Attack
  986. SSLv3 POODLE Vulnerability Official Release, (Tue, Oct 14th)
  987. Who ya gonna call? Ghostbusters cosplayers at NYCC
  988. How Retail Can Win Back Consumer Trust
  989. Android SMS worm Selfmite returns, more aggressive than ever
  990. Who named "shellshock"?
  991. Wget off the leash
  992. Why (Cyber) Insurance Is Sexy
  993. Medical Records For Sale in Underground Stolen From Texas Life Insurance Firm
  994. In Home Depot Breach, Investigation Focuses on Self-Checkout Lanes
  995. Top 10 Security Issues for REST APIs
  996. Mucking About With SquashFS
  997. Meet The Next Next-Gen Firewall
  998. 7 Reasons To Love Passwords
  999. Why hackers may be stealing your credit card numbers for years
  1000. Apple blames 'targeted attack' for leaked nude celebrity photos
  1001. Rich Mogull on Apple Pay
  1002. Hacker "weev" has left the United States
  1003. Protecting yourself against the celebrity iCloud hackers
  1004. Identifying Firewalls from the Outside-In. Or, "There's Gold in them thar UDP ports!", (Thu, Sep 4th)
  1005. Scared of brute force password attacks? Just 'GIVE UP' says Microsoft
  1006. Twitter offers a $140 bug bounty reward- The Inquirer
  1007. Some Cable Modems Found to Leak Sensitive Data Via SNMP
  1008. Hackers exploit critical vulnerability in popular WordPress theme component
  1009. One in Five Massachusetts Residents Breached in 2013
  1010. Feared Home Depot Breach Sparks More Interest in Backoff PoS Malware
  1011. Threats in Custom App Development: Enterprises’ Lack of Security
  1012. Wi-Fi Sense?
  1013. How I Hacked My Home, IoT Style
  1014. 10 Common Software Security Design Flaws
  1015. Backoff, Dairy Queen, UPS & Retail's Growing PoS Security Problem
  1016. Netflix releases home-grown DDoS detectors
  1017. Researchers camouflage haxxor traps with fake application traffic
  1018. Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections
  1019. Why Are Security Pros Blase About Compliance?
  1020. SSDP Amplification Scanner
  1021. Secure Development - One Bathroom Break At A Time
  1022. Masscan does STARTTLS
  1023. Retired US airport body scanners fail to spot guns, knives
  1024. Security of 'Things'
  1025. Researchers find it’s terrifyingly easy to hack traffic lights | Ars Technica
  1026. UPS Admits 51 Stores Hit With Malware For Five Months
  1027. - Securing the "Internet of Things", Together.
  1028. Internet Of Things Security Reaches Tipping Point
  1029. Why you need to do less if you want better security
  1030. The biggest iPhone security risk could be connecting one to a computer | Network World
  1031. Study finds firmware plagued by poor encryption and backdoors | PCWorld
  1032. Home routers supplied by ISPs can be compromised en masse - Computerworld
  1033. ISP-Supplied Home Routers Could be Compromised Through Protocol That Allows Remote Troubleshooting (August 10, 2014)
  1034. Good bot, bad bot? 23 million Twitter accounts are automated
  1035. BadUSB, keynote controversy: Black Hat USA 2014 videos now online
  1036. “Your cons are just an excuse to drink and party”
  1037. Free Wi-Fi - but it'll cost you your privacy
  1038. 3 security mistakes small companies make and how to avoid them
  1039. A Honeypot for home: Raspberry Pi, (Thu, Jul 31st)
  1040. General Availability for Enhanced Mitigation Experience Toolkit (EMET) 5.0
  1041. The Fundamental Insecurity of USB
  1042. Another Potential Retail Mega Breach At Sandwich Chain Jimmy Johns
  1043. Some Thoughts on Verizon DBIR
  1044. Binwalk v2.0 Released!
  1045. More fun with #TSA
  1046. [webapps] - NETGEAR DGN2200 - Password Disclosure vulnerability
  1047. Four Steps to Successfully Implementing Security into a Continuous Development Shop
  1048. For Java: I Patch, Therefore I Am?
  1049. Active Directory Vulnerability Disclosure: Weak encryption enables attacker to change a victim’s password without being logged - Aorato
  1050. Car Hacker's Handbook
  1051. Fingerprinting Computers By Making Them Draw Images
  1052. "Password Storage Mistakes"
  1053. Can I use Dropbox?
  1054. On Mobile Device ICS App Security
  1055. Securing the Nest Thermostat
  1056. WordPress brute force attack via wp.getUsersBlogs, (Tue, Jul 22nd)
  1057. Car hackers build anti-car-hacking gadget
  1058. Firefox 31 has arrived - 11 bulletins, 3 critical, 0 visual surprises
  1059. New Feature: "Live" SSH Brute Force Logs and New Kippo Client, (Wed, Jul 23rd)
  1060. Thoughts on BrutPOS
  1061. Pre-order Your Copy of ‘Spam Nation’ Now!
  1062. Please update Flash on your systems
  1063. This Common Home Appliance Can Compromise Your Entire Security
  1064. 10 Powerful Facts About Big Data - InformationWeek
  1065. Zendesk Insights Shows It’s A Data-Driven World
  1066. Intrusive Healthcare
  1067. 6 Tips for Using Big Data to Hunt Cyberthreats
  1068. Etsy’s Threat Modeling
  1069. As security startups heat up, a reminder that security is not a product or service: it’s a value — Tech News and Analysis
  1070. Penetration Testing Scripts | Common Exploits - Penetration Testing Information
  1071. Episode #179: The Check is in the Mail
  1072. Remote Access Hack Compromises POS Vendor | Threatpost | The first stop for security news
  1073. Mysterious cyberattack compromises more than a thousand power plant systems | The Verge
  1074. Attackers poison legitimate apps to infect sensitive industrial control systems | Ars Technica
  1075. Burp Suite Tutorial – Web Application Penetration Testing (Part 1)
  1076. Locking down PHP
  1077. OpenSSL describes its own sad state of affairs
  1078. Netflix Open Sources AWS Monitoring Tool: Security Monkey!
  1079. Living Up To Rock Star Status
  1080. How to Become a PMP
  1081. Exploding Cigarettes and AppSec
  1082. Plaintext Supermicro IPMI Credentials Exposed
  1083. Why A Secured Network Is Like The Human Body
  1084. Patched Code-Execution Bug Affects Most Android Users
  1085. Got a botnet? Thinking of using it to mine Bitcoin? Don't bother
  1086. Major SSL flaw found in iOS, OS X
  1087. Own goal as World Cup Wi-Fi passwords spilled in newspaper snap
  1088. SCADA/ICS Systems Under Attack In Europe Stuxnet-Style
  1089. Puppet Dashboard Multiple XSS Vulnerabilities
  1090. Asterisk PJSIP Channel Driver Multiple DoS Vulnerabilities (AST-2014-005 / AST-2014-008)
  1091. Asterisk HTTP Session Handling DoS (AST-2014-007)
  1092. Asterisk Manager Interface MixMonitor Privilege Escalation (AST-2014-006)
  1093. Brocade Fabric OS Default Credentials
  1094. Participants Database Plugin for WordPress query Parameter SQL Injection
  1095. Participants Database Plugin for WordPress < query Parameter SQL Injection
  1096. Cisco TelePresence Supervisor MSE 8050 Multiple Vulnerabilities in OpenSSL
  1097. Cisco TelePresence MCU Series Devices Multiple Vulnerabilities in OpenSSL
  1098. Cisco ONS 15400 Series Devices Multiple Vulnerabilities in OpenSSL
  1099. Cisco Windows Jabber Client Multiple Vulnerabilities in OpenSSL
  1100. Cisco Adaptive Security Appliances Multiple Vulnerabilities in OpenSSL
  1101. Cisco ACE30 and ACE4710 OpenSSL 'ChangeCipherSpec' MiTM Vulnerability
  1102. Cisco Unsupported ACE Module Detection
  1103. Cisco TelePresence Supervisor Detection
  1104. Junos Pulse Secure Access IVE / UAC OS Multiple OpenSSL Vulnerabilities (JSA10629)
  1105. McAfee Web Gateway Multiple OpenSSL Vulnerabilities
  1106. McAfee ePolicy Orchestrator Multiple OpenSSL Vulnerabilities
  1107. Symantec Web Gateway < 5.2.1 Multiple Vulnerabilities (SYM14-010)
  1108. Cogent DataHub < 7.3.5 Multiple Vulnerabilities
  1109. AlienVault OSSIM 'av-centerd' Remote Code Execution
  1110. OSSIM SOAP Service Detection
  1111. Default Password (f00b@r) for 'root' Account
  1112. Countertack Sentinel User Interface Detection
  1113. Countertack Sentinel Detection
  1114. Havex Hunts For ICS/SCADA Systems - F-Secure Weblog : News from the Lab
  1115. Cisco Security Advisory: Undocumented Test Interface in Cisco Small Business Devices
  1116. Ten Years Later, Cabir Worm's Place in History is Unique | Threatpost | The first stop for security news
  1117. Black Hat USA 2014: Embedded & Vulnerable
  1118. Tavis Ormandy finds an embarrassing hole In more Microsoft products
  1119. Research Project Pays People to Download, Run Executables
  1120. Gear to Block ‘Juice Jacking’ on Your Mobile
  1121. Ransomware with a happy ending | Naked Security
  1122. Vixie: Open Internet is Slowly Poisoning Us
  1123. Hacking the DSP-W215, Again, Again, Again
  1124. Hacking the DSP-W215, Again, Again
  1125. Hacking the DSP-W215, Again
  1126. Products endorsed by cybersec experts
  1127. Passive OS Detection Report
  1128. OpenSSL ChangeCipherSpec Dashboard
  1129. Samba < 3.6.20 / 4.0.11 / 4.1.1 Multiple Vulnerabilities
  1130. Citrix XenServer Windows Guest Tools Remote DoS
  1131. Citrix XenServer Tools Detection
  1132. Unsupported ScreenOS Operating System
  1133. IBM Tivoli Directory Server 6.0.x / 6.1 < / 6.2 < / 6.3 < Javadoc Frame Injection
  1134. EMC Documentum D2 Privilege Escalation
  1135. Juniper ScreenOS 5.4 < 5.4.0r28 / 6.2 < 6.2.0r18 / 6.3 < 6.3.0r16 Malformed ICMP Echo Request DoS (JSA10604)
  1136. Juniper ScreenOS 5.4.x < 5.4.0r12 / 6.1.x / 6.2.x < 6.2.0r2 'about.html' Information Disclosure
  1137. Juniper ScreenOS < 5.4.0r10 / 6.0 < 6.0.0r6 / 6.1 < 6.1.0r2 Web Interface and Telnet Login Pages XSS (JSA10388)
  1138. OpenSSL 1.0.1 < 1.0.1h Multiple Vulnerabilities
  1139. OpenSSL 0.9.8 < 0.9.8za Multiple Vulnerabilities
  1140. Opera < 22 Multiple Chromium Vulnerabilities
  1141. Ubuntu 13.10 : linux vulnerabilities (USN-2241-1)
  1142. They Hack Because They Can
  1143. Botnets coming soon to a smart home or automated building near you
  1144. Linksys E4200 Vulnerability Enables Authentication Bypass
  1145. Vulnerabilities in IPMI Protocol Have Long Shelf Life
  1146. How Teen Hackers Were Portrayed In 1980s Family Magazines
  1147. Critical OpenSSL Patch Available. Patch Now!, (Thu, Jun 5th)
  1148. New OpenSSL MITM Flaw Affects All Clients, Some Server Versions
  1149. Back To Basics
  1150. Hackers Infiltrate Desk Phones For Epic Office Pranks
  1151. CVE Iterator Report
  1152. OWASP Top 10
  1153. Passive OS Detection
  1154. SCAP Audit Summary Report
  1155. Stealer Malware
  1156. FireEye Status Dashboard
  1157. Mac OS X < 10.9.3 Multiple Vulnerabilities (Security Update 2014-002)
  1158. Mozilla Thunderbird 17 Script Execution in HTML Mail Replies
  1159. AppleTV < 6.1.1 Multiple Vulnerabilities
  1160. RTMP Connection Detection
  1161. Apple iOS 7.x < 7.1.1 Multiple Security Vulnerabilities
  1162. RTMP Connection Detection
  1163. PC Duo Detection
  1164. PC Duo Detection
  1165. Multicast Source Discovery Protocol Client Detection
  1166. Samba < 3.6.23 / 4.0.16 / 4.1.6 Multiple Vulnerabilities
  1167. McAfee ePolicy Orchestrator OpenSSL Information Disclosure (Heartbleed)
  1168. Mac OS X : Safari < 6.1.4 / 7.0.4 Multiple Vulnerabilities
  1169. IBM Domino 9.0.0 < 9.0.0 Interim Fix 4 iNotes Buffer Overflow (credentialed check)
  1170. IBM Domino 8.5.3 < 8.5.3 Fix Pack 5 Interim Fix 1 iNotes Buffer Overflow (credentialed check)
  1171. IBM Domino 9.0 < 9.0.0 Interim Fix 4 iNotes Buffer Overflow
  1172. IBM Domino 8.5.x < 8.5.3 Fix Pack 5 Interim Fix 1 iNotes Buffer Overflow
  1173. Western Digital Arkeia lang Cookie Crafted Local File Inclusion
  1174. Western Digital Arkeia lang Cookie Local File Inclusion
  1175. Western Digital Arkeia Virtual Appliance Unsupported Version Detection
  1176. Western Digital Arkeia Virtual Appliance Blank Password
  1177. Default Password (arkeia) for 'root' Account
  1178. Western Digital Arkeia Virtual Appliance Detection
  1179. IBM WebSphere Application Server 8.5 < Fix Pack Multiple Vulnerabilities
  1180. RHEL 6 : gnutls (RHSA-2014:0595)
  1181. RHEL 5 : gnutls (RHSA-2014:0594)
  1182. Oracle Linux 6 : gnutls (ELSA-2014-0595)
  1183. Oracle Linux 5 : gnutls (ELSA-2014-0594)
  1184. FreeBSD : gnutls -- client-side memory corruption (027af74d-eb56-11e3-9032-000c2980a9f3)
  1185. IBM WebSphere Portal Apache Commons FileUpload DoS
  1186. PHP 5.5.x < 5.5.13 'src/cdf.c' Multiple Vulnerabilities
  1187. PHP 5.4.x < 5.4.29 'src/cdf.c' Multiple Vulnerabilities
  1188. Sendmail < 8.14.9 close-on-exec SMTP Connection Manipulation
  1189. Coolest Companies: Baltimore
  1190. Your devices Heartbleeding - again
  1191. 'Son Of Heartbleed' Hits Android And WiFi Networks
  1192. Your car is a giant computer - and it can be hacked
  1193. How I Got Here: Joe Grand
  1194. New attack methods can 'brick' systems, defeat Secure Boot, researchers say
  1195. Compliance: The Surprising Gift Of Windows XP
  1196. Linux users at risk as ANOTHER critical GnuTLS bug found • The Register
  1197. 5 lessons from companies that get computer security right
  1198. Security Manager's Journal: We manage our threats, but what about our vendors?
  1199. Safely Storing User Passwords: Hashing vs. Encrypting
  1200. [webapps] - D-Link Routers - Multiple Vulnerabilities
  1201. What You Need To Know to Become a Penetration Tester
  1202. Can I drop a pacemaker 0day?
  1203. Mimikatz Against Virtual Machine Memory Part 1
  1204. [papers] - TP-Link TD-W89 Config File Download / Exploiting the Host
  1205. Nagios and NPRE
  1206. WordPress: unsafe at any speed
  1207. I Forgot My Wallet. Can I Borrow Yours?
  1208. LulzSec leader sentenced to time served after cooperating with police
  1209. That Snowden chap was SPOT ON says China
  1210. I saved Pinterest's business and all I have to show for it is a t-shirt
  1211. Windows XP hack resurrects patches for retired OS
  1212. Siemens Fixes DoS Flaw in Rugged OS Devices
  1213. Half Of eBay Users No Longer Trust It After Breach
  1214. Google To Have Botnet Of Cars
  1215. Black Hat USA 2014: Focus on Reverse Engineering
  1216. HackerOne Bug Bounty Platform Lands Top Microsoft Security Expert
  1217. TrueCrypt turmoil latest: Bruce Schneier reveals what he'll use instead
  1218. No, you can't remotely turn on phones
  1219. Why You Should Ditch Adobe Shockwave
  1220. Disclosing vs. Hoarding Vulnerabilities
  1221. Weev invoices feds for ‘kidnapping’ him for 3 years
  1222. Another Site Breached - Time to Change your Passwords! (If you can that is), (Thu, May 22nd)
  1223. Locked In: Keeping Your Enterprise Encryption Keys in Order
  1224. Internet Explorer Zero Day Report
  1225. Cloud Storage Executive Report
  1226. Nessus Scan Report (Top 5)
  1227. Web Activity Report
  1228. CVSS Exploitability (E) and Remediation Level (RL) Risk Matrices
  1229. Cloud Storage
  1230. CVSS Temporal Risk Heat Map
  1231. Web Activity
  1232. CVSS Temporal Ratio
  1233. Google Chrome < 34.0.1847.131 (Mac) Multiple Vulnerabilities
  1234. Google Chrome < 34.0.1847.131 (Windows) Multiple Vulnerabilities
  1235. Google Chrome < 34.0.1847.132 (Linux) Multiple Vulnerabilities
  1236. Xerox Supernode Discovery Client Detection
  1237. Mozilla Firefox for Android < 24.0 Shared Library Loading Vulnerability
  1238. Mozilla Firefox for Android < 29.0 Addressbar/Phishing Vulnerability
  1239. Opera < 21.0 Multiple Vulnerabilities
  1240. Microsoft Internet Explorer 6 through 11 Arbitrary Code Execution
  1241. ISC BIND 9.10.0 Recursive Nameserver Denial of Service Vulnerability
  1242. Google Chrome < 34.0.1847.137 (Mac) Multiple Vulnerabilities
  1243. IWARP Server Detection
  1244. Twitch TV Client Detection
  1245. Mac iCal Client Detection
  1246. IWARP Client Detection
  1247. mDNS Query Response
  1248. AppleTV Detected
  1249. iTunes < 11.2.1 Insecure Permissions Local Privilege Escalation
  1250. InduSoft Web Studio < v7.1 + SP2 + P2 Security System Vulnerability
  1251. Schneider Electric SCADA Expert ClearSCADA 2013 R1 < 2013 R1.2 Remote Denial of Service Vulnerability
  1252. nginx 1.5.10 SPDY Memory Corruption
  1253. ESXi 5.5 < Build 1746974 / 5.5 Update 1 < Build 1746018 OpenSSL Library Multiple Vulnerabilities (including Heartbleed) (remote check)
  1254. ISC BIND 9 Recursive Server prefetch DoS
  1255. iTunes < 11.2.1 User Directory Insecure Permissions Vulnerability (Mac OS X)
  1256. iTunes < 11.2.1 User Directory Insecure Permissions Vulnerability (uncredentialed check)
  1257. Multiple Vendor SNMP public Community String Information Disclosure
  1258. Mac OS X : OS X Server < 3.1.2 Heap-Based Buffer Overflow
  1259. Google Chrome < 35.0.1916.114 Multiple Vulnerabilities (Mac OS X)
  1260. Google Chrome < 35.0.1916.114 Multiple Vulnerabilities
  1261. EZPZ One Click Backup Plugin for WordPress cmd Parameter Remote Command Execution
  1262. Bugzilla 2.0 < 4.4.3 / 4.5.3 Login Form XSRF
  1263. Bugzilla 2.0 < 4.0.12 / 4.2.8 / 4.4.3 / 4.5.3 Character Spoofing
  1264. FortiWeb < 5.2.0 Multiple XSRF Vulnerabilities
  1265. BlackBerry < Multiple Vulnerabilities
  1266. Good Ol’ SQLi Used to Hack Naval Database from Nuclear Carrier
  1267. How to wiretap a country
  1268. Bitly Installs Two-Factor Security After Insider Account Compromise
  1269. Why Your Router Is A Security Risk & How To Fix It
  1270. Schneider Electric asks users to patch Heartbleed again
  1271. Another Internet Explorer Zero Day Surfaces
  1272. Why is eBay burying news of its security breach from its users?
  1273. Hacking the D-Link DSP-W215 Smart Plug
  1274. eBay Urges Password Changes After Breach — Krebs on Security
  1275. Brown HIV researchers make Dropbox secure with nCrypted Cloud
  1276. Target, Gap, other retailers join to share cyberthreat data
  1277. Penetration Testing Has Come Of Age – Now It’s Time to Move On | M-unition
  1278. Bitly hackers stole user credentials from offsite database backup
  1280. Moar Shellz! «
  1281. carmaa/inception · GitHub
  1282. BugsCollector | Web security tricks
  1283. Computer Forensics in Fiction
  1284. NetSec
  1285. Linux "got root" kernel bug patched after five years at large
  1286. Kippo Users Beware: Another fingerprinting trick, (Wed, May 14th)
  1287. Google opens up Glass to the US masses for $1,500 a pair
  1288. Is that Twitter account a bot? Researchers make app to find out
  1289. Don't let hackers know Mandiant founder checks his email on an iPad. Oh.
  1290. Deactivated User Accounts Die Hard
  1291. Dropbox finally fixes security vulnerability
  1292. SHA-2 Takes Off, Thanks To Heartbleed
  1293. Why Threat Intelligence Is Like Teenage Sex
  1294. Your Android phone viewed illegal porn. To unlock it, pay a $300 fine
  1295. Google acquires restaurant website builder Appetas
  1296. Serious security flaw in OAuth, OpenID discovered
  1297. McAfee accused of McSlurping Open Source Vulnerability Database • The Register
  1298. Unix ‘find’ Cheat Sheet
  1299. 300k servers vulnerable to Heartbleed one month later
  1300. New iPhone lock screen flaw gives hackers full access to contact list data
  1301. Google stops scanning Gmail messages for ads in Apps for Education - Network World
  1302. Hacking Traffic Systems for Fun and Chaos
  1303. Windows XP Systems Also Get Out-of-Band IE Zero-Day Patch
  1304. Popular Ad Blocker Drops Support for IE6 and IE7
  1305. What a Toilet Hoax Can Tell Us About the Future of Surveillance - Jennifer Golbeck - The Atlantic
  1306. JTAG Slides
  1307. Fun with IDS funtime #3: heartbleed
  1308. The Rise of the Insider in a Collaborative IT World
  1309. Study finds data moving to cloud, encrypted or not
  1310. AOL Subscriber Data Stolen: You've Got Pwned
  1311. Thief in the night: Stealing in a digital age
  1312. FortiGate Scan Report
  1313. System Configuration Report
  1314. Admin Discovery Report
  1315. Tenable Admin
  1316. Executive Vulnerability Metrics
  1317. Oracle Sun Role Manager Identified
  1318. 9P File Share Client Detection
  1319. 9P File Share Server Detection
  1320. AllMyApps Client Detection
  1321. ArcGIS Client Detection
  1322. Airplay Client Detection
  1323. Anipang Internet Gaming Detection
  1324. 5by5 Media Streaming Detection
  1325. HP Print Server Detection
  1326. Aviator Browser Detection
  1327. Fortinet OpenSSL Information Disclosure
  1328. MaraDNS / 1.3.05 Wildcard Resource Record Remote DoS
  1329. HP LeftHand OS Unmanaged Host Detection
  1330. MS14-020: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)
  1331. OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities
  1332. Ajax Pagination (twitter Style) Plugin for WordPress Local File Inclusion
  1333. Silex USB Device Server Web Configuration Page Empty Password
  1334. CUPS < 1.7.2 is_path_absolute Function XSS
  1335. OpenVPN Installed
  1336. FortiWeb 5.x < 5.0.4 XSS
  1337. Symantec Messaging Gateway 10.x < 10.5.2 Management Console XSS (SYM14-006)
  1338. NAS4Free Web UI Default Credentials
  1339. Oracle OpenSSO Multiple Vulnerabilities (April 2014 CPU)
  1340. Oracle OpenSSO Detection
  1341. Cisco IOS IKE Module DoS
  1342. MS KB2963983: Vulnerability in Internet Explorer Could Allow Remote Code Execution
  1343. MS KB2961887: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  1344. Flash Player for Mac <= 11.7.700.275 / Pixel Bender Component Buffer Overflow (APSB14-13)
  1345. Flash Player <= 11.7.700.275 / Pixel Bender Component Buffer Overflow (APSB14-13)
  1346. Snapchat's Expired Snaps Are Not Deleted, Just Hidden
  1347. Not to be outdone by Microsoft, Adobe announces zero-day exploit patch for Flash
  1348. Dell Automates Driver Downloads with New Driver Pack Catalog
  1349. Human-implanted RFID chips
  1350. Satellite Communications Wide Open To Hackers
  1351. Query to find active vulnerabilities 30 days old or more
  1352. SCAP Audit Summary
  1353. HeartBleed Dashboard
  1354. CVSS Base Risk Host Matrices
  1355. NetFlow Monitor Dashboard
  1356. CVSS Base Risk Matrices
  1357. CUPS < 1.7.2 Reflected Cross-Site Scripting Vulnerability
  1358. Mac OS X : Safari < 6.1.3 / 7.0.3 Multiple Vulnerabilities
  1359. Google Chrome < 34.0.1847.116 Multiple Vulnerabilities
  1360. TLSv1 Traffic Negotiation Detection
  1361. DTLS Heartbeat Negotiation Detection
  1362. DTLS v1.2 Traffic Negotiation Detection
  1363. DTLS v1.0 Traffic Negotiation Detection
  1364. SSL Content-Type Heartbeat Detection
  1365. OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities
  1366. Windows RDP / Terminal Services Detection
  1367. UDP Protocol Detection
  1368. Generic TCP Protocol Detection
  1369. DNSSEC Client Query Detection
  1370. MediaWiki Password Reset Cross-site Request Forgery Vulnerability
  1371. MailStation Server Detection
  1372. TLS v1.1 Traffic Negotiation Detection
  1373. Fortinet Security Device Detection
  1374. AirMail OSX Client Detection
  1375. Social Network Activity Executive Report
  1376. HeartBleed Report
  1377. NetFlow Monitor Report
  1378. Flash Player for Mac <= 11.7.700.272 / Multiple Vulnerabilities (APSB14-09) (Mac OS X)
  1379. Cisco IOS XR ICMPv6 Redirect Denial of Service
  1380. WMI EMET Configuration Enumeration
  1381. BlackBerry < qconnDoor Buffer Overflow
  1382. Amazon Linux AMI : openssl Information Disclosure Vulnerability (ALAS-2014-320)
  1383. SSL Certificate Chain Contains RSA Keys Less Than 2048 bits (PCI DSS)
  1384. Adobe AIR for Mac <= Multiple Vulnerabilities (APSB14-09)
  1385. BACnet Protocol Detection
  1386. MediaWiki Unsupported Version Detection
  1387. Amazon Linux AMI Update: kernel / openssh Denial of Service (ALAS-2014-319)
  1388. Notorious troll and hacker Weev has conviction overturned
  1389. OpenSSL: The single line of code that broke online security
  1390. How To Securely Erase Your SSD Without Destroying It
  1391. The security of the most popular programming languages
  1392. Google Might Reward Secure Websites With Better Ranking
  1393. Galaxy S5 Fingerprint Scanner Hacked With Glue Mould
  1394. Organizations suffer SQL Injection attacks, but do little to prevent them
  1395. HD Manufacturer LaCie Admits Yearlong Data Breach
  1396. Windows XP Alive & Well in ICS/SCADA Networks
  1397. Black Hat USA 2014: Pentesting? Thought You'd Never Ask
  1398. Troy Hunt: Everything you need to know about the Heartbleed SSL bug
  1399. Heartbleed
  1400. Difficulty of Detecting OpenSSL Heartbleed Attacks Adds to Problem
  1401. What Have We Learned: OpenSSL Heartbleed Bug
  1402. Not just websites hit by OpenSSL's Heartbleed – PCs, phones and more under threat
  1403. "Heartbleed heartache" - should you REALLY change all your passwords right away?
  1404. * Patch Now: OpenSSL "Heartbleed" Vulnerability, (Tue, Apr 8th)
  1405. Heartbleed vendor notifications, (Wed, Apr 9th)
  1406. All things not Heartbleed, (Thu, Apr 10th)
  1407. Brace Yourselves (and your Users / Clients) for Heartbleed SPAM, (Thu, Apr 10th)
  1408. Heartbleed Bug: What Can You Do? — Krebs on Security
  1409. Test your server for Heartbleed (CVE-2014-0160)
  1410. existential type crisis : Diagnosis of the OpenSSL Heartbleed Bug
  1411. Prezi got Pwned: A tale of responsible disclosure - Engineering at Prezi
  1412. 42 days to go for XP – 8 tips if you aren’t going to make it
  1413. Meet the next-gen USB cable that could sweep away all others
  1414. Android Botnet Targets Middle East Banks
  1415. Amazon Web Services Combing Third Parties for Exposed Credentials
  1416. DNS-Based Amplification Attacks Key on Home Routers
  1417. What took you so long Apple? 26 remote exec bugs die in OS X Safari
  1418. Google Wants Supreme Court To Rule On Street View Privacy Case
  1419. PCI Status
  1420. Social Network Activity Dashboard
  1421. Council on CyberSecurity 20 Critical Security Controls Dashboard
  1422. Cybersecurity Asset Management
  1423. PVS Trust Relationships
  1424. Cybersecurity Framework Audit Dashboards
  1425. PHP 5.5.x < 5.5.10 Multiple Vulnerabilities
  1426. Apple iOS 7.x < 7.1 Multiple Security Vulnerabilities
  1427. Google Chrome < 33.0.1750.149 Multiple Vulnerabilities
  1428. Flash Player < / Multiple Vulnerabilities
  1429. lighttpd < 1.4.35 Multiple Vulnerabilities
  1430. Synology DiskStation Manager <= 4.3-3827 'value' Parameter SQL Injection Vulnerability
  1431. Google Chrome OS < 33.0.1750.152 Multiple Security Vulnerabilities
  1432. Google Chrome < 33.0.1750.152 (Linux) Multiple Vulnerabilities
  1433. Google Chrome < 33.0.1750.152 (Mac) Multiple Vulnerabilities
  1434. Google Chrome < 33.0.1750.154 (Win) Multiple Vulnerabilities
  1435. OpenSSH < 6.6 Remote Restriction Bypass Vulnerability
  1436. Whitehat Aviator Version Detection
  1437. Sina Weibo Usage Detection
  1438. Mozilla Firefox < 28.0 / ESR version < 24.4 Multiple Vulnerabilities
  1439. Mozilla SeaMonkey < 2.25 Multiple Vulnerabilities
  1440. Mozilla Thunderbird < 24.4 Multiple Vulnerabilities
  1441. Firefox OS < 1.2.2 / 1.3 Directory Traversal Vulnerability
  1442. Firefox OS Detection
  1443. Mozilla Firefox for Android < 28.0 Multiple Vulnerabilities
  1444. Mozilla Firefox for Android < 28.0.1 'file:' Protocol Information Disclosure
  1445. cURL/libcURL 7.x < 7.35.0 Multiple Vulnerabilities
  1446. Canon PIXMA MX722 Information Disclosure Vulnerability
  1447. RuggedCom Rugged Operating System < 4.1 (or 3.11.5 for RS950G) Remote Denial of Service
  1448. Account Weakness Report
  1449. PCI Configuration Report
  1450. Group Management Report
  1451. PVS Detections Executive Report
  1452. TCP Metrics Report
  1453. PVS Detections Report - Top 50 Exploitable Vulnerabilities
  1454. Council on CyberSecurity - Critical Security Controls Report
  1455. PVS Detections Report - Devices and Services
  1456. Top Advice for CISOs
  1457. Marcus Ranum and Anton Chuvakin explore big data and security
  1458. SeaMonkey < 2.25 Multiple Vulnerabilities
  1459. IBM SPSS SamplePower 3.0.1 < 3.0.1 IF2 vsflex8l ActiveX Control Remote Code Execution
  1460. WebSphere MQ 7.5 < Information Disclosure
  1461. ZTE F460 / F660 Cable Modems web_shell_cmd.gch Administrative Backdoor
  1462. IBM WebSphere Portal Tagging Reflected XSS
  1463. IBM WebSphere Portal Unspecified URL Manipulation Arbitrary File Access
  1464. IBM WebSphere Portal Improper Access Control Checks
  1465. Cisco AsyncOS for Email Security Appliances Software Remote Code Execution (CSCug79377)
  1466. Cisco AsyncOS for Content Security Management Appliances Software Remote Code Execution (CSCug80118)
  1467. stunnel < 5.00 PRNG State Security Weakness
  1468. Dell KACE K1000 < 5.5.90547 / 5.4.76849 Arbitrary File Upload and Command Execution
  1469. McAfee Email Gateway Version
  1470. McAfee Email Gateway Multiple Vulnerabilities
  1471. MantisBT 1.1.0 < 1.2.16 Multiple Vulnerabilities
  1472. PHP PHP_RSHUTDOWN_FUNCTION Security Bypass
  1473. Autodesk AutoCAD Detection
  1474. Autodesk AutoCAD < 2014 Multiple Vulnerabilities
  1475. Autodesk AutoCAD DWG Buffer Overflow
  1476. Default Password (ironport) for 'admin' Account
  1477. Default Password (ironport) for 'enablediag' Account
  1478. Cisco Email Security Appliance Web UI Default Credentials
  1479. Cisco Content Security Management Appliance Web UI Default Credentials
  1480. Mobile ATM Attack Uses SMS To Dispense Cash
  1481. GUI Bugs Expose Information Disclosure, Privilege Escalation | Threatpost | The first stop for security news
  1482. Microsoft: 0Day Exploit Targeting Word, Outlook — Krebs on Security
  1483. Ephemeral Apps
  1484. S4x14 Session: You Name It; We Analyze It
  1485. California man who lasered two helicopters to face 14 years behind bars
  1486. Hack of exposes password data, messages for 158,000 users
  1487. Dumb hackers leave encryption keys on victims' PCs
  1488. Researcher Lights Fire Under Tesla Security
  1489. Hackers Use Security Camera DVRs As Bitcoin Mining Rig
  1490. SmartTV, dumb vuln: Philips hard-codes Miracast passwords • The Register
  1491. 'Thingularity' Triggers Security Warnings
  1492. Ad tracking: Is anything being done?
  1493. Researchers Divulge 30 Oracle Java Cloud Service Bugs
  1494. How I got root with Sudo | Securus Global Blog
  1495. Redpoint: Discover & Enumerate BACnet Devices
  1496. Smarter People are More Trusting
  1497. Brian Krebs Subject of Sony Pictures Movie Deal | The State of Security
  1498. A few updates on "The Moon" worm, (Tue, Mar 25th)
  1499. Most ATMs will remain on Windows XP after Microsoft pulls plug on OS support
  1500. The Internet of Things is being used to mine digital currency
  1501. Hackers Can Force ATMs to Spit Out Money With a Text Message
  1502. Forget black hats – the best hackers are going grey and getting legit • The Register
  1503. About 55k In San Francisco Impacted In Theft Of Sutherland Computers
  1504. Metadata Poses Both Risks And Rewards
  1505. Microsoft Outlook Users Face Zero-Day Attack
  1506. Full Disclosure List Rises From the Ashes For Fresh Start
  1507. Beware this big iOS flaw -- and it's not alone | Security & Privacy - CNET News
  1508. Lenny Zeltser on Moats
  1509. Are Credit Monitoring Services Worth It?
  1510. Carnal0wnage & Attack Research Blog: Webmin Brute Forcing
  1511. WordPress XML-RPC PingBack Vulnerability Analysis - SpiderLabs Anterior
  1512. To Err Human, To Automate Secure | Radware Blog | Radware Blog
  1513. Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping | Ars Technica
  1514. The Cyber Security Skills Gap - J4vv4D
  1515. New iOS flaw makes devices susceptible to covert keylogging, researchers say | Ars Technica
  1516. RFID Wallets/Sleeves. How much Security do they provide? | Pentura Labs's Blog
  1517. ChrisTruncer/EyeWitness · GitHub
  1518. Trey Ford: Testing, notification should not be criminalized (slides) | Page 6 | ZDNet
  1519. BsidesSF 2014 Fix What Matters
  1520. Hackers Can Infect Your Computer Even If It's Not Connected To The Internet
  1521. Target overhauls security and compliance group, CIO resigns
  1522. Hackers Take Control Of 300,00 Home Routers
  1523. CIA Found To Be Hacking The Senate Intelligence Committee
  1524. Hackers Churning Out 55,000 Malware Variants Every Day
  1525. Cisco Patches Authentication Flaw in Wireless Routers
  1526. Tenable Unveils Industry’s First Integrated Threat and Vulnerability Management Capabilities for Faster Resolution of Critical Security Incidents
  1527. SC Magazine Interviews Tenable’s Jack Daniel
  1528. Tenable Adds Cloud Management and Multi-Scanner Support to Nessus®
  1529. RSA News: Tenable Enhances Platform
  1530. A New Airborne WiFi Virus Spreads Like the Common Cold
  1531. "Researchers at the University of Liverpool claim to have created a computer virus that can spread via Wi-Fi as effic...
  1532. C programming: you are teaching it wrong
  1533. Windows XP Ends After 12 Years, Apple Snow Leopard After 4
  1534. Car Hacking: You Cannot Have Safety without Security
  1535. Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy
  1536. DDoS & Security Reports » NTP ATTACKS: Welcome to The Hockey Stick Era
  1537. Swiss Firm Digs Up 300,000+ Usernames/Passwords on Pastebin | Threatpost | The first stop for security news
  1538. Time to Harden Your Hardware? — Krebs on Security
  1539. Compliance Summary
  1540. Account Weakness
  1541. CVE Analysis
  1542. Event Vulnerabilities
  1543. Compliance Summary Report
  1544. PVS Detections Report - Traffic
  1545. CVE Monthly Status Report
  1546. Opera < 19.0 (for Mac) Address Bar URI Spoof Vulnerabilities
  1547. Palo Alto Device Detection
  1548. Apache Tomcat 6.0.x < 6.0.39 Multiple Vulnerabilities
  1549. Quicktime (for Windows) < 7.7.5 Multiple Vulnerabilities
  1550. Apple Quicktime 7.7.5 Multiple Vulnerabilities
  1551. Mac OS X < 10.9.2 Multiple Vulnerabilities
  1552. Mac OS X : Safari < 6.1.2 / 7.0.2 Multiple Vulnerabilitieses
  1553. Windows Phone Operating System Version Detection
  1554. Apple iOS 7.x < 7.0.6 / 6.x < 6.1.6 Data Security Vulnerability
  1555. PostgreSQL < 9.3.3 / 9.2.7 / 9.1.12 / 9.0.16 / 8.4.20 Multiple Vulnerabilities
  1556. Google Chrome for iOS < 33.0.1750.14 Unspecified Security Vulnerability
  1557. Microsoft Operating System Detection
  1558. MariaDB Client 5.5.x < 5.5.36 Remote Multiple Denial of Service Vulnerabilities
  1559. Google Chrome < 33.0.1750.117 Multiple Vulnerabilities
  1560. MariaDB Client 5.5.x < 5.5.35 Buffer Overflow Vulnerability
  1561. HNAP Protocol Detection
  1562. RuggedCom Rugged Operating System < 3.12.4 (or 4.0 for RSG2488) Remote Denial of Service via SNMP
  1563. IBM Domino < 9.0.1 Unspecified IMAP Remote Denial of Service Vulnerability
  1564. Apache Subversion < 1.6.21 / 1.7.9 Remote Denial of Service Vulnerability
  1565. Titan FTP Server < 10.40 Build 1829 Directory Traversal Vulnerability
  1566. PHP 5.5.x < 5.5.9 Multiple Vulnerabilities
  1567. Pale Moon Browser Version Detection
  1568. Pale Moon < 24.3.2 Unspecified Security Vulnerability
  1569. OS Detection
  1570. Microsoft Version Check
  1571. Apple Version Check
  1572. Unsupported Cisco Operating System
  1573. Ubiquiti airCam < 1.2.0 ubnt-streamer RTSP Service Remote Code Execution
  1574. MS KB2934802: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  1575. Serv-U FTP Server < DoS
  1576. PostgreSQL 8.4 < 8.4.20 / 9.0 < 9.0.16 / 9.1 < 9.1.12 / 9.2 < 9.2.7 / 9.3 < 9.3.3 Multiple Vulnerabilities
  1577. Core FTP Server Detection
  1578. Core FTP Server < 1.2 Build 508 Multiple Buffer Overflow Vulnerabilities
  1579. Core FTP Server < 1.2 Build 515 Multiple Vulnerabilities
  1580. SFTP Supported
  1581. Anonymous SFTP Enabled
  1582. Nortel Meridian Integrated RAN Default Admin Credentials
  1583. Apple iOS 6.x < 6.1.6 'SSLVerifySignedServerKeyExchange' Certificate Validation Weakness
  1584. Apple iOS 7.x < 7.0.6 'SSLVerifySignedServerKeyExchange' Certificate Validation Weakness
  1585. Cisco Firewall Services Module Software Denial of Service (cisco-sa-20140219-fwsm)
  1586. Zimbra Collaboration Server Aspell Spell Check Service Detection
  1587. Zimbra Collaboration Server aspell.php dictionary Parameter XSS
  1588. CoSoSys Endpoint Protector < Unspecified XSS
  1589. Artweaver 3.x < 3.1.6 AWD File Buffer Overflow
  1590. ASUS Routers flag Parameter XSS
  1591. Enumerate Local Users
  1592. Jenkins < 1.551 / 1.532.2 and Jenkins Enterprise 1.509.x / 1.532.x < 1.509.5.1 / 1.532.2.2 Multiple Vulnerabilities
  1593. MyBB < 1.6.11 Multiple Vulnerabilities
  1594. Mac OS X < 10.9.2 Multiple Vulnerabilities
  1595. Mac OS X Multiple Vulnerabilities (Security Update 2014-001)
  1596. Mac OS X : Safari < 6.1.2 / 7.0.2 Multiple Memory Corruption Vulnerabilities
  1597. Apache Tomcat 6.0.x < 6.0.39 Multiple Vulnerabilities
  1598. Apache Tomcat 7.0.x < 7.0.50 Multiple Vulnerabilities
  1599. Apache Tomcat 8.0.x < 8.0.3 Content-Type DoS
  1600. Apache Tomcat 7.0.x < 7.0.52 Content-Type DoS
  1601. StruxureWare SCADA Expert ClearSCADA Detection
  1602. StruxureWare SCADA Expert ClearSCADA Unspecified Vulnerability
  1603. CoDeSys 2.x Development System Detection (credentialed check)
  1604. Ubuntu 12.10 : linux vulnerabilities (USN-2114-1)
  1605. Ubiquiti airCam Detection
  1606. Microsoft .NET Framework Unsupported
  1607. Multiple Vulnerabilities in Cisco Intrusion Prevention System Software (cisco-sa-20140219-ips)
  1608. QuickTime < 7.7.5 Multiple Vulnerabilities (Windows)
  1609. Mitsubishi Electric Automation MC-WorX 8.x ActiveX Control Remote Code Execution
  1610. MariaDB 5.1 < 5.1.69 NAME_CONST Query DoS
  1611. MariaDB 5.2 < 5.2.15 NAME_CONST Query DoS
  1612. MariaDB 5.3 < 5.3.13 Multiple DoS Vulnerabilities
  1613. MariaDB 5.5 < 5.5.36 Multiple DoS Vulnerabilities
  1614. MariaDB 10 < 10.0.9 Multiple DoS Vulnerabilities
  1615. phpMyAdmin 3.x >= 3.3.1 / 4.x < 4.1.7 import.php XSS
  1616. ImageMagick < 6.8.7-6 WritePSDImage PSD Handling Memory Corruption
  1617. ImageMagick < 6.8.8-5 Multiple PSD Handling Buffer Overflows
  1618. Unified SIP Phone 3905 Unauthorized Access
  1619. Cisco 9900 Series IP Phone Crafted Header Unregister Vulnerability
  1620. Blue Coat ProxySG Local User Modification Race Condition
  1621. Cisco Jabber for Windows Detection
  1622. Cisco Jabber for Windows 9.x < 9.2(2) 'Send Screen Capture' File Write
  1623. McAfee ePolicy Orchestrator < 4.6.7 HF 940148 XML Entity Injection
  1624. McAfee ePolicy Orchestrator Unsupported Version Detection
  1625. Foxit Reader < 6.1.4 imgseg.dll Path Subversion Arbitrary DLL Injection Code Execution
  1626. DameWare Remote Support Detection
  1627. DameWare Remote Support < 9 Hotfix 2 / 10 Hotfix 2 DWExporter.exe Buffer Overflow
  1628. Jenkins < 1.545 Subversion Plugin Information Disclosure
  1629. Subversion 1.3.x - 1.7.14 / 1.8.x < 1.8.8 mod_dav_svn DoS
  1630. Grails resources plug-in WEB-INF / META-INF File Disclosure
  1631. Zabbix < 1.8.20 / 2.0.11 / 2.2.2 Multiple Vulnerabilities
  1632. Over 2,560 Internal Security Breaches Occurred In US Businesses Every Day
  1633. Another Day a New Router Vulnerability Discovered
  1634. Common Linux Misconfigurations - InfoSec Institute
  1635. WRT120N fprintf Stack Overflow
  1636. Apple TV Hacking, Counterattacks, and Certificate Pinning – Intrepidus Group - Insight
  1637. Technical Details Behind a 400Gbps NTP Amplification DDoS Attack | CloudFlare Blog
  1638. The Keystone Rocks - Foundation Chips of Pentesting Tips Part 1 - SpiderLabs Anterior
  1639. Hackers circulate thousands of FTP credentials, New York Times among those hit
  1640. Dear Asus router user: You've been pwned
  1641. Webcams exposed in Google Drive clickjack attack
  1642. Malware-flinging Linksys vulnerability confirmed as a HNAP1 bug
  1643. Belkin patches WeMo bug
  1644. 5 Tactics To Help Triage Patching
  1645. Belkin Wemo Smart Home Networks In Danger Of Hacks
  1646. Hackers Are Switching To Chargeware Scams
  1647. Two-Factor Authentication Vulnerability Identified in WordPress Plugins
  1648. Email Attack on Vendor Set Up Breach at Target
  1649. Egor Homakov: How I hacked Github again.
  1650. Cheat Sheets - OWASP
  1651. Cheat Sheets - Packet Life
  1652. Re-enabling JTAG and Debugging the WRT120N
  1653. Cracking Linksys “Encryption”
  1654. Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem
  1655. “Please Don’t Lock this Door Tonight”
  1656. The Failure of the PCI-DSS?
  1657. HTTP NTLM Information Disclosure
  1658. NTP Reflection Attacks
  1659. Linksys Worm ("TheMoon") Captured, (Thu, Feb 13th)
  1660. HVAC Integrator’s ‘Billing’ Connection Led to Target Breach
  1661. Detecting Car Hacks
  1662. BBC News - Huge hack 'ugly sign of future' for internet threats
  1663. How I hacked Instagram to see your private photos - insertCoin
  1664. A Snapchat Hack Is Sending People Pictures of Smoothies
  1665. Edward Snowden Got a Bunch of NSA Info By Stealing a Coworker's Password
  1666. Suspected Mass Exploit Against Linksys E1000 / E1200 Routers - Internet Security | SANS ISC
  1667. Have a Linksys router? Now's a good time to update that firmware
  1668. Hacked X-Rays Could Slip Guns Past Airport Security
  1669. Meet The Man Who Hacked Jeopardy
  1670. Snowden's tools for hacking NSA not exactly high tech
  1671. 'No, I CAN'T write code myself,' admits woman in charge of teaching our kids to code
  1672. Evan Schuman: Get ready, IT; here comes the Internet of Things
  1673. John McAfee declares war on Android
  1674. Patch Tuesday brings Microsoft fixes and Adobe Shockwave update
  1675. FlashCanvas <= 1.5 Reflected Cross-site Scripting Attack
  1676. PVS Detections
  1677. Shockwave Player <= Multiple Memory Corruption Vulnerabilities (APSB14-06)
  1678. MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (2928390)
  1679. MS14-010: Cumulative Security Update for Internet Explorer (2909921)
  1680. MS14-009: Vulnerabilities in .NET Framework Could Allow Privilege Escalation (2916607)
  1681. MS14-008: Vulnerability in Microsoft Forefront Protection for Exchange Could Allow Remote Code Execution (2927022)
  1682. MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution (2912390)
  1683. MS14-006: Vulnerability in ICMPv6 Could Allow Denial of Service (2904659)
  1684. MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2916036)
  1685. Web Site Client Access Policy File Detection
  1686. Using Security Center to find Default & Common Credential
  1687. Mobile Devices Perceived as Security Industry's Weakest Link, Finds '2014 Cyberthreat Defense Report'
  1688. Relative Date Summary Report
  1689. Do you have HVAC systems on your internal network?
  1690. Mozilla Firefox < 27.0 / 24.3 (ESR version) Multiple Vulnerabilities
  1691. Mozilla Firefox for Android < 27.0 Multiple Vulnerabilities
  1692. Mozilla SeaMonkey < 2.24 Multiple Vulnerabilities
  1693. Mozilla Thunderbird < 24.3 Multiple Vulnerabilities
  1694. Google Chrome < 32.0.1700.102 Multiple Vulnerabilities
  1695. OID parsing
  1696. Adobe AIR <= Multiple Vulnerabilities (APSB14-02)
  1697. Flash Player (Internet Explorer) <= 11.9.900.170 Multiple Vulnerabilities (APSB14-02)
  1698. Flash Player < Multiple Vulnerabilities (APSB14-02)
  1699. Flash Player <= 11.7.700.260 / (inferred) Remote Code Execution (APSB14-04)
  1700. Flash Player <= 11.7.700.260 / Multiple Vulnerabilities (APSB14-04)
  1701. Google Chrome < 32.0.1700.107 Remote Code Execution
  1702. CVE Trending by Year
  1703. Emerson Network Power Avocent MergePoint Unity 2016 < 1.14 / 1.18 download.php filename Parameter Directory Traversal
  1704. Sophos Anti-Virus Engine < 3.50.1 System Objects DoS
  1705. Cisco Secure ACS Portal Interface Session Hijacking
  1706. Oracle Secure Global Desktop Multiple Vulnerabilities
  1707. Oracle Secure Global Desktop Unsupported Release
  1708. Synology DiskStation Manager (DSM) Detection
  1709. Synology DiskStation Manager 4.0-x < 4.0-2259 / 4.1-x / 4.2-x < 4.2-3243 SLICEUPLOAD Function Remote Code Execution
  1710. Synology DiskStation Manager < 4.3-3776 Update 2 Multiple Vulnerabilities
  1711. Synology DiskStation Manager < 4.3-3776 Update 3 info.cgi Multiple Parameters XSS
  1712. Synology DiskStation Manager 4.3-x < 4.3-3810 Update 1 Multiple Vulnerabilities
  1713. Synology DiskStation Manager < 4.3-3810 Update 3 Multiple FileBrowser Component Directory Traversal Vulnerabilities
  1714. Synology DiskStation Manager uistrings.cgi lang Parameter Directory Traversal
  1715. Novell Client 2 Vba32 AntiRootKit DoS
  1716. McAfee VirusScan Enterprise 8.8 < 8.8 Patch 1 DoS
  1717. Microsoft Internet Explorer Version Detection
  1718. IBM SPSS SamplePower 3.0.1 < 3.0.1 IF1 ActiveX Control Remote Code Execution
  1719. Oracle Identity Manager October 2013 CPU
  1720. Artweaver Detection
  1721. Artweaver 3.x < 3.1.5 JPG File Handling Stack-based Buffer Overflow
  1722. WinSCP < 5.1.6 RSA Signature Blob Integer Overflow
  1723. Red Hat JBoss Enterprise Application Platform 6.1.0 Security Update (RHSA-2013-1843)
  1724. Dell KACE K1000 Web Detection
  1725. Dell KACE K1000 < 5.5 Multiple SQL Injection Vulnerabilities
  1726. IrfanView MrSID Plugin < 4.37 Multiple Buffer Overflows
  1727. Adobe Digital Editions 2.0.0 'rmsdk_wrapper.dll' Memory Corruption (APSB13-20)
  1728. Adobe Digital Editions 2.0.1 Memory Corruption (Mac OS X)
  1729. HP B-series SAN Network Advisor Installed (Linux)
  1730. Dell KACE K2000 < 3.3.52857 Multiple Vulnerabilities
  1731. WinSCP < 5.1.7 Multiple Vulnerabilities
  1732. MediaWiki < 1.19.10 / 1.21.4 / 1.22.1 Multiple Vulnerabilities
  1733. Microsoft hoping users will get friends, family to leave Windows XP - Los Angeles Times
  1734. Using your Mobile to protect you from criminals
  1735. 10 of the Biggest Trends in Technology For 2014
  1736. Trojan.Win32.FSYSNA.fej AKA Chewbacca
  1737. Passive Vulnerability Scanner (PVS) 4.0.1 Now Available
  1738. Leveraging Logins and Login Failures to Track Insiders
  1739. Event Vulnerability Indicators
  1740. Vulnerability Top Ten
  1741. Xbox Gaming Console Detection
  1742. iTunes for Windows < 11.1.4 Multiple Vulnerabilities
  1743. iTunes (for OS X) < 11.1.4 Tutorials Content Injection
  1744. CUPS < 1.7.1 Local Privilege Escalation Vulnerability
  1745. Google Chrome for Android < 32.0.1700.99 Multiple Unspecified Vulnerabilities
  1746. SC Magazine Reviews SecurityCenter Continuous View
  1747. A fine mess: Global data breach legislation
  1748. Vulnerability Top Ten Executive Report
  1749. Nessus Scan Report
  1750. Insider Threat Report
  1751. Cisco Secure ACS RMI Arbitrary File Read (CSCud75169)
  1752. Cisco Secure ACS Portal Cross-Site Scripting (CSCue65949)
  1753. Puppet Symlink File Overwrite
  1754. Landing Pages Plugin for WordPress wp-admin/edit.php post Parameter SQL Injection
  1755. Cisco TelePresence Video Communication Server SIP DoS
  1756. StruxureWare SCADA Expert ClearSCADA < 2013 R2 Remote DoS
  1757. JBoss Detection
  1758. IBM Tivoli Storage Manager Client 6.3.1.x < / 6.4.x < ReFS Insecure File Permissions
  1759. McAfee VirusScan Enterprise < 8.8 / 8.7 HF643440 CLI Local Privilege Escalation
  1760. SAP GUI DLL Loading Arbitrary Code Execution (Note 1511179)
  1761. memcached < 1.4.17 Multiple Vulnerabilities
  1762. Oracle Access Manager Installed (credentialed check)
  1763. Oracle Access Manager October 2013 Critical Patch Update
  1764. MediaWiki < 1.19.11 / 1.21.5 / 1.22.2 Multiple Remote Code Execution Vulnerabilities
  1765. McAfee VirusScan Enterprise 8.5 / 8.7 hcp:// Security Bypass
  1766. memcached SASL Authentication Security Bypass
  1767. Symantec Workspace Virtualization Agent Detection
  1768. Symantec Workspace Virtualization 6.x < 6.4.1953 Local Privilege Escalation (SYM13-011)
  1769. IBM Global Security Kit 7 < / 8 < DoS
  1770. Pidgin < 2.10.8 Multiple Vulnerabilities
  1771. IBM Global Security Kit 7 < / 8 < DoS
  1772. Flash Player for Mac <= 11.7.700.260 / Unspecified Remote Code Execution (APSB14-04)
  1773. MS KB2929825: Update for Vulnerability in Adobe Flash Player in Internet Explorer
  1774. Amazon Linux AMI : openssl Remote Crash Vulnerability (ALAS-2014-273)
  1775. Amazon Linux AMI : nss Man-in-the-middle Vulnerability (ALAS-2014-274)
  1776. Amazon Linux AMI : varnish Multiple Vulnerabilities (ALAS-2014-276)
  1777. Amazon Linux AMI : xorg-x11-server Buffer Overflow Vulnerability (ALAS-2014-277)
  1778. Amazon Linux AMI : gnupg Side-channel Attack Vulnerability (ALAS-2014-278)
  1779. Amazon Linux AMI : quagga Denial of Service (ALAS-2014-279)
  1780. Amazon Linux AMI : ca-certificates Man-in-the-middle Vulnerability (ALAS-2014-281)
  1781. Amazon Linux AMI : libXfont Buffer Overflow Vulnerability (ALAS-2014-282)
  1782. Amazon Linux AMI : augeas Privilege Vulnerability (ALAS-2014-286)
  1783. Amazon Linux AMI : puppet Filesystem Vulnerability (ALAS-2014-288)
  1784. Firefox ESR 24.x < 24.3 Multiple Vulnerabilities (Mac OS X)
  1785. Firefox < 27.0 Multiple Vulnerabilities (Mac OS X)
  1786. Thunderbird < 24.3 Multiple Vulnerabilities (Mac OS X)
  1787. Firefox ESR 24.x < 24.3 Multiple Vulnerabilities
  1788. Firefox < 27.0 Multiple Vulnerabilities
  1789. Mozilla Thunderbird < 24.3 Multiple Vulnerabilities
  1790. SeaMonkey < 2.24 Multiple Vulnerabilities
  1791. MongoDB < 2.3.2 BSON Object Length Handling Memory Disclosure
  1792. How I Lost My $50,000 Twitter Username — Medium
  1793. A chain is only as strong as its weakest link – DNS Hijack Monitoring | Corelan Team
  1794. Reversing the WRT120N’s Firmware Obfuscation - /dev/ttyS0
  1795. RFKiller/mass-deauth · GitHub
  1796. DanMcInerney/wifijammer · GitHub
  1797. SecUpwN/Android-IMSI-Catcher-Detector · GitHub
  1798. Target Hackers Broke in Via HVAC Company
  1799. Installing Nessus on Kali Linux and Doing a Credentialed Scan
  1800. JavaScript: the one true language
  1801. Exploring the Telephony Denial of Service (TDoS)
  1802. Dancho Danchev's Blog - Mind Streams of Information Security Knowledge: A Peek Inside a Customer-ized API-enabled DIY Online Lab for Generating Multi-OS Mobile Malware
  1803. Mobile Malware Captures Keystrokes and Screengrabs | Threatpost - English - Global -
  1804. Nest Team Will Become Google's Core Hardware Group
  1805. Only Your Heartbeat Can Unlock This Bitcoin Wallet
  1806. Wikipedia Remote Execution Vulnerability Patched | Threatpost - English - Global -
  1807. Details Emerge on Latest Adobe Flash Zero-Day Exploit
  1808. Rare Twitter username ‘stolen’ | In2EastAfrica – East African news, Headlines, Business, Tourism, Sports, Health, Entertainment, Education
  1809. Target Hackers Used Stolen Vendor Credentials
  1810. Chewbacca Attack Hits Shops In 11 Nations
  1811. US Hotels Look Into Data Security Breach
  1812. The Government Wants Our Cars To Talk To Each Other
  1813. Windows XP Support Cut-Off Could Lead To Spam Boom
  1814. 800,000 Orange France Customers Face Cyberattack
  1815. Anyone Using POS Is At Risk
  1816. Target traces security breach to stolen vendor credentials
  1817. Toy Maker Hasbro’s Site Serving Drive-By Download Attacks
  1818. High-Volume DDoS Attacks Top Operational Threat to Businesses, Service Providers
  1819. Would NFC smartphones have helped at Target?
  1820. Remote code execution bug in Yahoo servers leads to root access
  1821. Use MediaWiki and hate malware? This patch is for you
  1822. Multi-platform Java bot marshals ZOMBIE FORCE against spammers
  1823. Red or Blue, I'm Usually The Only Woman On The Team -- Dark Reading
  1824. VMware vCloud Director Logout CSRF (VMSA-2014-0001)
  1825. Informix Server Global Security Kit SSL/TLS DoS
  1826. No sixth sense: '123456' is worst password of 2013 | Crave - CNET
  1827. Snapchat's new verification already hacked | Security & Privacy - CNET News
  1828. Linksys & Netgear Backdoor by the Numbers | Skizzle Sec
  1829. Metasploit: Making Your Printer Say "Feed Me a ... | SecurityStreet
  1830. How I bypassed 3rd-degree profiles in LinkedIn
  1831. SI6 Networks
  1832. Apple punts patches for holes in Pages and OS X, Windows iTunes
  1833. Michaels Data Breach Under Investigation
  1834. Punish careless employees to reduce security breaches, vendor says
  1835. Authentication bypass bug exposes Foscam webcams to unauthorized access
  1836. IBM Domino 8.5.x < 8.5.3 FP6 iNotes Multiple XSS (uncredentialed check)
  1837. IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (uncredentialed check)
  1838. IBM Domino 8.5.x < 8.5.3 FP6 iNotes Multiple XSS (credentialed check)
  1839. IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (credentialed check)
  1840. MySQL debian.cnf Plaintext Credential Disclosure
  1841. Serv-U FTP Server < Multiple Security Vulnerabilities
  1842. XnView 2.x < 2.13 Multiple Buffer Overflows
  1843. Oracle Java SE Multiple Vulnerabilities (January 2014 CPU)
  1844. Oracle Java SE Multiple Vulnerabilities (January 2014 CPU) (Unix)
  1845. Google Chrome < 32.0.1700.76 Multiple Vulnerabilities
  1846. Google Chrome < 32.0.1700.77 Multiple Vulnerabilities (Mac OS X)
  1847. Oracle Database January 2014 Critical Patch Update
  1848. MySQL 5.1.x < 5.1.72 Multiple Vulnerabilities
  1849. MySQL 5.1.x < 5.1.73 Multiple Vulnerabilities
  1850. MySQL 5.5 < 5.5.34 Multiple Vulnerabilities
  1851. MySQL 5.5.x < 5.5.35 Multiple Vulnerabilities
  1852. MySQL 5.6.x < 5.6.14 Multiple Vulnerabilities
  1853. MySQL 5.6.x < 5.6.15 Multiple Vulnerabilities
  1854. CUPS 1.6.x >= 1.6.4 / 1.7.x < 1.7.1 lppasswd Information Disclosure
  1855. BlackBerry < Multiple Flash Player Code Execution Vulnerabilities
  1856. Symantec Endpoint Protection Client < / 12.1.2 (SYM14-001)
  1857. Symantec Endpoint Protection Manager < / 12.1.2 RU2 (SYM14-001)
  1858. ColdFusion Extended Support Version Detection
  1859. ColdFusion Unsupported Version Detection
  1860. ColdFusion Extended Support Version Detection (credentialed check)
  1861. ColdFusion Unsupported Version Detection (credentialed check)
  1862. MapServer < 5.6.9 / 6.0.4 / 6.2.2 / 6.4.1 SQL Injection
  1863. Drupal 6.x < 6.30 OpenID Module Account Hijacking
  1864. Drupal 7.x < 7.26 Multiple Vulnerabilities
  1865. DTLS Client Detection
  1866. Sony PlayStation 4 Detection
  1867. MySQL 5.5.x < 5.5.35 Remote Code Execution
  1868. MySQL 5.1.x < 5.1.73 Remote Code Execution
  1869. Sonos Device Detection
  1870. SmartTV Device Detection
  1871. Plex Application Detection
  1872. Sonatype Nexus < 2.7.1 'XStream' Object Remote Code Execution Vulnerability
  1873. SANS 6 Categories of Critical Log Information
  1874. CIP-002 Identification of Critical Cyber Assets Report
  1875. Malware Detection
  1876. Target breach shows payment system security needs less talk, more action
  1877. FireEye Finds Six Android Malware Variants Stealing Data
  1878. Bluetooth Hackers Allegedly Skimmed Millions Via Gas Stations
  1879. Read this before you buy another hard drive | HITBSecNews
  1880. How a Math Genius Hacked OkCupid to Find True Love - Wired Science
  1881. Chrome Browser Becomes Eavesdropping Tool
  1882. Critical Infrastructure Protection Bill Passed in Committee
  1883. SANS 6 Categories of Critical Log Information
  1884. Encryption On The Wire
  1885. The Changing Face Of The IT Security Team
  1886. MySQL 5.x < 5.6.13 Multiple Vulnerabilities
  1887. Mac OS X : Safari < 6.1.1 / 7.0.1 Multiple Vulnerabilitieses
  1888. Google Chrome < 32.0.1700.76 Multiple Vulnerabilities
  1889. Xbox Gaming Console Detection
  1890. KiSS PC-Link Client Detection
  1891. Daily Host Alerts Report: Hosts Accessed by Users
  1892. Critical and Exploitable Vulnerabilities Report
  1893. Daily Host Alerts Report: Users Accessing Hosts
  1894. Errors and Warnings Report
  1895. VMware Workstation 9.x < 9.0.1 VMX Process DoS (VMSA-2014-0001) (Linux)
  1896. Oracle Identity Management Detection
  1897. Oracle Internet Directory LDAP Server Unspecified Remote Information Disclosure
  1898. Detecting The Trojan.POSRAM Malware
  1899. Nessus Compliance Checks for FortiGate Devices
  1900. The S4 SCADA Security Conference
  1901. Nessus 5.2.5 Is Available for Download
  1902. Hacking Risk Grows for Outdated ATMs
  1903. Apple’s Very Different BYOD Philosophy
  1904. A Walk Through the ICS Village
  1905. security -- 'a breach waiting to happen' | Security & Privacy - CNET News
  1906. Microsoft will furnish malware assassin to XP users until mid-2015
  1907. Hacker Turns Mouse Into A Webcam
  1908. Introduction to Anti-Fuzzing: A Defence in Depth Aid | NCC Group
  1909. The Internet of Things Is Wildly Insecure — And Often Unpatchable | Wired Opinion |
  1910. WordPress Plugins Exploitation Through the Big Data Prism - The Akamai Blog
  1911. A First Look at the Target Intrusion, Malware
  1912. 2013 Toolsmith Tool of the Year: Recon-ng
  1913. The Hidden Backdoors to the City of Cron | Sucuri Blog
  1914. Businesses are building shopper profiles based on sniffing phones’ WiFi
  1915. Apple Settles with FTC, Will Refund at Least $32.5 Million in App Store Purchases
  1916. Cisco Discloses Existence of Undocumented Backdoor in Routers
  1917. Critics Cut Deep on Yahoo Mail Encryption Rollout
  1918. Drug overdose caused death of hacker | Security & Privacy - CNET News
  1919. Yahoo enables default HTTPS encryption for Yahoo Mail
  1920. Skipfish Scanner Used in Financial Sector Attacks | The State of Security
  1921. avast! blog » Mobile malware a real threat in 2014
  1922. At CES, Belkin bets big on WeMo | CES 2014: Appliances - CNET Blogs
  1923. Snapchat Hack Affects 4.6 Million Users
  1924. Anatomy Of A 22-Year-Old X Window Bug: Get Root With Uncovered Flaw
  1925. OpenSUSE forums hacked in ANOTHER vBulletin attack
  1926. Mikko Hypponen Still Speaking at the RSA Conference
  1927. Researchers publish Snapchat code allowing phone number matching after exploit disclosures ignored | ZDNet
  1928. Surprise! It's Super Easy to Identify People From Metadata
  1929. Trojan program hijacks World of Warcraft accounts despite two-factor authentication
  1930. Flash Memory Cards Contain Powerful, Unsecured Microcontrollers
  1931. Probes Against Linksys Backdoor Port Surging
  1932. OpenSSL Hackers Used Weak Password at Web Host to Deface Site
  1933. Noted speaker, Mikko Hypponen, cancels RSA talk in protest to NSA collaboration allegations
  1934. Growing human organs inside pigs in Japan
  1935. Researcher Uncovers Backdoor In DSL Routers
  1936. FireEye buys outfit that lifted the lid on Chinese cyber-espionage
  1937. Hacker backdoors Linksys, Netgear, Cisco and other routers
  1938. ATM hacker Barnaby Jack's death blamed on accidental drug overdose • The Register
  1939. NERC – (CIP-002) Identification of Critical Cyber Assets
  1940. Port 22 Non-SSH Traffic Detection
  1941. Port 21 Non-FTP Traffic Detection
  1942. Samba < 3.6.22 / 4.0.13 / 4.1.3 Multiple Vulnerabilities
  1943. Port 443 Non-SSL Traffic Detection
  1944. Nessus HTML5 UI 2.1 Provides Enhanced Usability
  1945. Monthly Executive Report
  1946. Exploitable by Malware
  1947. Unsupported OS Report
  1948. Daily Host Alerts Report
  1949. Space Rogue from L0pht and Hacker News Network Joins Tenable Network Security
  1950. Ask A VC: Accel’s Ping Li On The Impact Of Data-Driven Software and More
  1951. Does retail security take a backseat during the 'holiday IT lockdown'?
  1952. Industry Predictions for 2014; Part 4: Managed Security Services
  1953. Industry Predictions for 2014; Part 3: The Effect and Influence of Government
  1954. Defending against self-destructing PCs, other mythical security threats Read more: Defending against self-destructing PCs, other mythical security threats
  1955. DB2 9.7 < Fix Pack 9 Multiple Vulnerabilities
  1956. Wireshark 1.8.x < 1.8.12 Multiple DoS
  1957. Wireshark 1.10.x < 1.10.4 Multiple DoS
  1958. LiveZilla < Multiple Vulnerabilities
  1959. Novell iPrint Client < 5.93 DoS
  1960. OpenMediaVault Web Detection
  1961. OpenMediaVault Default Administrator Credentials
  1962. SuperMicro Device Uses Default SSH Host Key
  1963. SuperMicro Device Uses Default SSL Certificate
  1964. Zabbix 1.9.x < 1.9.4 zabbix_agentd DoS
  1965. Quagga 0.99.21 bgp_attr.c BGP Update DoS
  1966. Oracle Fusion Middleware Web Services Component Remote Information Disclosure
  1967. Asterisk Multiple Vulnerabilities (AST-2013-006 / AST-2013-007)
  1968. Subversion 1.6.x / 1.7.x / 1.8.x < 1.6.23 / 1.7.11 / 1.8.1 Multiple Vulnerabilities
  1969. Subversion 1.8.x < 1.8.2 FSFS Repository Corruption
  1970. Subversion 1.4.x - 1.7.12 / 1.8.x < 1.8.3 Multiple Symlink File Overwrite Vulnerabilities
  1971. Subversion 1.4.x - 1.7.13 / 1.8.x < 1.8.5 Multiple DoS
  1972. Apple Motion Installed (Mac OS X)
  1973. Apple Motion < 5.1 OZDocument::parseElement() Function MOTN File Subview Attribute Handling Integer Overflow
  1974. Winamp Unsupported
  1975. Safari Unsupported
  1976. VMSA-2013-0016 : VMware ESXi and ESX unauthorized file access through vCenter Server and ESX
  1977. NTP monlist Command Enabled
  1978. Splunk Enterprise 6.x < 6.0.1 Malformed Packet DoS
  1979. Winamp < 5.666 Multiple Memory Corruptions
  1980. HP Data Protector Multiple Vulnerabilities
  1981. ScMM DSL Modem/Router Backdoor Detection
  1982. Cisco WAAS Mobile Server Detection
  1983. Cisco WAAS Mobile Server Web Administration Interface Detection
  1984. Cisco WAAS Mobile Server Web Administration Default Credentials
  1985. Cisco WAAS Mobile Server < 3.5.5 Remote Code Execution
  1986. Lessons for CSOs in Snowden exploit of NSA networks
  1987. SSL SMTP Client Detection
  1988. Mozilla Thunderbird < 24.2 Multiple Vulnerabilities
  1989. Mozilla SeaMonkey 24.2 Multiple Vulnerabilities
  1990. Mozilla Firefox < 26.0 / 24.2 (ESR version) Multiple Vulnerabilities
  1991. Magnet Link Detection
  1992. Exploitable by Malware
  1993. iLO 3 < 1.65 / iLO 4 < 1.32 Multiple Vulnerabilities
  1994. CCC, 100-gbps, and your own private Shodan
  1995. How we know the 60 Minutes NSA interview was crap
  1996. DinoSec Blog
  1997. THC-Hydra 7.5 Released - Fast Parallel Network Logon Cracker - Darknet - The Darkside
  1998. All of Android’s top 100 apps have been hacked – and banking apps are now a prime target, report finds
  1999. How hackers made minced meat of Department of Energy networks
  2000. Security prediction for 2014: It will get worse
  2001. Edward Snowden Pens An Open Letter To The People Of Brazil
  2002. Android Nasty Sends Your Texts To China
  2003. Important Security Update for D-Link Routers — Krebs on Security
  2004. GCC Poison | Leaf Security Research
  2005. Using a Hosts File To Make The Internet Not Suck (as much)
  2006. Mobile Device Tips, Tricks and Resources
  2007. Nvidia exploit could turn render farms into password crackers, bitcoin miners, researchers claim
  2008. The top 8 security threats of 2013
  2009. Guilty Verdict in First Ever Cybercrime RICO Trial | Threat Level |
  2010. BBC News - Bots now 'account for 61% of web traffic'
  2011. Errata Security: Literally the nicest thing I’ve ever done
  2012. How to find out if your password has been stolen | ZDNet
  2013. Network Security Tip of the Week
  2014. Installing PVS, the Passive Vulnerability Scanner
  2015. Flash Player for Mac <= 11.7.700.252 / 11.9.900.152 Multiple Vulnerabilities (APSB13-28)
  2016. Adobe AIR for Mac <= Multiple Vulnerabilities (APSB13-28)
  2017. Flash Player <= 11.7.700.252 / 11.9.900.152 Multiple Vulnerabilities (APSB13-28)
  2018. Adobe AIR <= AIR Multiple Vulnerabilities (APSB13-28)
  2019. SeaMonkey < 2.23 Multiple Vulnerabilities
  2020. Mozilla Thunderbird < 24.2 Multiple Vulnerabilities
  2021. Firefox < 26.0 Multiple Vulnerabilities
  2022. Firefox ESR 24.x < 24.2 Multiple Vulnerabilities
  2023. Thunderbird < 24.2 Multiple Vulnerabilities (Mac OS X)
  2024. Firefox < 26.0 Multiple Vulnerabilities (Mac OS X)
  2025. Firefox ESR 24.x < 24.2 Multiple Vulnerabilities (Mac OS X)
  2026. Shockwave Player <= Memory Corruptions (APSB13-29)
  2027. VMware Player 5.x < 5.0.3 LGTOSYNC.SYS Guest Privilege Escalation (VMSA-2013-0014)
  2028. VMware Fusion 5.x < 5.0.4 LGTOSYNC.SYS Privilege Escalation (VMSA-2013-0014)
  2029. IBM WebSphere Application Server 8.5 < Fix Pack Multiple Vulnerabilities
  2030. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities (Mac OS X)
  2031. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities
  2032. ManageEngine Desktop Central Default Administrator Credentials
  2033. ManageEngine Desktop Central AgentLogUploadServlet Arbitrary File Upload
  2034. ManageEngine Desktop Central AgentLogUploadServlet Arbitrary File Upload (intrusive check)
  2035. ManageEngine Desktop Central Detection
  2036. Jenkins Accessible without Credentials
  2037. VMSA-2013-0014 : VMware Workstation, Fusion, ESXi and ESX patches address a guest privilege escalation
  2038. Atlassian Confluence < 4.3.7 Multiple Vulnerabilities
  2039. Monitorix Built-in HTTP Server Remote Command Execution
  2040. Amazon Silk Web Browser Detection
  2041. OpenSSL < 0.9.8x / < 1.0.0j / < 1.0.1c Remote Denial of Service Vulnerability
  2042. Bitcoin Client Detection (Stratum)
  2043. Bitcoin Client Detection (JSON/RPC)
  2044. Bitcoin Client Detection (Bitcoin Protocol)
  2045. UPNP Traffic Detection (Client)
  2046. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities
  2047. Google Chrome < 31.0.1650.57 Multiple Remote Code Execution Vulnerabilities
  2048. Google Chrome < 31.0.1650.48 Multiple Vulnerabilities
  2049. Apple Deployed Software Version Detection
  2050. Apple iOS 7.x < 7.0.4 Purchases Authentication Bypass
  2051. Apple iOS 7.x < 7.0.3 Multiple Vulnerabilities
  2052. Apple iOS 7.x < 7.0.2 Multiple Vulnerabilities
  2053. Opera Web Browser Version Detection
  2054. Opera < 18.0 Multiple Unspecified Vulnerabilities
  2055. Innominate Security Technologies mGuard SCADA Security Device Detection
  2056. Advantech Embedded Controller Detection
  2057. Malware Indicators Report
  2058. Remediation Instructions Report by Host
  2059. Executive 7 Day Summary
  2060. Passive Bitcoin Detection Indicator
  2061. Fortinet Firewall Dashboard
  2062. Daily Host Alerts
  2063. MS SQL Server Audit
  2064. Unknown Process(es)
  2065. NIST 800-53 Pie Charts
  2066. Secure your Apache server from DDoS, Slowloris, and DNS Injection attacks
  2067. No security ever built into Obamacare site: Hacker
  2068. Pen tester scoops source code in bug hunt contest, has to argue for prize • The Register
  2069. Malware jumps 'air gap' between non-networked devices | Security & Privacy - CNET News
  2070. Using The Human Perimeter To Detect Outside Attacks
  2071. SANS Technology Institute accredited for masters in security
  2072. Hacker-built drone can hunt, hijack other drones
  2073. Shadow IT is undermining your security
  2074. OSIRT – WordPress OptimizePress hack (file upload vulnerability)
  2075. Bypassing Seagate ATA Security Lock
  2076. Security Advisory: Stem Innovation ‘IZON’ Hard-coded Credentials (CVE-2013-6236) - security vulnerabilities database
  2077. Depth Security: Dahua DVR Authentication Bypass - CVE-2013-6117
  2078. Juniper JunOS crossite scripting
  2079. Vivotek IP cameras authentication bypass
  2080. HP Integrated Lights-Out security vulnerabilities - security vulnerabilities database
  2081. isowall: an isolating firewall
  2082. Muddying The Water On Security And Embedded Devices
  2083. Maslow’s Hierarchy Of Security Product Needs & Vendor Selection…
  2084. Top Security Predictions for 2014
  2085. What’s my name? No, really, what is it?
  2086. GitHub resets user passwords following rash of account hijack attacks
  2087. Who's The Boss Over Your JBoss Servers? -- Dark Reading
  2088. Going Back to the Future in the Name of Better Security
  2089.'s password database hack gives forum admins the jitters
  2090. SCADA flaws put world leaders at risk of TERRIBLE TRAFFIC JAM
  2091. Linux backdoor squirts code into SSH to keep its badness buried • The Register
  2092. Hacking of forum software firm vBulletin spawns host of zero-day attacks- The Inquirer
  2093. Netflixers Beware: Angler Exploit Kit Targets Silverlight Vulnerability
  2094. Troy Hunt: Adobe credentials and the serious insecurity of password hints
  2095. Tavis Ormandy: QNX
  2096. w00tsec: Unpacking Firmware Images from Cable Modems
  2097. Multiple Vulnerabilities in Cisco IOS XE Software for 1000 Series Aggregation Services Routers (cisco-sa-20131030-asr1000)
  2098. Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20131106-sip)
  2099. OpenSSH v6.2 / v6.3 Remote Memory Corruption Vulnerability
  2100. OpenSSH 6.2 / 6.3 Remote Memory Corruption Vulnerability
  2101. Copyright Indicator
  2102. ACG Maryland - 2013 Deal of the Year Finalist - Tenable Network Security & Accel Partners
  2103. Risky Business Podcast #304 -- Tech heavyweights target NSA
  2104. Why Ben Franklin would have excelled in cyber security
  2105. Tenable Network Security Named a Deloitte 2013 Technology Fast 500™ Award Winner
  2106. MS SQL Server Audit Report
  2107. Oracle DB Audit Report
  2108. Copyright Report
  2109. Adobe ColdFusion Multiple Vulnerabilities (APSB13-27) (credentialed check)
  2110. SeaMonkey < 2.22.1 NSS and NSPR Multiple Vulnerabilities
  2111. Oracle JavaServer Faces Multiple Partial Directory Traversals
  2112. It’s the little things that count | Andy ITGuy - Information Security Blog
  2113. will eventually be functional, but how secure?
  2114. Defenders Still Chasing Adequate Threat Intelligence Sharing
  2115. Research Into BIOS Attacks Underscores Their Danger
  2116. Barracuda Web Application Firewall Now In AWS Marketplace
  2117. Hackers Take Limo Service Firm for a Ride — Krebs on Security
  2118. Attacking the Spanning-Tree Protocol
  2119. 4 reasons BadBIOS isn't real | Security - InfoWorld
  2120. Apple II DOS source code released
  2121. The TRUTH about mystery Trojan found in SPAAACE
  2122. Security researcher Cédric 'Sid' Blancher dead at 37
  2123. MS13-088: Cumulative Security Update for Internet Explorer (2888505)
  2124. MS13-089: Critical Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution (2876331)
  2125. MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986)
  2126. MS13-091: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2885093)
  2127. MS13-092: Vulnerability in Hyper-V Could Allow Elevation of Privilege (2893986)
  2128. MS13-093: Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure (2875783)
  2129. MS13-094: Vulnerability in Microsoft Outlook Could Allow Information Disclosure (2894514)
  2130. MS13-095: Vulnerability in Digital Signatures Could Allow Denial of Service (2868626)
  2131. MS KB2868725: Update for Disabling RC4
  2132. MS KB2862152: Vulnerability in DirectAccess Could Allow Security Feature Bypass
  2133. Flash Player <= 11.7.700.242 / 11.9.900.117 Memory Corruptions (APSB13-26)
  2134. MS KB2898108: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  2135. Adobe AIR <= Memory Corruptions (APSB13-26)
  2136. Flash Player for Mac <= 11.7.700.242 / 11.9.900.117 Memory Corruptions (APSB13-26)
  2137. Adobe AIR for Mac <= Memory Corruptions (APSB13-26)
  2138. Zabbix < 1.8.18 / 2.0.9 Multiple SQL Injection Vulnerabilities
  2139. Oracle DB Audit
  2140. Firefox ESR < 17.0.10 Multiple Vulnerabilities (Mac OS X)
  2141. Firefox ESR 24.x < 24.1 Multiple Vulnerabilities (Mac OS X)
  2142. Thunderbird ESR < 17.0.10 Multiple Vulnerabilities (Mac OS X)
  2143. Firefox ESR < 17.0.10 Multiple Vulnerabilities
  2144. Mozilla Thunderbird < 24.1 Multiple Vulnerabilities
  2145. ImageMagick < 6.7.8-8 gif.c Memory Corruption
  2146. Citrix XenDesktop Director Detection
  2147. Citrix XenDesktop BrokerAccessPolicyRule Policy Rule Remote Security Bypass
  2148. IBM Domino 8.5.x < 8.5.3 FP 5 Multiple Vulnerabilities
  2149. IBM Domino 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
  2150. IBM Notes 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
  2151. RSA Authentication Agent for Web for IIS Installed
  2152. RSA Authentication Agent for Web for IIS 7.1.x < 7.1.2 Filter Bypass
  2153. vBulletin upgrade.php Accessible
  2154. Oracle Database Patch Info (Unix / Linux) (credentialed check)
  2155. Oracle Database Patch Info (Windows) (credentialed check)
  2156. Reputation of Windows Executables: Known Process(es)
  2157. Reputation of Windows Executables: Unknown Process(es)
  2158. MS KB2896666: Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution
  2159. Zabbix Web Interface Default Administrator Credentials
  2160. Tenable Network Security Joins Amazon Web Services (AWS) Marketplace to Provide On-Demand AMI Vulnerability Scanning
  2161. Threatlist Trending
  2162. PVS Network Trending
  2163. Mac OS X : Safari < 6.1 Multiple Security Vulnerabilities
  2164. Google Chrome < 30.0.1599.101 Multiple Vulnerabilities
  2165. Remediation Instructions Report by Severity
  2166. Remediation Instructions Report by Vulnerability
  2167. The badBIOS Analysis Is Wrong. at RootWyrm's Corner
  2168. Researcher Finds Method to Insert Malicious Firmware Into Currency Validator | Threatpost | The First Stop For Security News
  2169. Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps | Ars Technica
  2170.’s Coming Security Crackup
  2171. #badBIOS features explained
  2172. Tracking Risk
  2173. Apache mod_fcgid Module < 2.3.9 fcgid_header_bucket_read() Function Heap Buffer Overflow
  2174. Panda AdminSecure Communications Agent < Directory Traversal
  2175. Puppet Enterprise < 3.1.0 Multiple Vulnerabilities
  2176. Novell ZENworks umaninv Information Disclosure
  2177. EMC NetWorker 8.x < Management Console Information Disclosure
  2178. Apache PHP-CGI Remote Code Execution
  2179. Oracle Secure Global Desktop Linux Installation Detection
  2180. Oracle Secure Global Desktop Administration Console Detection
  2181. Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (credentialed check)
  2182. Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (remote check)
  2183. Mozilla Thunderbird < 24.1 / 17.0.10 (ESR) Multiple Vulnerabilities
  2184. Mozilla SeaMonkey < 2.22 Multiple Vulnerabilities
  2185. Mozilla Firefox < 25.0 / 24.1 (ESR version) / 17.0.10 (ESR version) Multiple Vulnerabilities
  2186. ISAKMP Server Detection
  2187. ISAKMP Client Detection
  2188. Encapsulating Security Payload (ESP) Session Setup
  2189. Executive Patch Mitigation Report
  2190. Be sure you are prepared for OS X 10.9 Mavericks | Security Spread
  2191. Scan Shows 65% of ReadyNAS Boxes on Web Vulnerable to Critical Bug
  2192. Seven essentials for VM management and security
  2193. Netgear Root Compromise Via Command Injection
  2194. Tenda Shuts Router Backdoor Found By D-Link Hole Prober
  2195. Your Kettle Could Be A Spambot!
  2196. Systems with Sensitive Data
  2197. Virus Trending
  2198. Executive Age Summary Report
  2199. Mac OS X < 10.9 Multiple Vulnerabilities
  2200. SEW Eurodrive SCADA server detection
  2201. Schneider Electric Accutech Manager RF Successful Authentication
  2202. Schneider Electric Accutech Manager RF Server Detection
  2203. Schneider Electric Accutech Manager RF Failed Authentication
  2204. Schneider Electric Accutech Manager RF Client Detection
  2205. Moore Industries Embedded SCADA server detection
  2206. Indusoft Web Studio Server Detection
  2207. Indusoft Web Studio Client Detection
  2208. Indusoft Remote Code Execution Flaw
  2209. SSL Cipher Block Chaining Cipher Suites Supported
  2210. Dropbear SSH Server < 2013.59 Multiple Vulnerabilities
  2211. Puppet Unauthenticated Remote Code Execution
  2212. Puppet Enterprise < 3.0.1 Multiple Vulnerabilities
  2213. Doctors disabled wireless in Dick Cheney’s pacemaker to thwart hacking
  2214. Ten Physical Security Tips for Mobile Devices - Cyveillance Blog - The Cyber Intelligence Blog
  2215. Capturing The Flag, SQLi-Style -- Dark Reading
  2216. Researchers uncover holes that open power stations to hacking | Ars Technica
  2217. From China, With Love - /dev/ttyS0
  2218. Mobile Summary Report
  2219. ZenPhoto Cross Site Scripting and SQL Injection Vulnerabilities
  2220. Beck IPC Embedded SCADA server detection
  2221. Hirschmann Automation and Control Embedded SCADA server detection
  2222. OnCell Wireless SCADA server detection
  2223. Solar Log SCADA server detection
  2224. Stulz Air Conditioning SCADA server detection
  2225. Dropbear SSH Memory Corruption Denial of Service and User Enumeration Weakness
  2226. Apache 'mod_fcgid' Module Heap Buffer Overflow Vulnerability
  2227. RuggedCom Rugged Operating System Multiple Security Vulnerabilities
  2228. Tenable Network Security Expands EMEA Team
  2229. SAI Global Deploys Tenable Network Security to Combat Security Vulnerabilities and Compliance
  2230. SSH Server Vulnerabilities
  2231. Snort IDS Events
  2232. Palo Alto Firewall Dashboard
  2233. Age Summary Dashboard
  2234. RuggedCom Rugged Operating System < 3.12.2 Multiple Vulnerabilities
  2235. Adobe RoboHelp 10 Unspecified Memory Corruption (APSB13-024)
  2236. XEROX ColorQube Device Detection
  2237. XEROX WorkCentre Multiple Unspecified Vulnerabilities (XRX13-006)
  2238. XEROX ColorQube Multiple Unspecified Vulnerabilities (XRX13-006)
  2239. HP LaserJet Printers Multiple Vulnerabilities
  2240. IBM DB2 and DB2 Connect Detection (credentialed)
  2241. DB2 10.1 < Fix Pack 3 Multiple Vulnerabilities
  2242. DB2 10.1 < Fix Pack 3 Multiple Vulnerabilities (credentialed)
  2243. Cisco NX-OS Software BGP Denial of Service Vulnerability (CSCtn13055)
  2244. Mac OS X : Java for OS X 2013-005
  2245. Mac OS X : Java for Mac OS X 10.6 Update 17
  2246. Oracle Database October 2013 Critical Patch Update
  2247. MySQL 5.1 < 5.1.71 Server Optimizer Denial of Service
  2248. MySQL 5.5 < 5.5.33 Multiple Vulnerabilities
  2249. MySQL 5.6.x < 5.6.13 Multiple Vulnerabilities
  2250. VMSA-2013-0012 : VMware vSphere updates address multiple vulnerabilities
  2251. Siemens SCALANCE X-200 Authentication Bypass
  2252. Siemens SCALANCE X-200 Web Session Hijacking
  2253. Opera < 17 Multiple Vulnerabilities
  2254. Window Process Information
  2255. Window Process Unique Process Name
  2256. Window Process Module Information
  2257. MS13-080: Cumulative Security Update for Internet Explorer (2879017)
  2258. MS13-081: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2870008)
  2259. MS13-082: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890)
  2260. MS13-083: Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2864058)
  2261. MS13-084: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2885089)
  2262. MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080)
  2263. MS13-086: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)
  2264. MS13-087: Vulnerability in Silverlight Could Allow Information Disclosure (2890788)
  2265. MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080) (Mac OS X)
  2266. MS13-087: Vulnerability in Silverlight Could Allow Information Disclosure (2890788) (Mac OS X)
  2267. Adobe Acrobat 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)
  2268. Adobe Reader 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)
  2269. AD Zone Transfers as a user
  2270. FAA panel: Wi-Fi is safe on planes even during takeoff and landing
  2271. 5 Wi-Fi security myths you must abandon now
  2272. Symantec takes on one of largest botnets in history
  2273. Iran's cyberwarfare czar is allegedly assassinated
  2274. IAVM Executive Summary Report
  2275. Snapchat Mobile App Usage Detected
  2276. Google Safebrowsing Client Detection
  2277. Google Chrome < 30.0.1599.66 Multiple Vulnerabilities
  2278. Business RadioX®'s Results Matter Radio Features Atlanta Businesses and Organizations Serving the Local Community
  2279. SAI Global Deploys Tenable Network Security to Combat Security Vulnerabilities and Compliance
  2280. Tenable Network Security Names Attley Ng as Asia-Pacific Vice President
  2281. IAVM Executive Summary Dashboard
  2282. Google Chrome < 30.0.1599.66 Multiple Vulnerabilities
  2283. RES Workspace Manager Agent Detection
  2284. RES Workspace Manager Relay Server Detection
  2285. WellinTech KingView ActiveX Multiple Arbitrary File Overwrite Vulnerabilities
  2286. MediaWiki < 1.19.8 / 1.20.7 / 1.21.2 Multiple Vulnerabilities
  2287. DotNetNuke < 6.2.9 / 7.1.1 Multiple Vulnerabilities
  2288. FireEye Web MPS GUI Detection
  2289. Mac OS X 10.8 < 10.8.5 Supplemental Update
  2290. Blue Coat ProxySG Remote DoS
  2291. Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability (cisco-sa-20130925-rsvp)
  2292. Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability (cisco-sa-20130925-rsvp)
  2293. Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability (cisco-sa-20130925-cce)
  2294. Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service Vulnerability (cisco-sa-20130925-ipv6vfr)
  2295. Cisco IOS Software Network Address Translation Vulnerabilities (cisco-sa-20130925-nat)
  2296. Cisco IOS Software Queue Wedge Denial of Service Vulnerability (cisco-sa-20130925-wedge)
  2297. Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
  2298. Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability (cisco-sa-20130925-ike)
  2299. Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
  2300. Derbycon 3.0 Videos Tracks 1 & 2
  2301. Barclays Bank Branch Bugged In £1.3m Breach
  2302. Exploit Disclosure
  2303. Facebook Pushes Passwords One Step Closer to Death
  2304. Yahoo abandons T-shirt rewards for vulnerability information
  2305. iPhone Fingerprint Scanner Hacked; Should You Care? - Forbes
  2306. Students Find Ways To Hack School-Issued iPads Within A Week : All Tech Considered : NPR
  2307. 10 Ways to Keep Your WordPress Site Secure
  2308. Researchers Unite To #ScanAllTheThings
  2309. 5 Reasons Every Company Should Have A Honeypot
  2310. Thirteen-Year-Olds Hack Their Way Into Space
  2311. Shutdown could test IT security at federal agencies
  2312. Linux/Unix Software Summary
  2313. iTunes < 11.1 ActiveX Memory Corruption
  2314. MDM Discovered Dashboard
  2315. Mobile Device Vulnerability
  2316. Tenable Network Security Receives Highest Rating Possible in 2013 Gartner Marketscope Report
  2317. Hackers Everywhere: A Conversation With Security Thinker Ron Gula
  2318. Apple TV < 6.0 Multiple Vulnerabilities
  2319. Cisco Prime LAN Management Solution Cross-Frame Scripting
  2320. Mac OS X : Cisco AnyConnect Secure Mobility Client 3.0.x / 3.1.x Local Privilege Escalation
  2321. IBM Lotus Sametime Connect Client Password Disclosure
  2322. Cigar Sickness
  2323. Top 7 Alcoholic Drinks to Accompany Cigars
  2324. Tenable Network Security Executives Win Prestigious Ernst and Young Entrepreneur of the Year® 2013 Maryland Award.
  2325. Security Spending On The Rise As Threats Proliferate
  2326. Look at risk before leaping into BYOD, report cautions
  2327. Experts praise Pentagon's march to security standards
  2328. Historic Patch Mitigation Status
  2329. Tracking Device Types by Network
  2330. Windows Remediation Report
  2331. Linux/Unix Remediation Report
  2332. Windows Software Summary
  2333. Asterisk SIP Channel Driver ACK with SDP Denial of Service (AST-2013-004)
  2334. Asterisk SIP Channel Driver Invalid SDP Denial of Service (AST-2013-005)
  2335. Oracle GlassFish Server <= 3.1.1 Multiple Denial-of-Service Vulnerabilities
  2336. Mac OS X 10.8 < 10.8.5 Multiple Vulnerabilities (Security Update 2013-004)
  2337. Opera < 15.0 Cross-site Scripting Vulnerability
  2338. Mozilla Thunderbird < 24.0 / ESR 17.0.9 Multiple Vulnerabilities
  2339. Mozilla Firefox < 24.0 Multiple Vulnerabilities
  2340. Mozilla SeaMonkey < 2.21 Multiple Vulnerabilities
  2341. Apple iOS < 7 Multiple Vulnerabilities
  2342. HTTP Cookie 'secure' Property Transport Mismatch
  2343. MS13-072: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537)
  2344. MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300))
  2345. MS13-074: Vulnerabilities in Microsoft Access Could Allow Remote Code Execution (2848637)
  2346. MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation of Privilege (2876315)
  2347. MS13-077: Vulnerability in Windows Service Control Manager Could Allow Elevation of Privilege (2872339)
  2348. MS13-078: Vulnerability in FrontPage Could Allow Information Disclosure (2825621)
  2349. MS13-079: Vulnerability in Active Directory Could Allow Denial of Service (2853587))
  2350. MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300) (Mac OS X)
  2351. MS KB2880289: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  2352. Shockwave Player <= Memory Corruption Vulnerabilities (APSB13-23)
  2353. Adobe Acrobat < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
  2354. Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
  2355. Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22) (Mac OS X)
  2356. LeagueManager Plugin for WordPress wp-admin/admin.php league_id Parameter SQL Injection
  2357. Cisco Secure Access Control System (ACS) Multiple Vulnerabilities
  2358. Cisco Video Surveillance Manager Web Detection
  2359. Cisco Video Surveillance Manager Default Administrator Credentials
  2360. Cisco Video Surveillance Manager Multiple Vulnerabilities (cisco-sa-20130724-vsm)
  2361. AIX PowerHA Cluster Management Unspecified Remote Configuration Manipulation
  2362. VxWorks 5.5 through 6.9 Multiple Vulnerabilities
  2363. Adobe AIR <= Memory Corruptions (APSB13-21)
  2364. Flash Player <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
  2365. Adobe AIR for Mac <= Memory Corruptions (APSB13-21)
  2366. Flash Player for Mac <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
  2367. EMC NetWorker nsrpush Process Local Privilege Escalation
  2368. HP SiteScope SOAP Call runOMAgentCommand SOAP Request Arbitrary Remote Code Execution
  2369. Polycom SIP Detection
  2370. Polycom HDX < Multiple Vulnerabilities
  2371. IBM WebSphere Service Registry and Repository Installed
  2372. IBM WebSphere Service Registry and Repository 7.0 < 7.0.0 FP1 Authentication Bypass
  2373. IBM Lotus Sametime Connect Client Installed
  2374. IBM Lotus Sametime Connect Client Mouseover XSS
  2375. Cisco IronPort PostX < Multiple Vulnerabilities
  2376. IBM DB2 Content Manager eClient Detection
  2377. IBM DB2 Content Manager eClient < Unspecified Security Vulnerability
  2378. Cisco ASA Next-Generation Firewall Fragmented Traffic DoS (cisco-sa-20130626-ngfw)
  2379. Cisco Unified MeetingPlace Detection
  2380. Cisco Unified MeetingPlace Multiple Session Weaknesses
  2381. Cisco TelePresence DSP Card Crafted RTP Packet H.264 Bit Stream Handling DoS
  2382. Defending against web-based malware: Spot the smoke, don’t wait for fire
  2383. After Ten Years, Cracks In Microsoft’s Patch Program
  2384. iOS 7 patches 80 vulnerabilities
  2385. Linus Torvalds Admits He's Been Asked To Insert Backdoor Into Linux
  2386. Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
  2387. How I hacked SIM cards with a single text - and the networks DON'T CARE
  2388. Flaw In iOS 7 Lets Attackers Take Control Of Users' iPhones
  2389. 5 Tips to Protect Networks Against Shodan Searches - eSecurity Planet
  2390. Installing Dropbox? Prepare to lose ASLR. | codeinsecurity
  2391. Volvent Security R&D: Cloning an Infrared Disarming Remote of a Consumer Grade Home Security System
  2392. How did I get a root shell in my NAS, 0day inside
  2393. Would you believe it? Women more in favour of porn filters than men
  2394. Apple DDOS? Nope, just the update coming down!, (Wed, Sep 18th)
  2395. NSA Contract With VUPEN Revealed
  2396. Skimming made easier with hacked portable card payment machines
  2397. Security researchers create undetectable hardware trojans
  2398. Marissa Mayer does not lock her iPhone with a passcode- The Inquirer
  2399. Seagate to produce 5TB hard drive next year, 20TB by 2020
  2400. Apple's Fingerprint ID May Mean You Can't 'Take the Fifth'
  2401. Black Hat Announces First Ever West Coast Trainings Event
  2402. IT Pros Lack Security Management Support, Budget & Training
  2403. Flying in the US? Remember to leave your hand grenades at home
  2404. Tenable Network Security: Google Chrome v24 Windows STIG Audit
  2405. Tenable Network Security: CIS Red Hat Enterprise Linux 6 - Level...
  2406. Howto crawl web.xml with ruby to discover servlet urls for a pentest
  2407. Delete any Photo from Facebook by Exploiting Support Dashboard « Arul Kumar.V
  2408. Researchers: Oracle’s Java Security Fails
  2409. NSA cracks HTTPS, SSL, 4G smartphone encryption | Digital Trends
  2410. The Router Review: From nmap to firmware | codeinsecurity
  2411. Russia's Cybercrime Market Reaches $1.9 Billion
  2412. 'Don't Travel Abroad' Russia warns Hackers
  2413. Red Hat CIO Takes an Open-Source Approach to Security and BYOD
  2414. People the weakest link in security
  2415. 5 Signs Of Trouble In Your Network
  2416. Android malware spotted hitching a ride on mobile botnet
  2417. Cacti < 0.8.8b Command and SQL Injections
  2418. Mitigated Patch Rates
  2419. Cisco Network Admission Control (NAC) Version
  2420. Cisco Network Admission Control Manager SQL Injection (cisco-sa-20130417-nac)
  2421. iLO 3 < 1.50 / iLO 4 < 1.13 Unspecified Information Disclosure
  2422. Apple AirPort Base Station (802.11n) Firmware < 7.6.4 Remote DoS (APPLE-SA-2013-09-06-1)
  2423. Stuxnet Expert Proposes New Framework For ICS/SCADA Security
  2424. NSA Laughs At PCs, Prefers Hacking Routers And Switches
  2425. 22 Years Later, The Linux And Open Source "Cancer" Is Wonderfully Benign
  2426. Stop treating your datacentre as if it were a laptop: Symantec
  2427. Tenable Network Security: CIS Microsoft Windows 8 - Level 1 -...
  2428. GroundWork Monitor Enterprise Detection
  2429. Amazon Linux AMI : puppet Arbitrary Code Execution (ALAS-2013-213)
  2430. Source: New York Times Website Hit by Cyber Attack
  2431. 10 Years Later: Could an Epic Blackout Happen Again?
  2432. PHP 5.5.x < 5.5.1 xml.c Buffer Overflow
  2433. RealPlayer for Windows < Remote Buffer Overflow and Memory Corruption Vulnerabilities
  2434. Opera < 16.0 Multiple Vulnerabilities
  2435. TortoiseSVN Client Version Detection
  2436. RealPlayer for Windows < Multiple Vulnerabilities
  2437. FileZilla Client Installed
  2438. Microsoft SQL Server STARTTLS Support
  2439. Cisco Nexus 1000V VEM DoS (CSCtj17451)
  2440. FileZilla Client < 3.7.2 SFTP Integer Overflow
  2441. HP LaserJet PJL Interface Directory Traversal (HPSBPI02575)
  2442. CiscoWorks Common Services Home Page Component Unspecified Shell Command Execution
  2443. FileZilla Client < 3.7.3 Multiple Vulnerabilities
  2444. Computer Associates ARCserve Backup LDBserver Remote Code Execution Vulnerability
  2445. RSA SecurID Software Token Converter Buffer Overflow
  2446. RSA SecurID Software Token Converter Buffer Overflow
  2447. Websense Email Security Installed
  2448. Websense Email Security SMTP Component Weak SSL/TLS Ciphers
  2449. WP Online Store Plugin for WordPress Multiple Parameter File Disclosure
  2450. Opera < 16 Multiple Vulnerabilities
  2451. SSL Certificate Chain Contains RSA Keys Less Than 2048 bits
  2452. Oracle TNS Listener Remote Poisoning
  2453. NSA: NOBODY could stop Snowden – he was A SYSADMIN
  2454. The Body Worn "IMSI Catcher" For All Your Phone Snooping Needs
  2455. Getting To The Root Of Application Security Problems
  2456. Java 6 0-Day Exploit in the Wild – Updated
  2457. Webantix: Webshot: Screenshot every web server during your pen test
  2458. BYOD – How much do you love your corporate laptop?
  2459. Want to break some Android apps?
  2460. ISPs scramble to explain mouse-sniffing tool
  2461. Tesla Model S REST API Authentication Flaws
  2462. Poison Ivy RAT Becoming The AK-47 Of Cyber-Espionage Attacks
  2463. Cisco cracks down on security vulnerability
  2464. Talking Threats with Senior Management
  2465. Getting over the fear of measuring what matters
  2466. Installing Printers with PowerShell
  2467. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit Works | TechCrunch
  2468. ISC Diary | Fibre Channel Reconnaissance - Reloaded
  2469. LinEnum - Scripted Linux Enumeration & Privilege Escalation Checks
  2470. levle/rdesktop-fuzzer · GitHub
  2471. Nearly One-Fifth Of Enterprise Operating Systems Not Fully Patched
  2472. Hackers may cash in when XP is retired
  2473. PHP 5.4.x < 5.4.1 Multiple Vulnerabilities
  2474. PHP < 5.3.12 / 5.4.2 CGI Query String Code Execution
  2475. PHP < 5.3.11 Multiple Vulnerabilities
  2476. PHP 5.4.x < 5.4.18 Multiple Vulnerabilities
  2477. PHP 5.5.x < 5.5.2 Multiple Vulnerabilities
  2478. Google Chrome < 29.0.1547.57 Multiple Vulnerabilities
  2479. HP LoadRunner lrLRIServices ActiveX Control Code Execution Vulnerability
  2480. DotNetNuke __dnnVariable Parameter XSS
  2481. PHP 5.4.x < 5.4.18 Multiple Vulnerabilities
  2482. PHP 5.5.x < 5.5.2 Multiple Vulnerabilities
  2483. Sun SPARC Enterprise T5120 and T5220 Default Configuration Root Command Execution Vulnerability
  2484. HP LoadRunner < 11.52 Code Execution
  2485. RSA Authentication Agent Installed
  2486. Apple QuickTime MPEG-2 Playback Component Vulnerability
  2487. Cisco Unified Presence Server DoS (cisco-sa-20120912-cupxcp)
  2488. Cisco Unified Presence Server DoS (cisco-sa-20130227-cups)
  2489. DotNetNuke DNNArticle Module categoryid Parameter SQL Injection
  2490. Google Chrome < 29.0.1547.57 Multiple Vulnerabilities
  2491. PowerDNS Recursor 3.3.x / 3.4.x / 3.5 RC1 Domain Name Resolving Vulnerability
  2492. RSA Authentication Agent 7.1.x < 7.1.2 Authentication Bypass
  2493. Tumbleweed SecureTransport vcst_eu.dll ActiveX Control Buffer Overflows
  2494. CiscoWorks Common Services Installed
  2495. CiscoWorks Common Services Arbitrary Code Execution (cisco-sa-20101027-cs)
  2496. How Not to DDoS Your Former Employer
  2497. Bradley Manning sentenced to 35 years in prison • The Register
  2498. US intelligence services go 'on the record' with new Tumblr blog | World news |
  2499. If You Send To Gmail, You Should Have 'No Legitimate Expectation Of Privacy' - Business Insider
  2500. Researchers release tool to pickup the SLAAC in Man-In-The-Middle attacks using IPv6 - Network World
  2501. Putty Security Update (SSH Tool)
  2502. Poison Ivy: Assessing Damage and Extracting Intelligence
  2503. Hackers use new tactic to attack U.S. media sites | Reuters
  2504. Attention, parents: Baby monitor hacked; default password to blame?
  2505. Zuckerberg Facebook hacker gets $10k fundraiser bug bounty
  2506. CSOs: Stop flogging the threats and start providing solutions
  2507. Bloke leaks '1000s' of Twitter login tokens, says he can hack ANY twit
  2508. Open Security Research: Remote Code Execution on Wired-side Servers over Unauthenticated Wireless
  2509. ZMap · The Internet Scanner
  2510. Tenable Network Security: Tenable CIS Oracle 9i/10g v2.01 Audits
  2511. PuTTY < 0.63 Multiple Vulnerabilities
  2512. ModSecurity < 2.1.1 POST Data Null Byte Filter Bypass
  2513. ModSecurity < 2.5.9 Multipart Request Header Name DoS
  2514. ModSecurity < 2.7.0 Multipart Request Parsing Filter Bypass
  2515. ModSecurity < 2.7.3 XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
  2516. CA ARCserve Backup for Laptops and Desktops Server, CA Protection Suite, and CA Desktop Management Suite Integer Underflow
  2517. PuTTY 0.52 to 0.62 Multiple Vulnerabilities
  2518. Mac OS X Directory Service Buffer Overflow
  2519. Poison Ivy Detection
  2520. TrustPort WebFilter help.php hf Parameter Directory Traversal
  2521. HP ProCurve Identification
  2522. HP ProCurve 5400 zl Switches Compact Flash Card Security Issue
  2523. MS13-059: Cumulative Security Update for Internet Explorer (2862772)
  2524. MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2850869)
  2525. MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2876063)
  2526. MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege (2849470)
  2527. MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)
  2528. MS13-064: Vulnerability in Windows NAT Driver Could Allow Denial of Service (2849568)
  2529. MS13-065: Vulnerability in ICMPv6 Could Allow Denial of Service (2868623)
  2530. MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure (2873872)
  2531. MS KB2862966 : Updates to Improve Cryptography and Digital Certificate Handling in Windows
  2532. MS KB2861855: Updates to Improve Remote Desktop Protocol Network-Level Authentication
  2533. MS KB2862973: Update for Deprecation of MD5 Hashing Algorithm for Microsoft Root Certificate Program
  2534. Cisco Intrusion Prevention System Jumbo Frame Denial of Service (cisco-sa-20080618-ips)
  2535. HP ProCurve Switches Remote Unauthorized Information Disclosure
  2536. Adobe Camera Raw Plugin Multiple Vulnerabilities (Mac OS X)
  2537. PHP 5.5.x < 5.5.1 xml.c Buffer Overflow
  2538. BigTree CMS Detection
  2539. BigTree CMS index.php SQL Injection
  2540. Western Digital My Net Router main_internet.php Admin Credential Disclosure
  2541. OpenX flowplayer-3.1.1.min.js Backdoor Remote Code Execution
  2542. OSPF LSA Manipulation Vulnerability in Cisco ASA (cisco-sa-20130801-lsaospf)
  2543. OSPF LSA Manipulation Vulnerability in Cisco IOS (cisco-sa-20130801-lsaospf)
  2544. OSPF LSA Manipulation Vulnerability in Cisco IOS-XE (cisco-sa-20130801-lsaospf)
  2545. OSPF LSA Manipulation Vulnerability in Cisco NX-OS (cisco-sa-20130801-lsaospf)
  2546. HP Integrated Lights-Out authentication bypass
  2547. 10 years of Blaster: a retrospective
  2548. Buying Battles in the War on Twitter Spam
  2549. Schneier on Security: Stories from MI5
  2550. Can We End CSRF With Header-Based Browser Policies?
  2551. The More Things Change
  2552. Hacker 'Shouts Abuse' Via Foscam Baby Monitoring Camera
  2553. Leap Motion Controller exploit demoed by Malwarebytes
  2554. Every employee is now an IT employee, to some degree
  2555. Continuous Security Monitoring: Compliance
  2556. Cisco Security Switches
  2557. NetAppVoice: CxO Beware: Hacker-Snipers Aiming At You Right Now - Forbes
  2558. Why is notepad.exe connecting to the internet? | Strategic Cyber LLC
  2559. Wall Of Sheep Hacker Group Exposes NFC's Risks
  2560. GPS Jammer Accidentally Jams Up Newark Airport
  2561. Mainframes Hackable, But Do You Care?
  2562. London Bans Smartphone Snooping Garbage Bins
  2563. Raritan remote administration server detection
  2564. IPMI Server Detection
  2565. ClearSCADA server detection
  2566. Mozilla Thunderbird < 17.0.8 Multiple Vulnerabilities
  2567. Mozilla SeaMonkey < 2.20 Multiple Vulnerabilities
  2568. Mozilla Firefox < 23.0 Multiple Vulnerabilities
  2569. Symantec Web Gateway < 5.1.1 Multiple Vulnerabilities (SYM13-008)
  2570. Samba 3.0.x < 4.0.7 Denial of Service Vulnerability
  2571. Junos Pulse Secure Access Service (SSL VPN) Multiple XSS (JSA10554)
  2572. HP LaserJet Pro /dev/save_restore.xml Administrative Password Disclosure
  2573. Splunk < 5.0.4 X-FRAME-OPTIONS Clickjacking Weakness
  2574. Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities
  2575. Incomplete Thought: The Psychology Of Red Teaming Failure – Do Not Pass Go…
  2576. Windows Phone shows little market share growth
  2577. Black Hat hacker claims he can make $15k to $20k an hour
  2578. Hackers demonstrate Toyota Prius hijacking on video
  2579. Windows phones can be burned by rogue hotspots
  2580. HP plugs password-leaking printer flaw • The Register
  2581. Hackers to NSA chief: Read the Constitution | Security & Privacy - CNET News
  2582. Car hacking code released at Defcon
  2583. Wi-Fi routers: More security risks than ever
  2584. #BlackHat Briefings USA 2013: Day Two Notes
  2585. #BlackHat Briefings USA 2013: Day One Notes
  2586. admin to SYSTEM win7 with remote.exe
  2587. Firefox Zero-Day Used in Child Porn Hunt?
  2588. Chinese hackers take over fake water utility
  2589. FBI allowed informants to break law more than 5,600 times in year
  2590. Android Apps Can Access All Of Your Google Account
  2591. Posh potty owners flushed by dodgy Bluetooth password
  2592. iOS Weaknesses Allow Attacks Via Trojan Chargers
  2593. Water-Utility Honeynet Illuminates Real-World SCADA Threats
  2594. Windows Phones open to hackers when connecting to rogue Wi-Fi
  2595. DNS Vulnerability Dashboard
  2596. Event Indicator Alert Dashboard
  2597. Web Services Indicator Dashboard
  2598. Event Indicator Alert Report
  2599. EAServer <= 6.3.1 / 6.2 Multiple Vulnerabilities
  2600. MySQL 5.6.x < 5.6.12 Multiple Vulnerabilities
  2601. Line Client Detection
  2602. Oracle VirtualBox Detection
  2603. Oracle VM VirtualBox 4.2 < 4.2.14 tracepath Local Denial of Service
  2604. WhatsApp Client Detection
  2605. Kakao Client Detection
  2606. Kakao Client Detection
  2607. Apache 2.4 < 2.4.5 Multiple Vulnerabilities
  2608. DRAC server detection
  2609. Intel Active Management Server Detection
  2610. Megarac server detection
  2611. QNX Server Detection
  2612. QNX Server Detection
  2613. ServerView server detection
  2614. Atvise Server Detection
  2615. Google Chrome < 28.0.1500.95 Multiple Vulnerabilities
  2616. Kingfisher Debug Terminal Detection
  2617. Apache Subversion < 1.8.1 / 1.7.11 Remote Denial of Service Vulnerability
  2618. Cisco IOS Extensible Authentication Protocol Vulnerability (cisco-sr-20071019-eap)
  2619. Blue Coat ProxySG SGOS Version
  2620. Blue Coat ProxySG Core File Information Disclosure
  2621. Blue Coat ProxySG Unspecified XSS
  2622. MyBB < 1.6.10 Multiple Vulnerabilities
  2623. RT 3.8.x < 3.8.17 / 4.x < 4.0.13 Multiple Vulnerabilities
  2624. Check Point ZoneAlarm Detection
  2625. Apache 2.4 < 2.4.5 Multiple Vulnerabilities
  2626. Ibrahim Balic takes credit for Apple Dev Centre “attack”, but will he shoulder the blame?
  2627. WordPress flaw could cause data leaks - IT News from
  2628. Adam Gowdiak uncovers new vulnerability in Java 7 which opens door to 10-year-old attack
  2629. Integrating Vulnerability Management Into The Application Devleopment Process
  2630. True tales of (mostly) white-hat hacking
  2631. Hardware Hacking Trends
  2632. Nations Buying as Hackers Sell Flaws in Computer Code -
  2633. SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones - Forbes
  2634. SSH Brute Force – The 10 Year Old Attack That Still Persists | Sucuri Blog
  2635. Web Plugin Family Indicator Dashboard
  2636. HUAWEI network device detection
  2637. Google Chrome < 28.0.1500.71 Multiple Security Vulnerabilities
  2638. phpMyAdmin 4.0.x < 4.0.3 'view_create.php' Cross Site Scripting Vulnerability
  2639. Flash Player <= / 11.7.700.225 Multiple Vulnerabilities (APSB13-17)
  2640. WeChat chat client detection
  2641. LINE chat client detection
  2642. KakaoTalk Client Detection
  2643. PHP Backdoor Script Detection
  2644. PHP Code Obfuscation
  2645. Apache 2.2.x < 2.2.25 Remote Denial of Service Vulnerability
  2646. PHP 5.3.x < 5.3.27 Information Disclosure
  2647. PHP 5.4.x < 5.4.17 Buffer Overflow
  2648. Samba 3.6.x < 3.6.6 Remote Security Bypass
  2649. phpMyAdmin 3.5.x < / 4.x < 4.0.0-rc3 Multiple Vulnerabilities
  2650. Squid 3.2.x < 3.2.13 / 3.3.x < 3.3.8 Port Handling Denial of Service
  2651. Squid 3.x < 3.2.12 / 3.3.x < 3.3.7 idnsALookup HTTP Request Denial of Service
  2652. IBM Blade Center Advanced Management Console Detection
  2653. Dell iDRAC6 Multiple Vulnerabilities
  2654. Juniper Junos on SRX Series PIM DoS (JSA10573)
  2655. Juniper Junos SRX Series UAC Enforcer HTTP Remote Code Execution (JSA10574)
  2656. Juniper Junos OpenSSL Multiple Vulnerabilities (JSA10575)
  2657. Juniper Junos proxy-arp/arp-resp DoS (JSA10576)
  2658. Juniper Junos SRX Series TCP ALG DoS (JSA10577)
  2659. Juniper Junos SRX Series MSRPC DoS (JSA10578)
  2660. Juniper Junos SRX1400/3400/3600 Etherleak Information Disclosure (JSA10579)
  2661. Juniper Junos SSL/TLS Renegotiation DoS (JSA10580)
  2662. Apache 2.0 < 2.0.65 Multiple Vulnerabilities
  2663. Apache 2.2 < 2.2.25 Multiple Vulnerabilities
  2664. Oracle Linux 6 : kernel (ELSA-2013-1051)
  2665. Blue Coat Authentication and Authorization Agent (BCAAA) Installed
  2666. Blue Coat Authentication and Authorization Agent Remote Overflow
  2667. Adobe ColdFusion 9/9.0.1/9.0.2 On JRun DoS (APSB13-19) (credentialed check)
  2668. Apache Subversion < 1.6.23 / 1.7.x < 1.7.10 Multiple Remote DoS
  2669. IPMI Cipher Suite Zero Authentication Bypass
  2670. IPMI Cipher Suites Supported
  2671. McAfee ePolicy Orchestrator < 4.6.7 Multiple XSS
  2672. Oracle Database July 2013 Critical Patch Update
  2673. Symantec Mail Security for Exchange / Domino Autonomy KeyView Module Multiple Buffer Overflows
  2674. Symantec Mail Security for SMTP Autonomy KeyView Module Multiple Buffer Overflows
  2675. MySQL 5.1 < 5.1.70 Multiple Vulnerabilities
  2676. MySQL 5.5 < 5.5.32 Multiple Vulnerabilities
  2677. MySQL 5.6.x < 5.6.12 Multiple Vulnerabilities
  2678. Sun Java System Application Server Information Disclosure
  2679. Default password (dasdec1) for 'root' account
  2680. Apache Struts2 action: Parameter Arbitrary Remote Command Execution
  2681. IBM WebSphere Application Server 7.0 < Fix Pack 29 Multiple Vulnerabilities
  2682. IceWarp /rpc/gw.html XML External Entity Arbitrary File Disclosure
  2683. Oracle VM VirtualBox 4.2 < 4.2.14 tracepath Local Denial of Service
  2684. How Easily Can a Moving Car Be Hacked? | Motherboard
  2685. Why help desk employees are a social engineer's favorite target
  2686. Researchers To Highlight Weaknesses In Secure Mobile Data Stores --
  2687. Researchers hack Verizon device, turn it into mobile spy station | Reuters
  2688. Most enterprise networks riddled with vulnerable Java installations, report says
  2689. How the Glass hack works
  2690. Man arrested for having sex with pool raft | Norwalk Reflector
  2691. The Five Most Common Security Pitfalls In Software Development
  2692. Feds asked to sit out Defcon hacking conference this year
  2693. HP admits to backdoors in storage products
  2694. D-Link routers multiple security vulnerabilities
  2695. A Bad Talk Ain’t The End of the World
  2696. Six Tips: How To Protect Yourself From Mobile Attacks
  2697. Web Shells Collection Page Updated
  2698. 4 Things You Should Know Before Your Team Writes Another Line of Code
  2699. Asleep at the Wheel
  2700. Open Security Research: Potential attack vectors against Z-Wave®
  2701. Microsoft gives Windows app developers 180 days to patch -- or else
  2702. US gov SMASHES UP TVs and MICE to nuke tiny malware outbreak
  2703. Siemens Sinema server detection
  2704. Honeywell server detection
  2705. Honeywell Building Network Adapter (BNA) server detection
  2706. HAProxy Multiple Denial of Service Vulnerabilities
  2707. GE Industrial server detection
  2708. Cooper Power Systems HMI/SCADA device detection
  2709. Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20120926-cucm)
  2710. Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability (cisco-sa-20120926-ecc)
  2711. Plone spamProtect mailaddress Parameter XSS
  2712. Cryptocat 'encrypted' group chats may have been crackable for 7 months
  2713. Hacker Holes in Server Management System Allow 'Almost-Physical' Access | Threat Level |
  2714. introducing zarp | forelsket & security
  2715. Top 10 Proactive Web Application Security Measures | WhiteHat Security Blog
  2716. INVASION of the UNDEAD ANDROIDS: Hackers can pwn 'nearly all' devices
  2717. Microsoft Offloads Heap Of Critical Fixes
  2718. Auditing NetApp Data ONTAP with Nessus
  2719. NetApp Data ONTAP Best Practices Audit
  2720. cURL/libcURL 'curl_easy_unescape()' Heap Memory Corruption Vulnerability
  2721. FileMaker Pro Software Sharing Detection
  2722. cURL/libcURL 'Curl_sasl_create_digest_md5_message()' Stack Buffer Overflow Vulnerability
  2723. HAProxy Trash Buffer Overflow Vulnerability
  2724. Multiple Avira Products PDF Handling Remote Denial-of-Service Vulnerability
  2725. cURL/libcURL GSS/Negotiate Feature Spoofing Security Vulnerability
  2726. cURL/libcURL Remote Input Validation Vulnerability
  2727. EAServer <= 6.3.1 Information Disclosure
  2728. cURL/libcURL 'tailmatch()' Function Information Disclosure Vulnerability
  2729. HAProxy 'tcp-request content' Buffer Overflow Vulnerability
  2730. Winamp < 5.63 Multiple Vulnerabilities
  2731. Winamp < 5.64 Multiple Vulnerabilities
  2732. Samba 3.6.x < 3.6.6 Remote Security Bypass
  2733. McAfee ePolicy Orchestrator Installed (credentialed check)
  2734. McAfee ePO Extension for McAfee Agent Blind SQL Injection
  2735. HP Data Protector Components Version Detection
  2736. Nuance PDF Reader pdfcore8.dll Heap Buffer Overflow
  2737. ModSecurity Version
  2738. ModSecurity < 2.1.1 POST Data Null Byte Filter Bypass
  2739. ModSecurity < 2.5.9 Multipart Request Header Name DoS
  2740. ModSecurity < 2.7.0 Multipart Request Parsing Filter Bypass
  2741. ModSecurity < 2.7.3 XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
  2742. ModSecurity < 2.7.4 forceRequestBodyVariable Action Handling DoS
  2743. IBM Lotus Domino 8.5.x < 8.5.3 FP 4 Multiple Vulnerabilities
  2744. Citrix Web Interface 5.x < 5.4 Unspecified XSS
  2745. Citrix AGEE Logon Portal Unspecified XSS
  2746. SCTP Reverse Shell
  2747. NSA hacking Chinese: it's self defense
  2748. Incomplete Thought: In-Line Security Devices & the Fallacies Of Block Mode
  2749. Is your modem secure? | Security Spread
  2750. Blind SQL Injection – What is it Good For? | WhiteHat Security Blog
  2751. ISC Diary | HP iLO3/iLO4 Remote Unauthorized Access with Single-Sign-On
  2752. BeEF - The Browser Exploitation Framework Blog: Cross-domain communication with a JSP shell from a browser hooked with BeEF
  2753. The Problem With Networks ..... - SpiderLabs Anterior
  2754. Two malware programs help each other stay on computers
  2755. MIT researchers can see through walls using 'Wi-Vi'
  2756. Hackers in Africa are building their own aircraft
  2757. Microsoft pulls security update over software conflicts
  2758. With BlackBerry reportedly hacked, is anything secure?
  2759. Opera network cracked
  2760. 3 Stupid Corporation Tricks
  2761. Surrendering The Endpoint
  2762. PCI DSS Indicators Report
  2763. IT-Grundschutz BSI-100-2 Report Template
  2764. Vulnerabilities Over 30 Days Report
  2765. Vulnerabilities Over 30 Days Dashboard
  2766. IT-Grundschutz BSI-100-2 Dashboard
  2767. HP Data Protector Detection
  2768. VxWorks Detection
  2769. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU Update)
  2770. Google Chrome < 27.0.1453.116 Flash Click-Jacking
  2771. Symantec Endpoint Protection Manager < 12.1 RU3 (SYM13-005)
  2772. Cisco Security Device Manager Detection
  2773. ComOS network equipment detection
  2774. Emerson telnet server detection
  2775. Lantronix SCADA device detection
  2776. Mozilla Thunderbird < 17.0.7 Multiple Vulnerabilities
  2777. RuggedCom Server Version Detection
  2778. SIEMENS telnet server detection
  2779. Dropbox Software Detection
  2780. Sybase EAServer 6.3.1 < Build 63107 / 6.2 < Build 62012 Multiple Vulnerabilities
  2781. Novell ZENworks Configuration Management < 11.2.3a Monthly Update 1 Multiple Vulnerabilities (credentialed check)
  2782. Novell ZENworks Control Center File Upload Remote Code Execution (intrusive check)
  2783. Novell ZENworks Configuration Console Login.jsp language Parameter XSS
  2784. Google SketchUp < 8.0.11752 MAC Pict Buffer Overflow
  2785. Google SketchUp < 13.0.3689 SKP Multiple Vulnerabilities
  2786. Symantec Endpoint Protection Manager < 12.1 RU3 (SYM13-005) (credentialed check)
  2787. Mac OS X : Java for Mac OS X 10.6 Update 16
  2788. Mac OS X : Java for OS X 2013-004
  2789. Google Chrome < 27.0.1453.116 Flash Click-Jacking
  2790. Apache Struts2 OGNL Expression Handling Double Evaluation Error Remote Command Execution
  2791. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU)
  2792. Gallery 3.0.x < 3.0.8 Multiple XSS
  2793. Apache Struts2 Crafted Parameter Arbitrary OGNL Expression Remote Command Execution
  2794. IBM Notes 8.x < 8.5.3 IF4 HF2 / 9.x < 9.0 IF2 Code Execution
  2795. IBM Notes 8.5 < 8.5.3 IF4 HF2 / 9.0 < 9.0 IF2 Password Disclosure
  2796. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU) (Unix)
  2797. Post-Scan Rules Application
  2798. FreeBSD : phpMyAdmin -- Global variable scope injection (1b93f6fe-e1c1-11e2-948d-6805ca0b3d42)
  2799. San Cristóbal La Fuerza: Off-The-Radar Cigar
  2800. “Smoked Up” No.24
  2801. Arturo Fuente Don Carlos Lancero
  2802. Monte Pascoal Robusto
  2803. Cigar Tip: The Stogie Guys Guide to Summer
  2804. Whisky Review: Caol Ila 18 Year Old
  2805. Tastes and Flavors of Cigars
  2806. Top 10 Cigars Tips - Do's and Don'ts For Cigar...
  2807. Best Cigars For Weddings
  2808. Top 5 Cigars for Beginners - Buying Beginner...
  2809. Cigar Review: Leccia Tobacco Black
  2810. Cigar Review: Ditka Throwback by Camacho Cigars
  2811. Do you cover up your webcam?
  2812. Security issue in iOS Personal Hotspot
  2813. Sometimes, The PenTest Gods Shine On You - SpiderLabs Anterior
  2814. Critical Update Plugs 40 Security Holes in Java
  2815. Texas becomes first US state to ban warrantless email snooping
  2816. Beware Of HTML5 Development Risks
  2817. Security Needs More Designers, Not Architects
  2818. Wi-Fi Alliance launches 802.11ac certification program
  2819. EMET 4.0 is now available for download, (Tue, Jun 18th)
  2820. Wall Street To Host A Simulated Cyber War
  2821. DHS warns of vulns in hospital medical equipment
  2822. Compliance Is Bad for Security
  2823. The Value of a Hacked Email Account — Krebs on Security
  2824. OpenSSL < 0.9.8y / 1.0.1d / 1.0.0k Multiple Vulnerabilities
  2825. Adobe AIR <= Memory Corruption (APSB13-16)
  2826. Flash Player <= / 11.7.700.202 Memory Corruption (APSB13-16)
  2827. OID parsing
  2828. OID parsing
  2829. SIEMENS telnet server detection
  2830. Google Chrome for iOS < 26.0.1410.53 Multiple Vulnerabilities
  2831. Desktop Application Vulnerability Report
  2832. Cisco Software Vulnerabilities
  2833. Enterprise Application Vulnerability Report
  2834. EMC Software Vulnerabilities
  2835. Oracle Software Vulnerabilities
  2836. IBM Software Vulnerabilities
  2837. HP Software Vulnerabilities
  2838. Desktop Application Vulnerability Dashboard
  2839. Cisco Software Vulnerabilities
  2840. Enterprise Application Vulnerability Dashboard
  2841. EMC Software Vulnerabilities
  2842. Oracle Software Vulnerabilities
  2843. IBM Software Vulnerabilities
  2844. HP Software Vulnerabilities
  2845. XnView 2.x < 2.03 Multiple Buffer Overflow Vulnerabilities
  2846. Cisco Prime Network Control System Version
  2847. Cisco Prime Network Control System Default Credentials (cisco-sa-20130410-ncs)
  2848. Plone PloneFormGen Unspecified Arbitrary Code Execution
  2849. MS13-047: Cumulative Security Update for Internet Explorer (2838727)
  2850. MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229)
  2851. MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (2845690)
  2852. MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894)
  2853. MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571)
  2854. MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571) (Mac OS X)
  2855. MS KB2813430 : Update to Improve Cryptography and Digital Certificate Handling in Windows
  2856. MS KB2847928: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  2857. Adobe AIR <= Memory Corruption (APSB13-16)
  2858. Flash Player <= / 11.7.700.202 Memory Corruption (APSB13-16)
  2859. Adobe AIR for Mac <= Memory Corruption (APSB13-16)
  2860. Flash Player for Mac <= / 11.7.700.203 Memory Corruption (APSB13-16)
  2861. Microsoft Windows Kernel Win32k.sys PATHRECORD chain Multiple Vulnerabilities
  2862. JBoss Enterprise Portal Platform 5.2.2 Security Update (RHSA-2013-0141)
  2863. JBoss Enterprise Portal Platform GateIn Portal Security Update (RHSA-2013-0613)
  2864. Wireshark 1.6.x < 1.6.16 Multiple DoS Vulnerabilities
  2865. Wireshark 1.8.x < 1.8.8 Multiple Vulnerabilities
  2866. VMware vCenter Chargeback Manager Installed
  2867. VMware vCenter Chargeback Manager Remote Code Execution (VMSA-2013-0008)
  2868. Jenkins < 1.514 / 1.509.1 and Jenkins Enterprise 1.466.x / 1.480.x < 1.466.14.1 / 1.480.4.1 Multiple Vulnerabilities
  2869. VMware vCenter Update Manager Detection (credentialed)
  2870. VMware vCenter Update Manager Multiple Vulnerabilities (VMSA-2012-0013)
  2871. IPv6 Under Attack?
  2872. Guy Hacked His House To Have Its Own Twitter Feed
  2873. Microsoft Borks Botnet Takedown In Citadel Snafu
  2874. Android Trojans spread by Bluetooth, hijack bank codes
  2875. 12 Endpoint Security Myths Dispelled
  2876. Print Services Vulnerabilities
  2877. Operating System Vulnerabilities
  2878. Vulnerability Trending with Scanning, Sniffing and Logging
  2879. Enterprise Management Software Vulnerabilities
  2880. Network Service Vulnerabilities
  2881. Application Development Vulnerabilities
  2882. Media Player Vulnerability Dashboard
  2883. Database Software Vulnerabilities
  2884. Adobe Software Vulnerabilities
  2885. Print Services Vulnerability Report
  2886. Operating System Vulnerability Report
  2887. Enterprise Management Software Vulnerabilities
  2888. Network Service Vulnerabilities
  2889. Vulnerability Trending with Scanning, Sniffing and Logging
  2890. Application Development Vulnerabilities
  2891. Media Player Vulnerabilty Report
  2892. Database Software Vulnerabilities
  2893. Adobe Software Vulnerabilities
  2894. Apache Subversion < 1.8.0 / 1.7.10 / 1.6.23 Multiple Vulnerabilities
  2895. Eclipse IDE Software Detection
  2896. Mac OS X : Safari < 6.0.5 Multiple Security Vulnerabilities
  2897. Google Chrome < 27.0.1453.110 Multiple Vulnerabilities
  2898. Mac OS X 10.8 < 10.8.4 Multiple Vulnerabilities (Security Update 2013-002)
  2899. CAPWAP Protocol Client Detection
  2900. CAPWAP Protocol Detection
  2901. CAPWAP Protocol Server Detection
  2902. LWAPP Protocol Detection
  2903. PROMOTIC SCADA Server Detection
  2904. ISC BIND 9.6-ESV-R9 / 9.8.5 / 9.9.3 Remote Denial of Service Vulnerability
  2905. PHP < 5.4.16 / 5.3.26 Heap Based Buffer Overflow Vulnerability
  2906. IBM Websphere DataPower server detection
  2907. IrfanView FlashPix Plugin < 4.36 Summary Information Property Set Handling Integer Overflow
  2908. Oracle GlassFish Server 3.0.1 < / 3.1.2 < Multiple Vulnerabilities (April 2013 CPU)
  2909. CoDeSys Gateway Service < Use-After-Free
  2910. VMware vCenter Multiple Vulnerabilities (VMSA-2012-0013)
  2911. SAP Control SOAP Web Service Remote Code Execution (SAP Note 1414444)
  2912. Mac OS X 10.8 < 10.8.4 Multiple Vulnerabilities
  2913. Mac OS X Multiple Vulnerabilities (Security Update 2013-002)
  2914. Mac OS X : Safari < 6.0.5 Multiple Vulnerabilities
  2915. Trend Micro DirectPass < Multiple Vulnerabilities
  2916. VMware vCenter Server Multiple Vulnerabilities (VMSA-2012-0005)
  2917. Google Chrome < 27.0.1453.110 Multiple Vulnerabilities
  2918. Splunk 5.0.x < 5.0.3 Multiple Vulnerabilities
  2919. Mac OS X 10.7 / 10.8 Unauthorized File Access (remote check)
  2920. ISC BIND 9 Recursive Resolver Malformed Zone DoS
  2921. Siemens Solid Edge SEListCtrlX ActiveX Control SetItemReadOnly Method Memory Address Write Arbitrary Code Execution
  2922. Siemens Solid Edge WPHelper ActiveX Control OpenInEditor Method Arbitrary Command Execution
  2923. MediaWiki 1.19.x < 1.19.7 / 1.20.x < 1.20.6 Arbitrary File Upload
  2924. PHP 5.3.x < 5.3.26 Multiple Vulnerabilities
  2925. PHP 5.4.x < 5.4.16 Multiple Vulnerabilities
  2926. Plesk Panel Apache Arbitrary PHP Code Injection
  2927. SSL Null Cipher Suites Supported
  2928. HP Data Protector Multiple Vulnerabilities
  2929. Belarus Becomes World's Top Spammer
  2930. You Can Now Eat Your Passwords
  2931. Hackers Spawn Distributed Supercomputer On Way To Chess Record
  2932. IT departments won't exist in five years
  2933. How to see if your antivirus is actually working
  2934. GDS Blog - GDS Blog - Using Nessus to Audit VMware vSphere Configurations
  2935. There is no Onion – The Painful Reality of Defense in Depth
  2936. Bypassing internet filtering with Lahana
  2937. Counter-Strike? | CSO Blogs
  2938. De-ICE 1.40 LiveCD Hacking Challenge Released
  2939. 2012 Browser Security Comparative Analysis: Socially Engineered Malware | NSS Labs
  2940. Google researcher discloses zero-day exploit for Windows
  2941. LinkedIn aims to keep hackers out with two-factor login
  2942. How to Hack an iPhone With a USB Charger
  2943. Moving Safely From Detection To Automated Action
  2944. Nessus Website Screenshots Feature
  2945. Tenable Network Security: Tenable IT-Grundschutz BSI 100-2...
  2946. Tenable Network Security: DISA STIG AIX 6.1 Audit
  2947. HTTP 500 Detection (Client)
  2948. HTTP 4xx Detection (Client)
  2949. Squid 2.x / 3.x < 3.1.23 / 3.2.6 / cachemgr.cgi DoS
  2950. MS Skydrive 'Cloud' Backup Service Detection
  2951. Tridium SCADA Server Version Detection
  2952. SAP Netweaver Version Detection
  2953. Rockwell Automation RSBizWare Detection
  2954. Mitsubishi Electric Device Version Detection
  2955. LabView Remote Management Interface Detection
  2956. HTTP 500 Detection
  2957. Web Development Software Vulnerabilities
  2958. Security Software Vulnerabilities
  2959. Remote Access Vulnerability Report
  2960. Storage and Backup Vulnerability Report
  2961. Office Suite Vulnerabilities
  2962. Update Services Vulnerabilities Report
  2963. Virtual Computing Vulnerabilities
  2964. Web Browser Vulnerability Report
  2965. Web Technology Vulnerability Report
  2966. Web Development Software Vulnerabilities
  2967. Security Software Vulnerabilities
  2968. Remote Access Vulnerabilities
  2969. Storage and Backup Vulnerabilities
  2970. Office Suite Vulnerabilities
  2971. Update Services Vulnerabilities
  2972. Virtual Computing Vulnerabilities
  2973. Web Browser Vulnerabilities
  2974. Web Technology Vulnerabilites
  2975. Default Password (openvpnas) for 'root' Account
  2976. Skype for Windows < Multiple Vulnerabilities (uncredentialed check)
  2977. Skype < Multiple Vulnerabilities (credentialed check)
  2978. DotNetNuke 7.0.x < 7.0.6 Unspecified Modal Window XSS
  2979. IBM HTTP Server for z/OS 5.3.0 Command Execution
  2980. Mitsubishi MX Component ActiveX Remote Code Execution
  2981. Cisco IOS ISM Module for ISR G2 Authentication Header DoS
  2982. Nitro Pro <= Memory Corruption
  2983. Nitro Reader Installed
  2984. Nitro Reader <= Memory Corruption
  2985. Interview With A Blackhat (Part 1) | WhiteHat Security Blog
  2986. Sunera Information Security Blog: Download Multiple Nessus Reports via the Nessus XML-RPC API
  2987. Improving the security of your SSH private key files — Martin Kleppmann’s blog
  2988. A closer look at a recent privilege escalation bug in Linux (CVE-2013-2094) at time to bleed by Joe Damato
  2989. Log file vulnerability in Apache server
  2990. Google cuts grace period for vendors of vulnerable software
  2991. Hacking Firmware And Detecting Backdoors -- Dark Reading
  2992. Alert-driven vs Exploration-driven Security Analysis
  2993. PayPal denies teenager reward for finding website bug
  2994. US weapons system designs were reportedly viewed by Chinese hackers
  2995. Aha, I see you switched on your mobile Wi-Fi. YOU FOOL!
  2996. Security boffins say music could trigger mobile malware
  2997. Saved-game bug dumped PlayStation 3 fans in hijackers' sights
  2998. US power grid the target of 'numerous and daily' cyber-attacks • The Register
  2999. PayPal vulnerable to cross-site scripting again
  3000. Apache Tomcat 6.0.x < 6.0.37 Multiple Vulnerabilities
  3001. Apache Tomcat 7.0.x < 7.0.40 Information Disclosure
  3002. Mutiny < 5.0-1.11 Multiple Directory Traversals
  3003. Google Chrome < 27.0.1453.93 Multiple Vulnerabilities
  3004. Cisco Device Web Configuration Detection
  3005. Cisco Device Web Configuration Detection
  3006. Simple Comtools Remote Management Interface Detection
  3007. TalkSwitch VoIP Server Detection
  3008. QuickTime < 7.7.4 Multiple Vulnerabilities (Windows)
  3009. RT: Request Tracker < 3.8.17 / 4.0.13 Multiple Vulnerabilities
  3010. MediaWiki Arbitrary File Upload Vulnerability
  3011. Outstanding Remediations Tracking
  3012. Common Application Vendor Vulnerabilities
  3013. Web Service Vulnerabilities
  3014. Outstanding Remediations Tracking
  3015. Common Application Vendor Vulnerabilities
  3016. Web Service Vulnerabilities
  3017. Adobe Reader Enabled in Browser (Internet Explorer)
  3018. Adobe Reader Enabled in Browser (Google Chrome)
  3019. Adobe Reader Enabled in Browser (Mozilla Firefox)
  3020. Adobe Reader Enabled in Browser (Opera)
  3021. Adobe ColdFusion Multiple Vulnerabilities (APSB13-03) (credentialed check)
  3022. DotNetNuke Language Flag Selector Culture XSS
  3023. PCI-DSS Indicators Dashboard
  3024. ISC BIND 9 Assertion Error Resource Record RDATA Query Parsing Remote DoS
  3025. ISC BIND 9 DNS RDATA Handling DoS
  3026. ISC BIND 9 DNS64 Handling DoS
  3027. ISC BIND 9 libdns Regular Expressions Handling DoS
  3028. Clorius Controls SCADA Information Disclosure
  3029. JouleTemp environmental server detection
  3030. PostgreSQL < 8.3.20 / 8.4.13 / 9.0.9 / 9.1.5 Multiple Vulnerabilities
  3031. Proficy Portal SCADA server detection
  3032. Microsoft Security Essentials < v4.2 Local Privilege Escalation Vulnerability
  3033. PostgreSQL < 8.3.19 / 8.4.12 / 9.0.8 / 9.1.4 Multiple Vulnerabilities
  3034. PostgreSQL < 8.4.11 / 9.0.7 / 9.1.3 Multiple Vulnerabilities
  3035. Digi Rabbit FTP Server Detection
  3036. Digi Rabbit HTTP Server Detection
  3037. Flash Player <= / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3038. Mozilla Thunderbird 17.x < 17.0.6 Multiple Vulnerabilities
  3039. Heatmiser server detection
  3040. iBoot Bar server detection
  3041. Mozilla Firefox 20.x <= 20 Multiple Vulnerabilities
  3042. OSMA Heating server detection
  3043. Sullair Econnect server detection
  3044. XControl Process Automation server detection
  3045. Adobe AIR <= Multiple Vulnerabilities (APSB13-11)
  3046. Adobe AIR <= Multiple Vulnerabilities (APSB13-14)
  3047. iTunes < 11.0.3 Multiple Vulnerabilities
  3048. Default Password (nsroot) for 'nsroot' Account
  3049. Citrix NetScaler Web Management Interface Default Administrator Credentials
  3050. e107 content_preset.php URI XSS
  3051. Clorius Controls ISC SCADA Detection
  3052. Clorius Controls ISC SCADA Information Disclosure
  3053. Adobe ColdFusion Authentication Bypass (APSB13-13)
  3054. Adobe ColdFusion Authentication Bypass (APSB13-13) (intrusive check)
  3055. Adobe ColdFusion Multiple Vulnerabilities (APSA13-03)
  3056. Adobe Acrobat < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15)
  3057. Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15)
  3058. Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15) (Mac OS X)
  3059. MS13-037: Cumulative Security Update for Internet Explorer (2829530)
  3060. MS13-038: Security Update for Internet Explorer (2847204)
  3061. MS13-039: Vulnerability in HTTP.sys Could Allow Denial of Service (2829254)
  3062. MS13-040: Vulnerabilities in .NET Framework Could Allow Spoofing (2836440)
  3063. MS13-041: Vulnerability in Lync Could Allow Remote Code Execution (2834695)
  3064. MS13-042: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2830397)
  3065. MS13-043: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2830399)
  3066. MS13-044: Vulnerability in Microsoft Visio Could Allow Information Disclosure (2834692)
  3067. Microsoft Windows Essentials Installed
  3068. MS13-045: Vulnerability in Windows Essentials Could Allow Information Disclosure (2813707)
  3069. MS13-046: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2840221)
  3070. MS KB2820197: Update Rollup for ActiveX Kill Bits
  3071. Microsoft Malicious Software Removal Tool Installed
  3072. MS Security Advisory 2846338: Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution
  3073. Adobe AIR <= Multiple Vulnerabilities (APSB13-14)
  3074. Flash Player <= / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3075. Adobe AIR for Mac <= Multiple Vulnerabilities (APSB13-14)
  3076. Flash Player for Mac <= / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3077. Mutiny < 5.0-1.11 Multiple Directory Traversals
  3078. iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)
  3079. iTunes < 11.0.3 Multiple Vulnerabilities (uncredentialed check)
  3080. iTunes < 11.0.3 Certificate Validation Vulnerability (Mac OS X)
  3081. HP-UX PHNE_42470 : s700_800 11.31 cumulative ARPA Transport patch
  3082. Juniper Junos SIP DoS (PSN-2013-04-911)
  3083. Juniper Junos Firewall Bypass DoS (PSN-2013-04-912)
  3084. Juniper Junos Proxy ARP DoS (PSN-2013-04-913)
  3085. Juniper Junos J-Web Remote Code Execution (PSN-2013-04-914)
  3086. Juniper Junos IPv6 Egress Filter DoS (PSN-2013-04-915)
  3087. Juniper Junos Invalid Ether-type DoS (PSN-2013-04-916)
  3088. Juniper Junos GRE DoS (PSN-2013-04-917)
  3089. Juniper Junos DNSSEC Validation DoS (PSN-2013-04-918)
  3090. CMS Hacking, A Look Into The ECCouncil Hack - Imperva Data Security Blog
  3091. Marco Ramilli's Blog: Firmware Hacking: The Samsung smart TV turn
  3092. The Difference Between a Vulnerability Assessment and a Penetration Test
  3093. How to hack an electric car-charging station
  3094. Security Risks of Too Much Security
  3095. ownCloud fixes critical security vulnerabilities
  3096. Catching hackers with virtual industrial plants
  3097. – Excercises To Learn Penetration Testing
  3098. Bluetooth-Controlled Door Lock
  3099. Opinion: No, the LulzSec hackers weren’t noble
  3100. Which browser is safest? The answer may surprise you
  3101. Five Things Every Organization Should Know about Detecting And
  3102. Sony hacking suspect smashes computers to get out of prosecution
  3103. CCTV shows speed of theft outside a London restaurant on MSN Video
  3104. U.S. government becomes ‘biggest buyer’ of malware
  3105. RTFM! NSA tome reveals THE TRUTH behind spooks on the web • The Register
  3106. Are you obligated to point out security flaws if you’re just hired for a small job? | Ars Technica
  3107. Building a low-end PC: Just say no | ZDNet
  3108. Microsoft Windows Wireless Network History
  3109. Microsoft Windows Wireless Network History
  3110. IBM solidDB Stored Procedure Call Remote Denial of Service
  3111. HP LaserJet Pro Printers Unauthorized Data Access (April 2013)
  3112. Exim with Dovecot use_shell Command Injection
  3113. IBM WebSphere Application Server 8.0 < Fix Pack 6 Multiple Vulnerabilities
  3114. IBM WebSphere Application Server 8.5 < Fix Pack 2 Multiple Vulnerabilities
  3115. Android Emulator Telnet Port on Remote Host
  3116. Android Emulator ADB Port on Remote Host
  3117. Joomla! 2.5.x < 2.5.10 / 3.0.x < 3.0.4 Multiple Vulnerabilities
  3118. MediaWiki 1.19.x < 1.19.6 / 1.20.x < 1.20.5 Multiple Vulnerabilities
  3119. nginx < 1.4.1 / 1.5.0 Stack Buffer Overflow Vulnerability
  3120. Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities
  3121. Apache CDorked backdoor detection
  3122. Citect SCADA client device detection
  3123. Citect SCADA device detection
  3124. National Instruments server detection
  3125. Flash Player <= / Multiple Vulnerabilities (APSB12-03)
  3126. Flash Player <= / Multiple Vulnerabilities (APSB12-05)
  3127. Flash Player <= / Multiple Memory Corruption Vulnerabilities (APSB12-07)
  3128. Flash Player <= / Object Confusion Vulnerability (APSB12-09)
  3129. ISC BIND 9 Cache Update Policy Deleted Domain Name Resolving Weakness
  3130. ISC BIND 9 Multiple Denial of Service Vulnerabilities
  3131. ISC BIND 9 Zero-Length RDATA Section Denial of Service / Information Disclosure
  3132. Introducing the Cigar Flavors Wheel
  3133. Review: Pinar Del Rio Reserva Superior Salomon | halfwheel
  3134. Commentary: Gold Star Smokes (Part VII)
  3135. Unique Cigars - List of Top Unique or Unusual Cigars
  3136. Oliva – Atlantic Cigar Company 15th Anniversary Diadema
  3137. Cigar Review: Asylum 13 6 x 80
  3138. 5 Ways to Use Your Cigar Bands
  3139. The <i>Economist</i> on Guantanamo
  3140. Security Lessons From Star Wars: Breach Response
  3141. The Onion and Breach Disclosure
  3142. Use These Secret NSA Google Search Tips to Become Your Own Spy Agency | Threat Level |
  3143. Panic Now
  3144. Bang With Friends on iPhone, Android
  3145. Quantifying Risk Tolerance
  3146. Hackers gain access to all .edu domains
  3147. BBC News - Working gun made with 3D printer
  3148. Twitter hack on the Onion makes for comedy gold - The Frontline - a blog from
  3149. National Republican Congressional Committee Website Hacked With Viagra Ads
  3150. Traffic From Syria Disappears From Internet
  3151. Use of 'honeywords' can expose password crackers
  3152. Software Summary
  3153. SANS Top 20 Report Template
  3154. Consolidation Report for Missing Patches
  3155. VLC Media Player < 2.0.6 ASF Demuxer Buffer Overflow
  3156. HP Intelligent Management Center < 5.2 E0401 Multiple Vulnerabilities
  3157. Webmin <= 1.580 Multiple Input-Validation Vulnerabilities
  3158. Lantronix SCADA device detection
  3159. Mozilla Firefox 7.0 Multiple Vulnerabilities
  3160. Mozilla Thunderbird 7.0 Multiple Vulnerabilities
  3161. Opto 22 SCADA device detection
  3162. Mozilla Firefox <= 11 Multiple Vulnerabilities
  3163. Mozilla SeaMonkey 2.x < 2.9.0 Multiple Vulnerabilities
  3164. Mozilla Thunderbird < 12 Multiple Vulnerabilities
  3165. Apache 2.2 < 2.2.17 Multiple Vulnerabilities
  3166. Clorius Controls SCADA device detection
  3167. Novell GroupWise Internet Agent Unsupported
  3168. op5 Monitor < 5.7.3 Multiple Vulnerabilities
  3169. IBM Tivoli Endpoint Manager Web Server Detection
  3170. IBM Tivoli Endpoint Manager Server < 8.2.1372 Multiple Vulnerabilities
  3171. Google Apps Directory Sync Detection (Windows)
  3172. Google Apps Directory Sync < 3.1.6 Weak Stored Credential Local Disclosure
  3173. HP Managed Printing Administration < 2.7.0 XSS
  3174. VMware Security Updates for vCenter Server (VMSA-2013-0006)
  3175. Unix Operating System on Extended Support
  3176. Patch Report
  3177. Novell iPrint Client < 5.90 Stack-Based Buffer Overflow
  3178. Juniper Junos Unspecified DoS (PSN-2013-01-818)
  3179. X Server Unauthenticated Access: Screenshot
  3180. Open IP ports let anyone track ships on Internet
  3181. Printers, routers used as bots in DDoS attacks
  3182. The 7 elements of a successful security awareness program
  3183. Smart-Meter Blackouts Risk To UK
  3184. Ultra-Hackable Google Glass Could Be A Security Nightmare
  3185. Warnings Of Poor Security In Surveillance Cams
  3186. Practical HTTP Host Header Attacks
  3187. Websites Harbor Fewer Flaws, But Most Have At Least One Serious Vulnerability
  3188. Another Hack, Another 50M Passwords – Time for SecureAuth IdP for the Enterprise
  3189. XSS Vulnerability in Cisco sub domain found by 14 Years Old security researcher
  3190. absorptions: Eavesdropping on a wireless keyboard
  3191. First BYOD, now BYON poses security challenge
  3192. Man accused of placing GPS device on victim's car before burglarizing her home
  3193. Serial Killer Hack Threat To Gas Pipes, Traffic Lights, Power Plants
  3194. MySQL Server 5.1.x < 5.1.68 Multiple Vulnerabilities
  3195. MySQL Server 5.1.x < 5.1.69 Multiple Vulnerabilities
  3196. MySQL Server 5.5.x < 5.5.30 yaSSL Buffer Overflow
  3197. MySQL Server 5.5.x < 5.5.31 Multiple Vulnerabilities
  3198. MySQL Server 5.6.x < 5.6.11 Multiple Vulnerabilities
  3199. Bing search string
  3200. Google search string
  3201. Siemens SCALANCE SCADA device detection
  3202. Siemens SCALANCE SCADA device detection
  3203. Siemens Simatic SCADA device detection
  3204. Vonage VoIP phone detection
  3205. Vonage VoIP phone detection
  3206. Yahoo search string
  3207. SANS Top 20 Dashboard
  3208. Plesk Horde Detection
  3209. Traffic Analyzer Plugin for WordPress ta_loaded.js.php aoid Parameter XSS
  3210. MySQL 5.1 < 5.1.69 Multiple Vulnerabilities
  3211. MySQL 5.5 < 5.5.31 Multiple Vulnerabilities
  3212. MySQL 5.6.x < 5.6.11 Multiple Vulnerabilities
  3213. JBoss Web Services Endpoint Enumeration
  3214. JBossWS Endpoint Uses Unsafe Encryption
  3215. MediaWiki 1.19 < 1.19.5 / 1.20 < 1.20.4 Multiple Vulnerabilities
  3216. Cisco IOS Generic Input/Output SNMP DoS
  3217. phpMyAdmin 3.5.x < 3.5.8 tbl_gis_visualization.php Multiple XSS
  3218. VLC < 2.0.6 ASF Demuxer Buffer Overflow
  3219. Puppet Unsafe YAML Unserialization
  3220. Puppet Multiple Vulnerabilities (2013/03/12)
  3221. D-Link DIR-645 getcfg.php Admin Password Disclosure
  3222. IBM Lotus Domino 8.5.x < 8.5.3 Multiple Vulnerabilities
  3223. IBM Lotus Domino 8.5.x Multiple Vulnerabilities
  3224. News: Internet Sales Tax Bill Poised to Hit Cigars Hard
  3225. Diamond Crown Julius Caeser Robusto
  3226. Cigar Review: Tatuaje Reserva J21
  3227. Cigar Review: Eddie Ortega Wild Bunch Dandy McCoy
  3228. Asylum 13 Fifty
  3229. Assessment Update: Tatuaje Anarchy
  3230. News: Leccia White Begins Shipping, Black Close Behind
  3231. Review: Viaje Friends and Family Le Joueur | halfwheel
  3232. Serial threat on the internet
  3233. Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys - Slashdot
  3234. Out of Your Password Minder - YouTube
  3235. Verizon Fingers China
  3236. TSA Tables Plan To Allow Knives On Planes
  3237. US Air Force beats off competition in NSA hacking fight • The Register
  3238. Twitter may introduce two-step authentication after recent hacking incidents
  3239. Adobe's first CSO sets security of hosted services as top priority
  3240. Self-Proclaimed LulzSec Leader Arrested In Australia
  3241. Australian police arrest senior member of LulzSec hacking group
  3242. Self-Proclaimed LulzSec Leader Arrested In Australia
  3243. Australia hacking 'leader' charged
  3244. 'Self-Proclaimed' Leader Of LulzSec Arrested
  3245. Australia charges man claiming to be LulzSec leader
  3246. Australian police arrest alleged leader of LulzSec hacking group
  3247. Australia charges man claiming to be LulzSec leader
  3248. The Problem of Redaction | Restricted Data
  3249. 10 tips to secure funding for a security program
  3250. Sitecom routers backdoor account
  3251. Oracle critical patch plugs 128 security vulns
  3252. CCE to NIST 800-53 Reports
  3253. CCI to NIST 800-53 Reports
  3254. CCE Mapping to NIST 800-53 Chapters
  3255. CCI Mapping to NIST 800-53 Chapters
  3256. Windows Password and Account Audits by Asset
  3257. Google Chrome OS detection
  3258. Google Chrome OS < 26.0.1410.57 Multiple Security Vulnerabilities
  3259. ABB RTU560 Substation Automation detection
  3260. EnergyICT RTU device detection
  3261. Indas Web Scada device detection
  3262. Moxa Scada device detection
  3263. SoftPLC Scada device detection
  3264. Mac OS X : Safari < 6.0.4 SVG File Handling Arbitrary Code Execution
  3265. Oracle Java JDK / JRE / SE Multiple Vulnerabilities (April 2013 CPU)
  3266. Windows 7/8 metadata download
  3267. Cerb Detection
  3268. Lenovo ThinkPad Bluetooth with Enhanced Data Rate Detection
  3269. Cerb Multiple Vulnerabilities
  3270. Lenovo ThinkPad Bluetooth with Enhanced Data Rate Arbitrary DLL Injection Code Execution Vulnerability
  3271. MantisBT 1.2.x < 1.2.14 adm_config_report.php Multiple Parameter XSS
  3272. Cisco AnyConnect Secure Mobility Client 2.x / 3.x < 3.1(3103) Host Scan Multiple Vulnerabilities
  3273. IBM Rational ClearQuest 7.1.x < Web Client XSS (credentialed check)
  3274. What is the Real Cost of Security?
  3275. Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail – ReadWrite
  3276. top-5-mistakes.jpg 800×4,068 pixels
  3277. When Offense and Defense Become One
  3278. Kali Linux review and a brief history of the BackTrack pentesting distro
  3279. iPhone Pen Testing Tools without Jailbreaking
  3280. Time To Dump Antivirus As Endpoint Protection?
  3281. Popular home routers contain critical security vulnerabilities
  3282. Twitter's recipe for security awareness
  3283. Microsoft Pulls Back Patch After Crashing PCs
  3284. Thousands Of WordPress Accounts Hit In Dictionary Attack
  3285. Air Force reclassification of cyber tools as weapons sparks speculation
  3286. Introduction to SecurityCenter Continuous View
  3287. CIS Linux and Unix Dashboard
  3288. CIS SUSE Summary
  3289. CIS RHEL Summary
  3290. CIS Linux and Unix Summary
  3291. Opera < 12.15 Multiple Vulnerabilities
  3292. Flash Player <= / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3293. Flash Player <= / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3294. Asterisk Multiple Vulnerabilities (AST-2013-001 / AST-2013-002 / AST-2013-003)
  3295. GE Cimplicity HMI/SCADA server detection
  3296. Squid 3.x < 3.2.9 / 3.3.3 strHdrAcptLangGetItem Malformed Accept-Language Denial of Service
  3297. Sophos Web Protection Detection
  3298. Sophos Web Protection Appliance patience.cgi id Parameter Directory Traversal
  3299. MS13-028: Security Update for Internet Explorer (2817183)
  3300. MS13-029: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)
  3301. MS13-030: Vulnerability in SharePoint Could Allow Information Disclosure (2827663)
  3302. MS13-031: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2813170)
  3303. MS13-032: Vulnerability in Active Directory Could Lead to Denial of Service (2830914)
  3304. MS13-033: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2820917)
  3305. MS13-034: Vulnerability in Microsoft Antimalware Client Could Allow Elevation of Privilege (2823482)
  3306. MS13-035: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2821818)
  3307. MS13-036: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2829996)
  3308. MS KB2833510: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3309. Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection Denial of Service Vulnerability (cisco-sa-20130327-cce)
  3310. Cisco IOS Software Internet Key Exchange Vulnerability (cisco-sa-20130327-ike)
  3311. Cisco IOS Software IP Service Level Agreement Vulnerability (cisco-sa-20130327-ipsla)
  3312. Cisco IOS Software Network Address Translation Vulnerability (cisco-sa-20130327-nat)
  3313. Cisco IOS Software Protocol Translation Vulnerability (cisco-sa-20130327-pt)
  3314. Cisco IOS Software Resource Reservation Protocol Denial of Service Vulnerability (cisco-sa-20130327-rsvp)
  3315. Cisco IOS Software Smart Install Denial of Service Vulnerability (cisco-sa-20130327-smartinstall)
  3316. IBM InfoSphere Data Replication Dashboard Detection
  3317. IBM InfoSphere Data Replication Dashboard Default Credentials
  3318. IBM InfoSphere Data Replication Dashboard User Enumeration
  3319. IBM InfoSphere Data Replication Dashboard Unpassworded User Enumeration
  3320. Asterisk SIP SDP Buffer Overflow (AST-2013-001)
  3321. Asterisk HTTP Content-Length Header DoS (AST-2013-002)
  3322. Asterisk SIP Channel Driver Username Disclosure (AST-2013-003)
  3323. MediaWiki 1.19 < 1.19.4 / 1.20 < 1.20.3 Multiple Vulnerabilities
  3324. MediaWiki mwdoc-filter.php Arbitrary File Access
  3325. mnoGoSearch Detection
  3326. mnoGoSearch search.cgi QUERY_STRING Parameter Parsing Arbitrary File Access
  3327. Adobe AIR 3.x <= Multiple Vulnerabilities (APSB13-11)
  3328. Flash Player <= / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3329. Adobe AIR for Mac 3.x <= Multiple Vulnerabilities (APSB13-11)
  3330. Flash Player for Mac <= / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3331. Shockwave Player <= Multiple Vulnerabilities (APSB13-12)
  3332. MongoDB Detection
  3333. MongoDB Web Interface Detection
  3334. Novell Identity Manager Role Based Provisioning Module Detection
  3335. Novell Identity Manager Role Based Provisioning Module Unspecified Vulnerability
  3336. Citrix Access Gateway Administrative Web Interface Default Credentials
  3337. Citrix Access Gateway User Web Interface Detection
  3338. Citrix Access Gateway 5.x < Unspecified Security Bypass
  3339. A Sweet Script to Dump Keys from Wlan Profiles - Post Exploitation (or Regular Use)
  3340. Hacker’s Guide to Stay out of Jail 2: Do’s and Don’ts
  3341. Anatomy of an exploit - Linksys router remote password change hole
  3342. Is Education Key to Closing the Door on Hackers?
  3343. U.S. Air Force designates six cyber tools as weapons
  3344. Porn Sites Pose Growing Malware Risk
  3345. Hackers could start abusing electric car chargers to cripple the grid, researcher says
  3346. Vulnerabilities in aircraft systems allow remote airplane hijacking, researcher says
  3347. SSH an ill-managed mess says SSH author Tatu Ylonen
  3348. Exploits By Platform
  3349. FIX client LOGON detection
  3350. FIX client PGP LOGON detection
  3351. FIX Server Detection
  3352. FIX Server LOGON detection
  3353. Varnish Cache Detection
  3354. PostgreSQL < 8.3.23 / 8.4.16 / 9.0.12 / 9.1.8 / 9.2.3 Denial of Service
  3355. PostgreSQL < 8.3.23 Multiple Vulnerabilities
  3356. PostgreSQL < 8.4.17 Multiple Vulnerabilities
  3357. PostgreSQL < 9.0.13 Multiple Vulnerabilities
  3358. PostgreSQL < 9.1.9 / 9.2.4 Multiple Vulnerabilities
  3359. Gallery Detection
  3360. Gallery < 3.0.5 Multiple Vulnerabilities
  3361. Piwigo Detection
  3362. Piwigo install.php dl Parameter Traversal Arbitrary File Access
  3363. Core FTP < 2.2 build 1769 Multiple Buffer Overflows
  3364. Microsoft Windows Portable Devices
  3365. VNC Server Unencrypted Communication Detection
  3366. Default Password (facepunch) for 'chronos' Account
  3367. Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3368. Firefox 19.x Multiple Vulnerabilities (Mac OS X)
  3369. Thunderbird 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3370. Thunderbird ESR 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3371. Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities
  3372. Firefox 19.x Multiple Vulnerabilities
  3373. Mozilla Thunderbird 17.x < 17.0.5 Multiple Vulnerabilities
  3374. Mozilla Thunderbird ESR 17.x < 17.0.5 Multiple Vulnerabilities
  3375. SeaMonkey 2.16.x Multiple Vulnerabilities
  3376. AMI Firmware Source Code, Private Key Leaked | threatpost
  3377. Command Injection Tips: Leveraging Command-line Kung Fu with nslookup
  3378. Bitcoin-mining malware enslaves computers
  3379. Veracode Predicts Rise of "Everyday Hacker"
  3380. Parking Ticket Firm Exposes Private Information
  3381. Fake Twitter Followers Becomes Multimillion Dollar Business
  3382. Upgrading a router with impeccable soldering skills
  3383. How to Dress Like a Cyber Warrior OR Looking Like a Tier-Zero Hero
  3384. How Attackers Choose Which Vulnerabilities To Exploit
  3385. 'Arrested Development' to debut on Netflix on May 26
  3386. Advanced Persistent Threats get more advanced, persistent and threatening
  3387. Report: Nearly 94% Of Endpoints Running Java Are Vulnerable To Exploit | Security Bistro
  3388. Cisco IOS Patching: Defense and Offense | Didier Stevens
  3389. RaiderSec: Introducing dumpmon: A Twitter-bot that Monitors Paste-Sites for Account/Database Dumps and Other Interesting Content
  3390. Passpat - DigiNinja
  3391. Cybersh** just got real
  3392. Many Amazon S3 cloud storage users are exposing sensitive company secrets, claims report |
  3393. » Blog Archive » Windows Hardening Guide
  3394. Digital cameras easily turned into spying devices, researchers prove
  3395. Three reasons you shouldn't neglect your application security
  3396. Got Attitude?
  3397. Thousands of paroled CA sex offenders, felons easily disable GPS monitors
  3398. Brace for more mega-DDoS attacks, security experts warn
  3399. Samba 4.x < 4.0.4 AD DC File Permissions
  3400. RealPlayer for Mac < Heap Buffer Overflow Vulnerability
  3401. RealPlayer for Windows < Heap Buffer Overflow Vulnerability
  3402. GLBA Malicious Code Prevention Compliance
  3403. Novell Messenger Client Detection (Mac OS X)
  3404. Novell Messenger Client Detection
  3405. Novell Messenger Client Import Command Remote Code Execution
  3406. Apple OS X Profile Manager Device Management Private Interface Managed Device Enumeration
  3407. Eye-Fi Helper Detection
  3408. Eye-Fi Helper < 3.4.23 Directory Traversal
  3409. Stunnel Detection
  3410. Stunnel 4.21 - 4.54 Multiple Vulnerabilities
  3411. Google Chrome < 26.0.1410.43 Multiple Vulnerabilities
  3412. MS KB2819682: Security Updates for Microsoft Windows Store Applications
  3413. Viscosity VPN Client Detection (Mac OS X)
  3414. Viscosity ViscosityHelper Symlink Attack Local Privilege Escalation
  3415. Viscosity VPN Client Detection
  3416. Git Repository Served by Web Server
  3417. Patch Management: Tivoli Endpoint Manager Get Installed Packages
  3418. GD Star Rating Plugin for WordPress export.php Authentication Bypass Information Disclosure
  3419. MariaDB 5.5 < 5.5.28 Multiple Vulnerabilities
  3420. MariaDB 5.5 < 5.5.30 Multiple Vulnerabilities
  3421. MySQL 5.1 < 5.1.68 Multiple Vulnerabilities
  3422. MySQL 5.5 < 5.5.30 yaSSL Buffer Overflow
  3423. VMSA-2013-0004 : VMware ESXi security update for third party library
  3424. ISC BIND 9 libdns Regular Expression Handling DoS
  3425. McAfee Vulnerability Manager Detect
  3426. McAfee Vulnerability Manager cert_cn Parameter XSS
  3427. Oracle Java JRE Universally Enabled
  3428. Oracle Java JRE Enabled (Google Chrome)
  3429. Oracle Java JRE Enabled (Mozilla Firefox)
  3430. Oracle Java JRE Enabled (Opera)
  3431. Oracle Java JRE Enabled (Internet Explorer)
  3432. Ubuntu low-mem install for VMs
  3433. Passcode lock can be bypassed in iOS 6.1.3 as well
  3434. Remember Your Helmet
  3435. Critical Flaw Threatens Millions of BIND Servers
  3436. Too Scared To Scan
  3437. Oz states count cars using Bluetooth
  3438. Network security study reveals 26,000 undetected malware samples
  3439. Whoops! Tiny Bug In NetBSD 6.0 Code Ruins SSH Crypto Keys
  3440. Security-Bug Rating System Gets A Makeover
  3441. Securosis Blog | Identifying vs. Understanding Your Adversaries
  3442. The World Has No Room For Cowards — Krebs on Security
  3443. A Penetration Tester's Pledge
  3444. T-Mobile Wi-Fi Calling Security Analysis
  3445. Cisco switches to weaker hashing scheme, passwords cracked wide open | Ars Technica
  3446. Spy-Pi: Do you trust your laptop docking stations?
  3447. Detection of FTP client over non-standard port
  3448. Apple iOS < 6.1.3 Multiple Vulnerabilities
  3449. GLBA Section 501 (b) Host Configuration Auditing Compliance
  3450. Windows Wireless SSID Detection
  3451. GLBA Malicious Code Prevention
  3452. Samsung Kies < Multiple ActiveX Control Vulnerabilities
  3453. Foxit Advanced PDF Editor Installed
  3454. Foxit Advanced PDF Editor 3.x < Security Cookie Stack-based Buffer Overflow
  3455. PHP-Fusion Authenticate.class.php Multiple Cookie SQL Injection
  3456. PHP-Fusion forum/viewthread.php highlight Parameter XSS
  3457. HP LaserJet Pro Printers Unauthorized Data Access
  3458. RealPlayer for Windows < MP4 Heap-Based Buffer Overflow
  3459. Unsupported Novell NetWare Operating System
  3460. Apple iOS < 6.1.3 Multiple Vulnerabilities
  3461. Honeywell Multiple Products HscRemoteDepoy.dll ActiveX Control Arbitrary Code Execution
  3462. ClamAV < 0.97.7 Multiple Vulnerabilities
  3463. Foscam Detection
  3464. Foscam 11.37.2.x < Directory Traversal
  3465. We’re All Weev Now!
  3466. Botnet Business Booming - Dark Reading
  3467. 300 UK domains pilfered, massive security lapse blamed
  3468. US military boffins seek bulletproof Wi-Fi network - IT News from
  3469. Would a 3D-printed gun really be legal?
  3470. Researcher sets up illegal 420,000 node botnet for IPv4 internet map
  3471. Cisco slip puts hardware at risk
  3472. HIPAA 45 CFR 164.308 and 312 Summary
  3473. HIPAA Monitoring Report
  3474. Microsoft Windows Unquoted Service Path Enumeration
  3475. Indicators
  3476. HIPAA Monitoring Summary
  3477. HIPAA Monitoring
  3478. Wipe the drive! Stealthy Malware Persistence - Part 2, (Thu, Mar 14th)
  3479. Security Appliances Are Riddled with Serious Vulnerabilities, Researcher Says -
  3480. Schneier on Security: Security Theater on the Wells Fargo Website
  3481. Virtual Patching Cheat Sheet - OWASP
  3482. North Korea's Internet returns after 36-hour outage
  3483. Honeypot for phony waterworks gets hammered on Internet
  3484. CCTV hack takes casino for $33 MILLION in poker losses
  3485. Google, Mozilla, and Apple made the most vulnerable software of 2012
  3486. Reuters staffer accused of aiding hackers
  3487. Huawei 3G/4G USB sticks put users' security at risk
  3488. Skype can be intercepted by intelligence agencies
  3489. U.S. National Vulnerability Database Hacked
  3490. Apple not ready to kill OS X Snow Leopard yet
  3491. Tenable Network Security: MSCM Microsoft Server 2012 Domain...
  3492. Tenable Network Security: Tenable CIS Microsoft Internet Explorer...
  3493. Tenable Network Security: CIS Microsoft Windows Server 2012...
  3494. Tenable CSO praises APT1 report as a standard for information sharing
  3495. PHP 5.4.x < 5.4.12 Multiple Vulnerabilities
  3496. Flash Player <= / 11.6.602.171 Multiple Vulnerabilities (APSB13-09)
  3497. Google Chrome < 25.0.1364.160 WebKit Type Confusion Code Execution
  3498. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3499. Mac OS X : Safari < 6.0.3 Multiple Vulnerabilities
  3500. Apt Updater Detection
  3501. CoDeSys Gateway Service Detection (SCADA)
  3502. CoDeSys Gateway Service Failed Login Detection (SCADA)
  3503. CoDeSys Gateway Service Unprotected (SCADA)
  3504. Mac OS X 10.8 < 10.8.3 Multiple Vulnerabilities (Security Update 2013-001)
  3505. PHP 5.3.x < 5.3.22 Multiple Vulnerabilities
  3506. PHP 5.4.x < 5.4.12 Multiple Vulnerabilities
  3507. airVision NVR path Parameter Traversal Arbitrary File Access
  3508. LogAnalyzer asktheoracle.php query Parameter XSS
  3509. Scrutinizer < 10.1.2 Multiple Vulnerabilities
  3510. KSplice : Installed Patches
  3511. Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution
  3512. Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution
  3513. Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution
  3514. Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution
  3515. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3516. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3517. Jenkins Detection
  3518. Jenkins < 1.498 / 1.480.2 Unspecified Master Cryptographic Key Information Disclosure
  3519. Jenkins < 1.502 / 1.480.3 Multiple Vulnerabilities
  3520. Insecure Windows Service Permissions
  3521. Foswiki Detection
  3522. Foswiki < 1.1.8 MAKETEXT Macro Arbitrary Code Injection
  3523. Ruby ftpd Gem filename Parameter Remote Command Execution
  3524. Malicious Process Detection: User Defined Malware Running
  3525. PDF-XChange Viewer < 2.5 Build 208 JPEG Processing Buffer Overflow
  3526. Novell ZENworks Mobile Management Detection
  3527. Novell ZENworks Mobile Management MDM.php Local File Inclusion
  3528. IBM Data Studio Detection
  3529. IBM Data Studio 3.1 / 3.1.1 Help System Multiple Vulnerabilities
  3530. EXCLUSIVE: Hacked ABC website likely breached by crooks in 2011 | Risky Business
  3531. Secure Development: Must-Do Or Money Pit?
  3532. Hot security skills of 2013 - PC Advisor
  3533. Yahoo Mail Users Still Getting Hacked Despite Vulnerability Fixes : The Droid Guy
  3534. Security cameras continue to pose snooping risk - IT News from
  3535. Al Qaeda Document on Avoiding Drone Strikes
  3536. D-Link fixes router vulnerabilities very quietly
  3537. Tenable Network Security Named as SC Magazine's 2013 Excellence Award Winner for Best Enterprise Security Solution
  3538. Tenable Network Security Selects Ingram Micro as U.S. Distribution Partner
  3539. Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow (SCADA)
  3540. Ecava IntegraXor Server Login Attempt (SCADA)
  3541. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1)
  3542. Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilites
  3543. Apache 2.4 < 2.4.4 Multiple Cross-Site Scripting Vulnerabilites
  3544. Windows Update Detection
  3545. Detection of User Login
  3546. Flash Player <= / 11.6.602.168 Multiple Vulnerabilities (APSB13-08)
  3547. TWiki < 5.1.4 MAKETEXT Variable Tilde Character Command Injection
  3548. Bugzilla < 3.6.13 / 4.0.10 / 4.2.5 / 4.4rc2 Multiple Vulnerabilities
  3549. Bugzilla show_bug.cgi id Parameter XSS
  3550. Apache 2.4 < 2.4.4 Multiple Cross-Site Scripting Vulnerabilities
  3551. WordPress Poll Plugin poll_id Parameter SQL Injection
  3552. WP Symposium Plugin for WordPress symposium_groups_functions.php gid Parameter SQL Injection
  3553. Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities
  3554. Buffalo LinkStation Detection
  3555. Buffalo LinkStation Direct Request Remote File Disclosure
  3556. Flash Player <= / 11.6.602.168 Multiple Vulnerabilities (APSB13-08)
  3557. Flash Player for Mac <= / 11.6.602.167 Multiple Vulnerabilities (APSB13-08)
  3558. MS KB2819372: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3559. VMware Fusion 4.1 < 4.1.4 / 5.0 < 5.0.2 VMCI Privilege Escalation (VMSA-2013-0002)
  3560. VMware View 4.x < 4.6.2 / 5.x < 5.1.2 VMCI Privilege Escalation (VMSA-2013-0002)
  3561. VMware Workstation 8.x < 8.0.5 / 9.x < 9.0.1 VMCI Privilege Escalation (VMSA-2013-0002)
  3562. SSHD libkeyutils Backdoor
  3563. MoinMoin < 1.9.6 Multiple Vulnerabilities
  3564. MoinMoin rsslink() Function page_name Parameter XSS
  3565. MariaDB 5.1 < 5.1.67 Multiple Vulnerabilities
  3566. MariaDB 5.2 < 5.2.14 Multiple Vulnerabilities
  3567. MariaDB 5.3 < 5.3.12 Multiple Vulnerabilities
  3568. MariaDB 5.5 < 5.5.29 Multiple Vulnerabilities
  3569. MyBB < 1.6.9 Multiple Vulnerabilities
  3570. Nuance PDF Reader Installed
  3571. Nuance PDF Viewer Plus Installed
  3572. Drupal 7.x < 7.20 On-Demand Image Derivative Generation Handling Resource Exhaustion DoS
  3573. W3 Total Cache Plugin for WordPress Cache File Direct Request Information Disclosure
  3574. A Vulnerability Disclosure Game Changer - Dark Reading
  3575. Banged-up Brit hacker hacks into his OWN PRISON'S MAINFRAME
  3576. Sinkholes reveal more Chinese-hacked biz - and piggybacking crims • The Register
  3577. Latest Java Zero-Day Shares Connections with Bit9 Security Incident | Symantec Connect Community
  3578. HTML5 Web Storage loophole can be abused to fill hard disks with junk data
  3579. How I Hacked Facebook OAuth To Get Full Permission On Any Facebook Account (Without App "Allow" Interaction) | Nir Goldshlager Web Application Security Blog
  3580. ISC Diary | SSHD rootkit in the wild
  3581. 2 More Java Zero-Day Vulnerabilities Emerge
  3582. RSA: Lawyers eschew "self-defence" hacking - IT News from
  3583. Black hat greed reducing software vulnerability report rate
  3584. Vint Cerf: 'The internet of things needs to be locked down'
  3585. Why Patching Your Software Matters!
  3586. Anonymous leaks 'Bank of America secrets' in spy revenge hack • The Register
  3587. PostgreSQL 8.3 < 8.3.23 / 8.4 < 8.4.16 / 9.0 < 9.0.12 / 9.1 < 9.1.8 / 9.2 < 9.2.3 Denial of Service
  3588. Pidgin < 2.10.7 Multiple Vulnerabilities
  3589. Siemens SIMATIC RF-MANAGER Detection
  3590. Siemens SIMATIC RF-MANAGER KeyHelp.ocx Buffer Overflow
  3591. Prizm Content Connect default.aspx document Parameter Remote File Inclusion
  3592. ImpressPages cm_group Parameter Remote PHP Code Execution
  3593. Malicious Process Detection: APT1 Software Running
  3594. APT1-Related SSL Certificate Detected
  3595. Adobe ColdFusion Authentication Bypass (APSB13-03)
  3596. Nagios XI 2011R1.9 Multiple SQL Injection Vulnerabilities
  3597. Mac OS X : Java for Mac OS X 10.6 Update 13
  3598. Mac OS X : Java for OS X 2013-001
  3599. EMC Data Protection Advisor CXML Service Detection
  3600. EMC Data Protection Advisor Web UI Detection
  3601. EMC Data Protection Advisor Web UI Directory Traversal
  3602. Oracle Application Express (Apex) Detection
  3603. Oracle Application Express (Apex) Version Detection
  3604. Oracle Application Express (Apex) Administration Interface is Accessible
  3605. Oracle Application Express (Apex) CVE-2008-4005
  3606. Oracle Application Express (Apex) CVE-2009-0981
  3607. Oracle Application Express (Apex) CVE-2009-1993
  3608. Oracle Application Express (Apex) CVE-2010-0892
  3609. Oracle Application Express (Apex) CVE-2010-0076
  3610. Oracle Application Express (Apex) CVE-2011-3525
  3611. Oracle Application Express (Apex) CVE-2012-1708
  3612. Oracle Application Express (Apex) Unspecified Issues (pre 2.2.1)
  3613. Oracle Application Express (Apex) Unspecified Issues (pre 3.0.1)
  3614. Oracle Application Express (Apex) Unspecified Issues (pre 3.1)
  3615. Asterisk Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)
  3616. Firefox ESR 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3617. Firefox 18.x Multiple Vulnerabilities (Mac OS X)
  3618. Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3619. Thunderbird ESR 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3620. Firefox ESR 17.x < 17.0.3 Multiple Vulnerabilities
  3621. Firefox 18.x Multiple Vulnerabilities
  3622. Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities
  3623. Mozilla Thunderbird ESR 17.x < 17.0.3 Multiple Vulnerabilities
  3624. SeaMonkey 2.15.x Multiple Vulnerabilities
  3625. Microsoft SQL Server Unsupported Version Detection
  3626. Adobe Acrobat < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07)
  3627. Adobe Reader < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07)
  3628. Adobe Reader < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07) (Mac OS X)
  3629. Malicious Process Detection: Malware Signed By Stolen Bit9 Certificate
  3630. Cisco Prime LAN Management Solution Web Detection
  3631. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1)
  3632. VMSA-2013-0003 : VMware vCenter Server, ESXi and ESX address an NFC Protocol memory corruption and third party library security issues.
  3633. Google Chrome < 25.0.1364.97 Multiple Vulnerabilities
  3634. Terminal Services Use SSL/TLS
  3635. Oracle Java SE Multiple Vulnerabilities (Feb 2012 CPU) (Unix)
  3636. Oracle Java SE Multiple Vulnerabilities (June 2012 CPU) (Unix)
  3637. Oracle Java SE Multiple Vulnerabilities (October 2012 CPU) (Unix)
  3638. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU) (Unix)
  3639. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1) (Unix)
  3640. Symantec Encryption Desktop Detection
  3641. Symantec Encryption Desktop Local Access Elevation of Privilege Vulnerabilities
  3642. Siemens SIMATIC RF-MANAGER Detection (SCADA)
  3643. Asterisk Peer Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)
  3644. Mozilla Firefox 18.x <= 18 Multiple Vulnerabilities
  3645. Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities
  3646. Google Chrome < 25.0.1364.97 Multiple Vulnerabilities
  3647. SeaMonkey < 2.16 Multiple Vulnerabilities
  3648. mDNS Client Queries
  3649. MAC change detection (SNMP)
  3650. Nessus Configuration & Compliance Auditing
  3651. Tenable Network Security Receives 5-Star Rating from SC Magazine
  3652. More Wi-Fi devices with security holes
  3653. Attribution Delivers Questionable Security Value
  3654. VMware promises better security, considers scheduled patches
  3655. Rid yourself of Adobe: New Firefox 19.0 gets JAVASCRIPT PDF viewer
  3656. Twitter's Response To The Burger King Hacking: Do A Better Job At Protecting Your Password
  3657. BlackBerry warns of TIFF vulnerability that could allow malware to run on enterprise servers
  3658. Frosty attack on Android encryption
  3659. Security experts say zombie TV warning exposes flaws
  3660. Linux, Windows, and security FUD
  3661. MantisBT 1.2.x < 1.2.13 Multiple Vulnerabilities
  3662. MantisBT < 1.2.12 Multiple Vulnerabilities
  3663. Cisco ASA 5500 Series SSH Timeout DoS
  3664. Gallery Plugin for WordPress load Parameter Remote File Inclusion
  3665. php-Charts url.php Remote PHP Code Execution
  3666. VMware vSphere Client Memory Corruption (VMSA-2013-0001)
  3667. IBM Tivoli Storage Manager Client 6.3 < / 6.4 < Unauthorized Access
  3668. IBM Tivoli Storage Manager Client Denial of Service
  3669. MS13-009: Security Update for Internet Explorer (2792100)
  3670. MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2797052)
  3671. MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution (2780091)
  3672. MS13-013: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution (2784242)
  3673. MS13-014: Vulnerability in NFS Server Could Allow Denial of Service (2790978)
  3674. MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege (2800277)
  3675. MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778344)
  3676. MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2799494)
  3677. MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service (2790655)
  3678. MS13-019: Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege (2790113)
  3679. MS13-020: Vulnerability in OLE Automation Could Allow Remote Code Execution (2802968)
  3680. Netstat Connection Information
  3681. Adobe AIR 3.x <= Buffer Overflow (APSB13-05)
  3682. Flash Player <= / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3683. Flash Player <= / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3684. Adobe AIR for Mac 3.x <= Multiple Vulnerabilities (APSB13-05)
  3685. MS KB2805940: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3686. MS13-012: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2809279)
  3687. OpenSSL 1.0.1 < 1.0.1e Information Disclosure
  3688. Shockwave Player <= Multiple Vulnerabilities (APSB13-06)
  3689. Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow
  3690. HP LeftHand Virtual SAN Appliance < 10.0 hydra Service Multiple Remote Code Execution Vulnerabilities (version check)
  3691. Joomla! 2.5.x < 2.5.9 / 3.0.x < 3.0.3 Multiple Information Disclosure Vulnerabilities
  3692. VMSA-2013-0001 : VMware vSphere security updates for the authentication service and third party libraries
  3693. VMSA-2013-0002 : VMware ESX, Workstation, Fusion, and View VMCI privilege escalation vulnerability
  3694. Adobe Acrobat <= 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSA13-02)
  3695. Adobe Reader <= 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSA13-02)
  3696. Consumers support a federal cybersecurity policy, survey says
  3697. Americans Willing to Spend More to Thwart Cyber Attacks: Survey
  3698. Flash Player <= / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3699. Flash Player <= / 11.5.502.146 Multiple Vulnerabilities (APSB13-04)
  3700. 10 ways to reduce security headaches in a BYOD world
  3701. Document Metadata Cleaner strips personally identifiable metadata from your files
  3702. Unlocking Ma Bell: How Phone Phreaks Came To Be
  3703. It's Now Illegal to Unlock Your Cellphone - ABC News
  3704. Bizarre Google search bug benefits porn websites | Naked Security
  3705. Hacked US TV Channels report zombie apocalypse has begun
  3706. Two Jokers Social Engineer their way into the Superbowl
  3707. IOActive Labs Research: The Anatomy of Unsecure Configuration: Reality Bites
  3708. One in three PCs are infected with malware
  3709. Bit9 hacked after it forgot to install ITS OWN security product
  3710. 'Let anyone be administrator' bug in VMware snapped shut
  3711. Tenable Network Security: Windows Server 2012 Best Practice Audit...
  3712. Patch management in a world of IPv6 IT resources
  3713. Windows OS Version Information
  3714. Email Attachment Detection (client)
  3715. Barracuda Networks device detection
  3716. Barracuda Spam Firewall version detection
  3717. Oracle Java SE 7 <= Update 11 Multiple Vulnerabilities (February 2013 CPU)
  3718. Samba 3.x < 3.5.21 / 3.6.12 and 4.x < 4.0.2 SWAT Multiple Vulnerabilities
  3719. Apple TV < 5.2 Multiple Vulnerabilities
  3720. Ekiga < 4.0.0 Invalid UTF-8 Character Connection Data Parsing DoS
  3721. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU)
  3722. Samba < 3.5.21 / 3.6.12 / 4.0.2 SWAT Multiple Vulnerabilities
  3723. WordPress < 3.5.1 Multiple Vulnerabilities
  3724. WordPress xmlrpc.php Server-Side Request Forgery
  3725. Collector Component for Joomla! index.php File Upload Arbitrary Code Execution
  3726. Novell GroupWise Client 8.x < 8.0.3 Hot Patch 2 / 2012.x < 2012 SP1 Hot Patch 1 Multiple Vulnerabilities
  3727. Mac OS X : Java for Mac OS X 10.6 Update 12
  3728. HP Diagnostics Server Default Credentials
  3729. HP Data Protector Unsupported
  3730. Mac OS X : OS X Server < 2.2.1 Multiple Vulnerabilities
  3731. Hunt CCTV DVR.cfg Direct Request Information Disclosure
  3732. LogAnalyzer userchange.php viewid Parameter XSS
  3733. RuggedOS < 3.12.1 Web UI Multiple Security Vulnerabilities
  3734. Incapsula Component for Joomla! token Parameter Multiple XSS
  3735. UnrealIRCd Unspecified DoS
  3736. Anatomy of a bug – how Mac OS X chokes if you say “FILE” | Naked Security
  3737. 48th Largest Prime Number Discovered
  3738. Joy of Tech™: Vine
  3739. A Gift For Hackers [Video]
  3740. Federal Reserve confirms its Web site was hacked
  3741. Improve your security in four easy but rarely implemented steps
  3742. China is world's most malware-ridden nation
  3743. Critical bug threatens hospital systems
  3744. Tenable Network Security: DISA STIG Microsoft Windows 8 Audit
  3745. U.S. Navy sees 110K cyber attacks every hour: Tenable Network Security’s take on White House EO on cybersecurity
  3746. Apple iOS < 6.1 Multiple Vulnerabilities
  3747. Opera < 12.13 Multiple Vulnerabilities
  3748. Barracuda Appliances Default Credentials
  3749. GRAND Flash Album Gallery Plugin for WordPress f Parameter Traversal Arbitrary Directory Enumeration
  3750. Default Password (raspberry) for 'pi' Account
  3751. Default Password (openelec) for 'root' Account
  3752. Default Password (raspi) for 'root' Account
  3753. MySQL Protocol Remote User Enumeration
  3754. Uploader Plugin for WordPress File Upload Arbitrary Code Execution
  3755. Apple iOS < 6.1 Multiple Vulnerabilities
  3756. ViArt Shop sips_response.php DATA Parameter Request Parsing Remote Shell Command Execution
  3757. Patch Management Windows Auditing Conflicts
  3758. Patch Management Auditing Satisfied
  3759. Schneider Electric Interactive Graphical SCADA System dc.exe Unspecified Buffer Overflow
  3760. Schneider Electric Interactive Graphical SCADA System (IGSS) Unsupported Version
  3761. Opera < 12.13 Multiple Vulnerabilities
  3762. Wireshark 1.6.x < 1.6.13 Multiple Vulnerabilities
  3763. Wireshark 1.8.x < 1.8.5 Multiple Vulnerabilities
  3764. Cisco VPN Client Unsupported
  3765. Joomla! 2.5.x < 2.5.7 Multiple XSS
  3766. HP Communities - Twitter attacked - Catches, stops attack-in-progre... - Enterprise Business Community
  3767. 86,800 network printers open to the whole internet – is one of them yours? | Naked Security
  3768. The Physical Security Factor With Cloud Providers
  3769. Android malware uses your PC's own mic to record you
  3770. Oracle blocks security hole with quick, hot 'n' premature Java update
  3771. Suicidal Sensors: Darpa Wants Next-Gen Spy Hardware to Literally Dissolve | Danger Room |
  3772. VMware Management Interface - A Little Story of XSS
  3773. Hackers Hijacking Security Cameras for Malware and Spying
  3774. Web smut sites are SAFER than search engines, declares Cisco • The Register
  3775. Chinese hackers break into the New York Times, steal every employee’s password
  3776. Kali Linux – A Teaser into the Future.
  3777. Hacker 'sextorted' 350 women into stripping off after stealing embarrassing pictures
  3778. UPnP scan shows 50 million network devices open to packet attack • The Register
  3779. Great Firewall architects fingered for GitHub attack • The Register
  3780. Tenable Network Security: Tivoli Enterprise Manager Server and...
  3781. PSA: Don’t upload your important passwords to GitHub | Ars Technica
  3782. Scripts and Picks: Command Execution on Shoretel Mobility Router
  3783. RaiderSec: Wireless "Deauth" Attack using Aireplay-ng, Python, and Scapy
  3784. Hackers drop rogue Apache modules and SSH backdoors on web servers
  3785. Anons hack Asteroids into US DoJ website in Swartz death protest
  3786. 'Cyber 9/11' may be on horizon, Homeland Security chief warns
  3787. Oracle will continue to bundle 'crapware' with Java
  3788. Avoid the Landmine That is Hacking Back
  3789. Introduction to the Nessus Vulnerability Scanner
  3790. PHP 5.3.x < 5.3.21 cuRL X.509 Certificate Domain Name Matching MiTM Weakness
  3791. PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  3792. Google Chrome < 24.0.1312.56 Multiple Vulnerabilities
  3793. MySQL Server 5.1.x < 5.1.67 Multiple Vulnerabilities
  3794. MySQL Server 5.5.x < 5.5.29 Multiple Vulnerabilities
  3795. Windows 8 App Store Access
  3796. Windows 8 App Store Download Detected
  3797. Windows 8 Tile Services Detection
  3798. Horde IMP js/compose-dimp.js XSS
  3799. MoinMoin Traversal File Upload Arbitrary File Overwrite
  3800. Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities
  3801. MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) (uncredentialed check)
  3802. Cisco ASA 1000V H.323 Inspection DoS
  3803. Google Chrome < 24.0.1312.56 Multiple Vulnerabilities
  3804. Oracle VM VirtualBox Core Subcomponent < 4.0.18 / 4.1.24 / 4.2.6 Local Issue
  3805. VMware View Agent Detection
  3806. VMware View Server Detection
  3807. VMware View Server Unsupported Version Detection
  3808. VMware View Multiple Vulnerabilities (VMSA-2012-0004)
  3809. VMware View Server Directory Traversal Vulnerability (VMSA-2012-0017)
  3810. Samsung Kies SyncService ActiveX PrepareSync() Buffer Overflow
  3811. Google Doc Embedder Plugin for WordPress File Parameter Traversal Arbitrary File Disclosure
  3812. NetIQ Privileged User Manager regclnt.dll Directory Traversal
  3813. Adobe ColdFusion Unspecified DoS (APSB12-21) (credentialed check)
  3814. Adobe ColdFusion Unspecified Sandbox Bypass (APSB12-26) (credentialed check)
  3815. Drupal 6.x < 6.28 / 7.x < 7.19 Multiple Vulnerabilities
  3816. Floating Social Media Links Plugin for WordPress wpp Parameter Remote File Inclusion
  3817. WebYaST Host Modification MiTM
  3818. Portable phpMyAdmin Plugin for WordPress wp-pma-mod Authentication Bypass
  3819. Adobe ColdFusion 10 on IIS Unspecified DoS (APSB12-25) (credentialed check)
  3820. Browser Rejector Plugin for WordPress wppath Parameter Remote File Inclusion
  3821. Forums Plugin for WordPress url Parameter Arbitrary File Disclosure
  3822. Incentives and Decision Making
  3823. Apple's Skimpy Software Update Descriptions
  3824. Backdoors Found in Barracuda Networks Gear
  3825. How LinkedIn's "Hacker-In-Residence" Transformed An Ordinary Job Into A "Dream Job"
  3826. Computer firm hires Montreal student accused of hacking them
  3827. Twitter Flaw Exposes Direct Messages To Third-Party Applications
  3828. Exploiting printers via Jetdirect vulnerabilities – viaForensics
  3829. Is Dell looking to kill PCs with "Project Ophelia"?
  3830. Canadian Student Expelled After Finding Critical Flaw in Software Used by Colleges
  3831. What's lurking in your network? Find out by decrypting SSL
  3832. Bad parking job? Text the driver through the license plate
  3833. Linksys vuln: Cisco responds
  3834. 'End of passwords' predictions are premature - Cambridge boffin
  3835. Mozilla Firefox 17.x <= 17 Multiple Vulnerabilities
  3836. Mozilla SeaMonkey 2.x <= 2.14 Multiple Vulnerabilities
  3837. Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities
  3838. PCI Configuration Settings Report
  3839. 800-53 Configuration Auditing
  3840. DISA Control Correlation Identifier (CCI) Dashboard
  3841. PCI Configuration Settings
  3842. Firefox 10.x < 10.0.12 Multiple Vulnerabilities
  3843. Firefox 10.x < 10.0.12 Multiple Vulnerabilities (Mac OS X)
  3844. Firefox 17.x < 17.0.1 Multiple Vulnerabilities
  3845. Firefox 17.x < 17.0.1 Multiple Vulnerabilities (Mac OS X)
  3846. Firefox 17.x < 17.0.2 Multiple Vulnerabilities
  3847. Firefox 17.x < 17.0.2 Multiple Vulnerabilities (Mac OS X)
  3848. Firefox 17.x Multiple Vulnerabilities
  3849. Firefox 17.x Multiple Vulnerabilities (Mac OS X)
  3850. Mozilla Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities
  3851. Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities
  3852. SeaMonkey 2.14.x Multiple Vulnerabilities
  3853. Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities (Mac OS X)
  3854. Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities (Mac OS X)
  3855. Cerberus FTP Server < SSH DES Cipher Weakness
  3856. Cerberus FTP Server < Cross-Site Request Forgery
  3857. Cerberus FTP Server < Multiple XSS
  3858. Samba 4.x < 4.0.1 AD DC LDAP Directory Objects Security Bypass
  3859. Nagios Core history.cgi Multiple Parameter Buffer Overflow
  3860. MySQL 5.5 < 5.5.29 Multiple Vulnerabilities
  3861. Windows OS Partial Product Key (WMI)
  3862. Windows Product Key Retrieval
  3863. PHP 5.3.x < 5.3.21 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  3864. PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  3865. Oracle Database, January 2013 Critical Patch Update
  3866. Disable Java in your browsers now | usability | security | freedom
  3867. Whistleblower sheds light on global zero day exploit market
  3868. Security Researchers Expose Bug In Medical System Used With X-ray Machines, Other Devices
  3869. Microsoft vows to improve security tools after failed evaluation
  3870. Verizon Business Security Blog » Blog Archive » Case Study: Pro-active Log Review Might Be A Good Idea
  3871. China Mobile Users Warned About Large Botnet Threat
  3872. US Plants Hit By USB Stick Malware Attack
  3873. Bug Bounty ≈ Packet Storm
  3874. Homeland Security still advises disabling Java, even after update
  3875. Remote zero-day hole found in Linksys routers - Networking - Technology - News -
  3876. Hackers claim new air traffic system can be hijacked — RT
  3877. Juniper Junos J-Web URL Encoding Heap Buffer Overflow (PSN-2013-01-807)
  3878. Juniper Junos PIM Join Flood DoS (PSN-2013-01-808)
  3879. Oracle Java SE 7 < Update 11 Multiple Vulnerabilities
  3880. MS13-008: Security Update for Internet Explorer (2799329)
  3881. Happy Out of Cycle IE Patch Monday
  3882. AV “Really” dead now says security expert
  3883. All Your Base Are In an Indeterminate State - Dark Reading
  3884. Tenable Network Security: Windows and OS X SSID Reporting and...
  3885. Tracking Wireless SSIDs Using Nessus
  3886. VLC Media Player < 2.0.5 Multiple Vulnerabilities
  3887. Red Hat Satellite Server Communication Channel Detection - Server-Side
  3888. Google Chrome < 24.0.1312.52 Multiple Vulnerabilities
  3889. Oracle Java SE 7 <= Update 10 Remote Code Execution
  3890. Flash Player <= / 11.5.502.135 Buffer Overflow (APSB13-01)
  3891. NVIDIA Display Driver Service Remote Stack Buffer Overflow (credentialed check)
  3892. MS KB2796096: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3893. Adobe Acrobat < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02)
  3894. Adobe AIR 3.x <= Buffer Overflow (APSB13-01)
  3895. Adobe AIR for Mac 3.x <= Buffer Overflow (APSB13-01)
  3896. Adobe Reader < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02)
  3897. Adobe Reader < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02) (Mac OS X)
  3898. Flash Player <= / 11.5.502.135 Buffer Overflow (APSB13-01)
  3899. Flash Player for Mac <= / 11.5.502.136 Buffer Overflow (APSB13-01)
  3900. Fun with AIX Shellcode and Metasploit
  3901. Ipad Extra Screen
  3902. Carving Station – RAR Files | M-unition
  3903. What Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!, (Thu, Jan 10th)
  3904. $17,000 Linux-powered rifle brings “auto-aim” to the real world | Ars Technica
  3905. Does Your Company Actually Need a Security Department?
  3906. WordPress Pingback Portscanner – Metasploit Module
  3907. 2012: Over and Done With.
  3908. Airing Out Security's Dirty Laundry - Dark Reading
  3909. The merger of cellular and Wi-Fi: The wireless network's future
  3910. Your friendly Huawei at CES: Complete with uniformed security
  3911. 5 tough security questions (and tips on answering them)
  3912. Kill that Java plugin now! New 0-day exploit running wild online
  3913. SSL Certificate Chain Contains Illegitimate TURKTRUST Intermediate CA
  3914. Does Your Alarm Have a Default Duress Code?
  3915. Pointless observation on snow removal and InfoSec
  3916. Biggest Problem in Computer Security | ITauditSecurity
  3917. Top email terms used by corporate fraudsters published by FBI
  3918. Researcher sidesteps Microsoft fix for IE zero-day
  3919. Silent Skype calls can hide secret messages
  3920. Why Hackers Are So Much Funnier Than You Are
  3921. Flash Player <= / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  3922. iPhone App Install Detected
  3923. Opera < 12.12 Multiple Vulnerabilities
  3924. Netsuite Client Detection
  3925. Instagram Upload Activity Detected
  3926. Real Networks RealPlayer < Multiple Vulnerabilities
  3927. Flash Player <= / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  3928. MySQL Server 5.1 < 5.1.63 Multiple Vulnerabilities
  3929. Squid 2.x / 3.x < 3.1.22 / 3.2.4 / cachemgr.cgi DoS
  3930. Advanced Custom Fields Plugin for WordPress acf_abspath Parameter Remote File Inclusion
  3931. Citrix XenDesktop Virtual Desktop Agent USB Redirection Propagation Handling Access Restriction Bypass (CTX135813)
  3932. Drupal 6.x < 6.27 / 7.x < 7.18 Multiple Vulnerabilities
  3933. IBM Rational ClearQuest 7.1.x < Multiple Vulnerabilities (credentialed check)
  3934. VMSA-2012-0018 : VMware security updates for vCSA and ESXi
  3935. Snare Agent for Linux > 1.7.0 / 2.0.0 Multiple Vulnerabilities
  3936. Novell iPrint Client < 5.82 Remote Code Execution
  3937. Novell eDirectory 8.8.x Multiple Security Vulnerabilities
  3938. Citrix XenApp XML Service Interface Crafted Packet Parsing Remote Code Execution (CTX135066)
  3939. Mac OS X Wireless Networks List
  3940. PostgreSQL 8.3 < 8.3.18 Multiple Vulnerabilities
  3941. MS KB2794220: Vulnerability in Internet Explorer Could Allow Remote Code Execution
  3942. MS KB2798897: Unauthorized Digital Certificates Could Allow Spoofing
  3943. VLC < 2.0.5 Multiple Vulnerabilities
  3944. Zero day holes found in popular online games | HITBSecNews
  3945. Ban on demanding Facebook passwords among new 2013 state laws | Reuters
  3946. Security flaw found in app used for 'safe sexting'
  3947. NYC mayor pins crime rate spike on iPhone, iPad theft • The Register
  3948. Hacker at Public Works went unnoticed for days, documents show |
  3949. Facebook Patches Webcam Vulnerability After Receiving Hacker Tip - Bloomberg
  3950. Best Book Bejtlich Read in 2012
  3951. Microsoft Rushes Out ‘Fix It’ For Internet Explorer 0-day Exploit
  3952. Security Researcher Compromises Cisco VoIP Phones With Vulnerability - Dark Reading
  3953. c0decstuff: Defeating Windows 8 ROP Mitigation
  3954. Metasploit: 5 Tips to Ensure Safe Penetration T... | SecurityStreet
  3955. Celebrity hacker gets ten years
  3956. HTTPS Everywhere for Internet Explorer
  3957. Naked Scarlett Johansson pic snatch bloke gets 10 YEARS • The Register
  3958. Apple addresses another Wi-Fi bug with iOS 6.0.2 update
  3959. Adobe to patch 2-year-old Shockwave vulnerability next year
  3960. Top 10 gadgets for Christmas 2012- The Inquirer
  3961. Making Database Security Your No. 1 2013 Resolution
  3962. VMware patches 'critical' vulnerability
  3963. Top 12 IT Security Stories of 2012
  3964. Abusing SAP Servers - SpiderLabs Anterior
  3965. Soldier of Fortran • IBM Mainframe User Enumeration and Bruteforcing
  3966. Security and Networking - Blog - Should We Exploit Every Vulnerability to Prove it Exist?
  3967. Shoulder Surfing The Friendly Skies | CSO Blogs
  3968. Tenable Network Security: New CIS MySQL 4.1/5.1 Audit Policies
  3969. Google Chrome < 23.0.1271.97 Multiple Vulnerabilities
  3970. MS12-077: Cumulative Security Update for Internet Explorer (2761465)
  3971. Google Chrome < 23.0.1271.97 Multiple Vulnerabilities
  3972. MS KB2785605: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3973. MS12-078: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2783534)
  3974. MS12-079: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642)
  3975. MS12-080: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2784126)
  3976. MS12-081: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2758857)
  3977. MS12-082: Vulnerability in DirectPlay Could Allow Remote Code Execution (2770660)
  3978. MS12-083: Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)
  3979. Adobe AIR 3.x <= Multiple Vulnerabilities (APSB12-27)
  3980. Flash Player <= / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  3981. Adobe AIR for Mac 3.x <= Multiple Vulnerabilities (APSB12-27)
  3982. Ektron CMS XslCompiledTransform Class Request Parsing Remote Code Execution
  3983. Flash Player for Mac <= / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  3984. HP Intelligent Management Center User Access Manager Datagram Parsing Code Execution
  3985. IBM Lotus Symphony < 3.0.1 Fix Pack 2 Multiple Vulnerabilities
  3986. MarkAny Content SAFER ActiveX Arbitrary Download and Execution
  3987. MediaWiki < 1.18.6 / 1.19.3 / 1.20.1 Multiple Vulnerabilities
  3988. Cisco Wireless LAN Controller Flaw Permits Cross-Site Request Forgery Attacks
  3989. Hacker nabs Yahoo! site backups
  3990. Samsung devices vulnerable to dangerous Android exploit
  3991. WOW! Paypal Sends Me 5000$ For A Command Execution Vulnerability | Learn How To Hack - Ethical Hacking and security tips
  3992. No, Executing Offensive Actions Against Our Adversaries Really Does Have High Risk (Deal With It)
  3993. Lock maker starts to pay for hackable lock fixes
  3994. Botnet hidden in the Tor network
  3995. My 5 Top Ways to Escalate Privileges
  3996. Offensive security for dummies
  3997. Top Mobile Vulnerabilities And Exploits Of 2012
  3998. Samsung's Smart TVs Wide Open To Exploits
  3999. 10 Security Stories That Shaped 2012
  4000. Hacking bazaar ExploitHub gets hacked, database leaked
  4001. NetIQ Privileged User Manager ldapagnt_eval() Function Remote Code Execution
  4002. NetIQ Privileged User Manager Password Change Authentication Bypass
  4003. ISC BIND 9 DNS64 Handling DoS
  4004. Microsoft Windows Unquoted Service Path Enumeration
  4005. But did she STEAL the iPhone? App takes photo of woman trying to unlock it
  4006. The Personal Internet Address & Password Log Book (9781441303257): Peter Pauper Press: Books
  4007. Rethinking the Computer at 80 -
  4008. Proxmark 3, now with more Android - SpiderLabs Anterior
  4009. Ira Winkler: Stupid users, or stupid infosec?
  4010. No password is safe from this new 25-GPU computer cluster
  4011. GhostShell hackers release 1.6 million NASA, FBI, ESA accounts
  4012. freeFTPd / freeSSHd SFTP Authentication Bypass
  4013. iPhone Thief Photographs Herself Using Stolen Phone
  4014. Tenable Network Security: New CIS VMware ESX Audit Policy
  4015. Tenable Network Security: New CIS SQL Server 2008 R2 Audit...
  4016. Apache Tomcat 7.0.x < 7.0.32 CSRF Filter Bypass
  4017. RWCards Component for Joomla! mosConfig_absolute_path Parameter Remote File Inclusion
  4018. FreeSWITCH Route Header Value Handling DoS
  4019. ManageEngine Security Manager Plus 'f' Directory Traversal Arbitrary File Access
  4020. Carnal0wnage & Attack Research Blog: On Sophistication
  4021. Why is outcome based security monitoring so critical with “Big Data”?
  4022. Tectia SSH Server Authentication Bypass
  4023. DHCPv6 server detection
  4024. DHCPv6 client detection
  4025. Direct Attack Path Analysis
  4026. Email hacks router - The H Security: News and Features
  4027. US woman arrested for bank robbery brags on YouTube about robbing a bank
  4028. Forget Disclosure — Hackers Should Keep Security Holes to Themselves | Wired Opinion |
  4029. DARPA Looks For Backdoors, Malware In Tech Products
  4030. Rumble in the Tumblr: Troll-worm infected thousands of blogs
  4031. FreeSSHD Remote Authentication Bypass
  4032. Simple Nomad Locates John McAfee Through Smartphone Photo
  4033. Buffalo Linkstation Privilege Escalation
  4034. cPanel Unspecified Flaws Have Unspecified Impact - SecurityTracker
  4035. Microsoft Windows Mounted Devices
  4036. NEOHAPSIS - Peace of Mind Through Integrity and Insight
  4037. Belkin wireless routers weak key
  4038. The Hackback Debate | Steptoe Cyberblog
  4039. Prince William photos accidentally reveal RAF password | Naked Security
  4040. Backdoor found in Piwik analytics software - Update - The H Security: News and Features
  4041. Yahoo XSS exploits going for $700
  4042. ENISA promotes digital hacker traps
  4043. Mobile browser vulnerability lets hackers steal cloud computing time
  4044. Top 5 Security Predictions for 2013 from ISF
  4045. Geek Researcher Spends Three Years Living With Hackers
  4046. US software firm hacked for years after suing China
  4047. US-CERT: Samsung Printer Firmware Contains Backdoor
  4048. IBM Rational Developer for System z Discloses SSL Certificate Password to Local Users
  4049. Symantec Mail Security Autonomy Verity Keyview Filter Vulnerabilities (SYM12-018)
  4050. Symantec Messaging Gateway 9.5.x Multiple Vulnerabilities (SYM12-018)
  4051. RT < 3.8.15 / 4.0.8 Multiple Vulnerabilities
  4052. Wordfence Plugin for WordPress email Parameter XSS
  4053. Google Chrome < 23.0.1271.91 Multiple Vulnerabilities
  4054. VMware vCenter Data Collection
  4055. VMware vCenter SOAP API Settings
  4056. IrfanView < 4.35 Multiple Heap-Based Buffer Overflows
  4057. Samsung printers contain hidden, hard-coded management account
  4058. Antivirus software a waste of money for businesses, report suggests
  4059. The cybersecurity needs of the borderless enterprise
  4060. Thanksgiving SCADA Bug Hunt
  4061. What you don'€™t know about passwords might hurt you
  4062. Hotel blames burglaries on hacked Onity card locks
  4063. Exploitable Systems Report
  4064. Opera < 12.11 Multiple Vulnerabilities
  4065. Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service
  4066. Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple Security Weaknesses
  4067. Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities
  4068. IOServer XML Server URI Directory Traversal Arbitrary File Access
  4069. Novell Sentinel Log Manager Web Detection
  4070. Novell Sentinel Log Manager Authentication Bypass
  4071. SSL Certificate Signed with the Compromised Fortigate Key
  4072. Bugzilla < 3.6.12 / 4.0.9 / 4.2.4 / 4.4rc1 Multiple Vulnerabilities
  4073. Dell OpenManage Server Administrator omalogin.html DOM-based XSS
  4074. IBM WebSphere Application Server 8.5 < Fix Pack 1 Multiple Vulnerabilities
  4075. Wing FTP Server Multiple ZIP Commands Parsing Remote DoS
  4076. Novell File Reporter Agent FSFUI UICMD 126 Arbitrary File Download
  4077. Opera < 12.11 Multiple Vulnerabilities
  4078. Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service
  4079. Apache Tomcat 5.5.x < 5.5.36 DIGEST Authentication Multiple Security Weaknesses
  4080. Apache Tomcat 6.0.x < 6.0.36 Multiple Vulnerabilities
  4081. Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple Security Weaknesses
  4082. NetIQ Privileged User Manager Default Admin Password
  4083. NetIQ Privileged User Manager Password Change Authentication Bypass
  4084. NetIQ Privileged User Manager ldapagnt_eval() Function Remote Code Execution
  4085. Firefox 10.x < 10.0.11 Multiple Vulnerabilities (Mac OS X)
  4086. Firefox 16.x Multiple Vulnerabilities (Mac OS X)
  4087. Thunderbird 10.x < 10.0.11 Multiple Vulnerabilities (Mac OS X)
  4088. Thunderbird 16.x Multiple Vulnerabilities (Mac OS X)
  4089. Firefox 10.x < 10.0.11 Multiple Vulnerabilities
  4090. Firefox 16.x Multiple Vulnerabilities
  4091. Mozilla Thunderbird 10.x < 10.0.11 Multiple Vulnerabilities
  4092. Mozilla Thunderbird 16.x Multiple Vulnerabilities
  4093. SeaMonkey 2.13.x Multiple Vulnerabilities
  4094. Proxying 3G iPhone Data
  4095. Report: Apple's AuthenTec sells embedded security division - The H Security: News and Features
  4096. New 64-bit Linux Rootkit Doing iFrame Injections
  4097. Children should be at least 13 years old to use Internet: Poll - Computer Business Review
  4098. Researchers warn of 'Cool' exploit platform - IT News from
  4099. Malware Made Which Can Share A Smartcard Over The Internet
  4100. Facebook to roll out HTTPS by default to all users
  4101. Hackers break into FreeBSD with stolen SSH key
  4102. The convergence of biological and computer viruses | TechRepublic
  4103. HoneyDrive – Honeypots In A Box
  4104. Hardcoded passwords leave Telstra routers wide open - Networks - SC Magazine Australia - Secure Business Intelligence
  4105. Obama signs secret directive to help thwart cyberattacks - The Washington Post
  4106. Technical Support - Welcome to
  4107. ircmaxell's blog: Anatomy of an Attack: How I Hacked StackOverflow
  4108. HTTP Pass the Hash with Python « Neohapsis Labs
  4109. VMInjector - DLL Injection tool to unlock guest VMs | SECFORCE :: Blog
  4110. Owning Computers Without Shell Access | Accuvant
  4111. Rebootuser – VulnVoIP (Vulnerable VoIP) – The Fundamentals of VoIP Hacking
  4112. 6 Ways Big Data is Helping Reinvent Enterprise Security
  4113. QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)
  4114. Liferay Portal 6.1.0 / 6.1.10 Arbitrary File Deletion
  4115. MySQL 5.0.95 MyISAM Table Symbolic Link Local Restriction Bypass
  4116. Symantec Legacy Decomposer Code Execution (SYM12-017)
  4117. VMSA-2012-0016 : VMware security updates for vSphere API and ESX Service Console
  4118. CoSoSys Endpoint Protector 4 Predictable Password
  4119. Freestyle Support Portal Component for Joomla! prodid Parameter SQL Injection
  4120. Freestyle Testimonials Component for Joomla! Unspecified SQL Injection
  4121. MS12-073: Vulnerabilities in Microsoft IIS Could Allow Information Disclosure (2733829) (uncredentialed check)
  4122. WebSphere MQ 6.x < / 7.x < 'userid' and 'password' Information Disclosure
  4123. EMC NetWorker Module for Microsoft Applications 2.2.x / 2.3.x < 2.3 build 122 / 2.4.x < 2.4 build 375 Multiple Vulnerabilities
  4124. Sophos Anti-Virus < 10.0.9 / 10.2.1 Multiple Vulnerabilities
  4125. Sophos Anti-Virus for Mac Multiple Vulnerabilities
  4126. Security Debt and Vulnerability Supply Chains
  4127. Awareness: Top 10 Reasons Security Awareness Efforts Fail
  4128. Tech Insight: Better Defense Through Open Source Intelligence - Dark Reading
  4129. 5 ways to avoid pulling a Petraeus
  4130. Google app bug cancels Christmas, December
  4131. Hackers obtained access to FreeBSD servers
  4132. Infamous Hacker Heading Chinese Antivirus Firm?
  4133. Hakin 9 Cross Site Scripting
  4134. How tweets about your sick cat threaten our security health | ZDNet
  4135. Twitter unintentionally resets thousands of passwords
  4136. Adobe confirms customer data breach
  4137. Cybersecurity bill fails in U.S. Senate - Computerworld
  4138. For Sale: Cheap access to corporate computers
  4139. Skype fixes e-mail security flaw
  4140. Enterprises can obtain value from red teaming exercises, expert says
  4141. NASA to deploy whole-disk encryption following breach
  4142. Tenable Network Security: Auditing Check Point GAiA Configuration...
  4143. Tenable Network Security: Auditing Juniper Junos Configuration...
  4144. Tenable Network Security: New CIS Debian Linux Audit Policy
  4145. Google Chrome < 23.0.1271.64 Multiple Vulnerabilities
  4146. Apple iOS < 6.0.1 Multiple Vulnerabilities
  4147. Tech Check for 11-12-12 on WYPR's Maryland Morning
  4148. Tenable Network Security Awarded Common Criteria Certification for Emerging Security Threats
  4149. Opera < 12.10 Multiple Vulnerabilities
  4150. Oracle Forms Recognition Multiple ActiveX Control Arbitrary File Overwrite Vulnerabilities
  4151. Adobe AIR 3.x <= Multiple Vulnerabilities (APSB12-24)
  4152. Flash Player <= / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4153. Adobe AIR for Mac 3.x <= Multiple Vulnerabilities (APSB12-24)
  4154. Flash Player for Mac <= / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4155. Google Chrome < 23.0.1271.64 Multiple Vulnerabilities
  4156. QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)
  4157. SolarWinds Orion NPM < 9.5 Login.asp Blind SQL Injection
  4158. Traq admincp/common.php authenticate() Function Authentication Bypass Remote Code Execution
  4159. – Build, Host & Share Vulnerable Web Application Code
  4160. Side-Channel Attack Steals Crypto Key from Co-Located Virtual Machines | threatpost
  4161. Apple's iOS 6.0.1 still has Wi-Fi bugs | ZDNet
  4162. ISC Diary | Cisco TACACS+ Authentication Bypass
  4163. Should the AV Industry Accept Defeat?
  4164. One in four don't clean their stinky old browsers - especially Firefoxers
  4165. Antivirus Firm Founder John McAfee Accused of Murder, Says He's Innocent
  4166. A history of hacking: Documentary captures essence of Def Con
  4167. Microsoft Updates November 2012 - IE, Kernel+Shell, and .NET Critical Patches
  4168. Most U.S. Drones Openly Broadcast Secret Video Feeds | Danger Room |
  4169. Carnal0wnage & Attack Research Blog: The Biggest Problem in Computer Security
  4170. Microsoft’s security team is killing it: Not one product on Kaspersky’s top 10 vulnerabilities list - The Next Web
  4171. VMWare ESX Source Code Leaked On The Internet
  4172. Sophos products and Tavis Ormandy | Naked Security
  4173. Coca-Cola Was Hacked But Didn’t Tell Shareholders
  4174. 1.7M mobile apps analyzed: Users tracked and put at risk, and it’s unjustified
  4175. Security Headers on the Top 1,000,000 Websites
  4176. Users take their time over Java and Flash updates
  4177. Network Encryption Anomalies
  4178. BigFix Client Patch Update
  4179. Mozilla SeaMonkey 2.13.x < 2.13.2 Multiple Vulnerabilities
  4180. Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities
  4181. ZABBIX Web Interface popup_bitem.php itemid Parameter SQL Injection
  4182. Temenos T24 Detection
  4183. ManageEngine OpStor Default Administrator Credentials
  4184. ManageEngine OpStor days Parameter XSS
  4185. ManageEngine SupportCenter Plus fromCustomer Parameter XSS
  4186. CoDeSys PLC Runtime Service Detection
  4187. CoDeSys Authentication Bypass Directory Traversal
  4188. CoDeSys Unauthenticated Command-line Access
  4189. Oracle VM VirtualBox 3.x / 4.0.x < 4.0.10 Local Integer Overflows
  4190. Kaspersky Password Manager 5.x < HTML Injection
  4191. Mac OS X : OS X Server < 2.1.1 Multiple Vulnerabilities
  4192. Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities
  4193. Apple iOS < 6.0.1 Multiple Vulnerabilities
  4194. CA ARCserve Backup Multiple Vulnerabilities (CA20121018) (credentialed check)
  4195. Symphony CMS Password Retrieval Script XSS
  4196. Hacking an old radar gun to interface with a laptop
  4197. Burp proxy opens Android SSL connections
  4198. Angry White Guy
  4199. Five pieces of advice for those new to the infosec industry
  4200. Halloween Tech Monsters « Core Security
  4201. The Script Kiddie 5-step program
  4202. Stealing Your Neighbors’ Keys with a Drinking Glass
  4203. Moving to a career in IT security | Computerworld Blogs
  4204. Companies Should Think About Hacking Back Legally, Attorney Says
  4205. Huawei reaches out to critical German hacker over router flaws
  4206. Windows 8 'penetrated' says firm which sells to world's spy agencies
  4207. Research Shows Serious Problems With Android App SSL Implementations | threatpost
  4208. Security Flaws in the TSA Pre-Check System and the Boarding Pass Check System. « Puckinflight
  4209. Open Security Research: Hacking KeyLoggers
  4210. Windows 8 security overview – Safest Windows ever? | Naked Security
  4211. Microsoft's picture-password ad: Intriguing or confusing? | Technically Incorrect - CNET News
  4212. Your mouse may actually be a RAT in disguise
  4213. Malware hides behind the mouse
  4214. Drupal 7.x < 7.16 Multiple Vulnerabilities
  4215. Adobe Software Signed By Revoked Certificate (APSA12-01)
  4216. IPSEC Internet Key Exchange (IKE) Version 2 Detection
  4217. Internet Key Exchange (IKE) Aggressive Mode with Pre-Shared Key
  4218. Novell ZENworks Asset Management rtrlet Component GetFile_Password Method Hardcoded Credentials Information Disclosure
  4219. Juniper Junos web-authentication Policy Not Enforced (PSN-2012-10-735)
  4220. Mutiny < 4.5-1.12 Unspecified Network Interface Menu Remote Command Injection
  4221. Symantec Ghost Solution Suite Backup File Handling Memory Corruption (SYM12-016)
  4222. Exim 4.70 - 4.80 DKIM DNS Record Parsing Remote Buffer Overflow
  4223. WANem index-advanced.php XSS
  4224. IBM Rational ClearQuest Multiple Script Information Disclosure
  4225. WANem result.php pc Parameter Remote Command Execution
  4226. Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities
  4227. Firefox 16.x < 16.0.2 Multiple Vulnerabilities
  4228. Hack3rcon 3 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)
  4229. Big security on a shoe-string budget
  4230. IP theft attacks can hide on networks for years, unspotted by corporate victims, report claims
  4231. 10 steps for writing a secure BYOD policy
  4232. 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions - SecurityTracker
  4233. Hackers Steal Customer Data From Barnes And Noble Keypads
  4234. Boeing zaps PCs using CHAMP missile microwave attacks
  4235. Five Habits of Companies That Catch Insiders
  4236. Apple banishes Java from Mac browsers
  4237. Android apps get SSL wrong, expose personal data
  4238. 5 to-dos to maintain reputation after cyberattack | ZDNet
  4239. Lack of skilled security pros challenges CISOs to fill specialties
  4240. Tenable Network Security: New DISA STIG MS Office 2010 Audit...
  4241. The key to campus network security: Better risk management
  4242. Mozilla Firefox 15.x <= 15 Multiple Vulnerabilities
  4243. Mozilla SeaMonkey 2.x < 2.13 Multiple Vulnerabilities
  4244. Mozilla Thunderbird 15.x <= 15 Multiple Vulnerabilities
  4245. BigFix Server Detection
  4246. MySQL Server 5.5.x <= 5.5.27 / 5.1.x <= 5.1.65 Multiple Unspecified Vulnerabilities
  4247. Patch Management: Tivoli Endpoint Manager Report
  4248. SSL Compression Methods Supported
  4249. TLS Next Protocols Supported
  4250. RuggedCom Known Hardcoded SSL RSA Private Key
  4251. ISC BIND 9 DNS RDATA Handling DoS
  4252. TLS CRIME Vulnerability
  4253. Firefox 16.x < 16.0.1 Multiple Vulnerabilities
  4254. Mozilla Thunderbird 16.x < 16.0.1 Multiple Vulnerabilities
  4255. SeaMonkey 2.13.x < 2.13.1 Multiple Vulnerabilities
  4256. Oracle Java SE Multiple Vulnerabilities (October 2012 CPU)
  4257. Mac OS X : Java for Mac OS X 10.6 Update 11
  4258. MySQL 5.5 < 5.5.28 Multiple Vulnerabilities
  4259. Pass the Hash w/o Metasploit - Part 2 - Blog -
  4260. Week 42 in Review – 2012
  4261. Incident Response in 3.08 MB
  4262. National Weather Service Hacked
  4263. The Importance of Security Awareness
  4264. Zero-day attacks last much longer than most would believe
  4265. Pacemaker hacker says worm could possibly 'commit mass murder' | Computerworld Blogs
  4266. Infographic: Top password mistakes - Computerworld
  4267. Don't secure the internet, it needs crime: Diffie | ZDNet
  4268. Web app design at the core of coding weaknesses, attacks, says expert
  4269. Public Wi-Fi hotspots pose real threat to enterprises, survey finds
  4270. Tenable Network Security: New CIS Apache Web Server 2.2 Audit...
  4271. Tenable Network Security: New CIS Solaris 11 Audit Policy
  4272. Tenable Network Security: Tenable Audit Policies - CIS Unix and...
  4273. IEC 60870-5-104 server detection
  4274. Flash Player <= 11.4.402.278 Multiple Vulnerabilities (APSB12-22)
  4275. #1 Nessus is an Enterprise Tool - Top Ten Things You Didn't Know About Nessus
  4276. Analyzing Nessus Virus Detections with the Log Correlation Engine
  4277. Analyzing Nessus Detected Malicious Processes Activity with the Log Correlation Engine
  4278. MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319)
  4279. MS12-065: Vulnerability in Microsoft Works Could Allow Remote Code Execution (2754670)
  4280. MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517)
  4281. MS12-067: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution (2742321)
  4282. MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2724197)
  4283. MS12-069: Vulnerability in Kerberos Could Allow Denial of Service (2743555)
  4284. MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege (2754849)
  4285. MS KB2661254: Update For Minimum Certificate Key Length
  4286. Adobe AIR 3.x <= Multiple Vulnerabilities (APSB12-22)
  4287. Flash Player <= / 11.4.402.278 Multiple Vulnerabilities (APSB12-22)
  4288. Wireshark 1.8.x < 1.8.3 Multiple Vulnerabilities
  4289. Windows Phone7 < 7.10.8107 Out-of-Date SSL Certificate Blacklist
  4290. Former LulzSec member pleads guilty to conspiracy in Sony Pictures hack
  4291. Rise In U.S. Hacker Attacks Against China
  4292. Security Monitoring An Elixir For Intrusion Costs? - Dark Reading
  4293. Master Keys
  4294. Never Attribute to Malice, but Always Verify
  4295. Majority of SMBs Have No Security Policies or Contingency Plans
  4296. Facebook Confirms Researcher Collected Countless Phone Numbers
  4297. Security Manager's Journal: I hired a hacker - Computerworld
  4298. Exploiting a MIPS Stack Overflow | /dev/ttyS0
  4299. Apple's Combined Patching
  4300. How Your #Naked Pictures Ended Up on the Internet
  4301. The Security-Conscious Uncle
  4302. No homecoming queen vote if you don't wear RFID tag?
  4303. Hacker wins $60,000 prize for breaking into Google Chrome
  4304. Firefox 16 pulled offline following security flaw find
  4305. Mobile Brings a New Dimension to the Enterprise Risk Equation
  4306. Reporting Mistakes
  4307. James Bond's Dry Erase Marker: The Hotel PenTest Pen - SpiderLabs Anterior
  4308. HP Communities - CISO Concerns - Security vs. Usability, Affordabil... - Enterprise Business Community
  4309. Foursquare app on an Apple iOS mobile device
  4310. Slacker application music streaming leaking information
  4311. Slacker application music streaming on an Android mobile device
  4312. Slacker application music streaming on an Apple iOS mobile device
  4313. Debate: Flame, Stuxnet and other APTs are hype, but still be wary
  4314. SumatraPDF < 2.1 Multiple Vulnerabilities
  4315. Flexera ISGrid ActiveX Control Remote Code Execution Vulnerabilities
  4316. IBM WebSphere Application Server 7.0 < Fix Pack 25 Multiple Vulnerabilities
  4317. Novell GroupWise WebAccess 8.x < 8.0.3 Multiple Cross-Site Scripting Vulnerabilities
  4318. WordPress A Page Flip Book Plugin for WordPress pageflipbook_language Parameter Local File Inclusion
  4319. RSA Authentication Client 3.5 < 3.5.6 Local Authentication Bypass
  4320. Magnum MNS-6K Hardcoded Admin Account
  4321. Symantec Enterprise Vault < 10.0.2 Multiple Vulnerabilities in Oracle Outside-In Libraries (SYM12-015)
  4322. Network Monitoring As A Security Tool - Dark Reading
  4323. Bing is the most heavily poisoned search engine, study says • The Register
  4324. What is Scaring Businesses the Most? Spear-phishing.
  4325. In a Zero-Day World, It’s Active Attacks that Matter
  4326. Could your phone's camera be secretly taking pictures right now? Hackers can use your lens to steal private data - and build up a 3D model of your home | Mail Online
  4327. How millions of DSL modems were hacked in Brazil, to pay for Rio prostitutes | Naked Security
  4328. Tiny Evil Maid CHKDSK Utility Can Steal Passwords | threatpost
  4329. JSON Hijacking Demystified - SpiderLabs Anterior
  4330. Email Address Harvesting
  4331. "Report: Counterfeit electronic parts multiplying at record rate from Sterling"
  4332. Scientific Linux Systems Summary
  4333. Scientific Linux Systems Summary
  4334. CVSS Scoring by Asset
  4335. Tenable enters partnership with In-Q-Tel
  4336. Sugarsync 'Cloud' Backup Service Detection
  4337. Accessing iTunes Store on an Apple iOS device
  4338. Apple iOS < 6.0 Multiple Vulnerabilities
  4339. Browsing Cydia software packages
  4340. Google Chrome < 22.0.1229.79 Multiple Vulnerabilities
  4341. ZEN Load Balancer global.conf Information Disclosure
  4342. MediaWiki index.php uselang Parameter XSS
  4343. DB2 10.1 < Fix Pack 1 Multiple Vulnerabilities
  4344. Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability (cisco-sa-20120926-dhcpv6)
  4345. Foxit Reader < 5.4.3 fxdecod1.dll Path Subversion Arbitrary DLL Injection Code Execution
  4346. Poweradmin index.php XSS
  4347. Pen testers should broaden scope, focus more on people, expert says
  4348. Students will be doing vulnerability tests on security products at Iowa State University's new lab
  4349. Researcher says 100,000 passwords exposed on IEEE site
  4350. Millions of DSL modems hacked in Brazil
  4351. Is antivirus dead? Startup launches first 'exploit blocking' program
  4352. Security Intelligence Starts With Detecting The Weird - Dark Reading
  4353. BBC News - Android phone 'wipeout' security flaw exposed
  4354. iOS 6 already on 60 percent of iPhones in North America
  4355. Hackers leak 120,000 student records in raid on world's top unis
  4356. Internet Explorer Users: Please Read This
  4357. Compliance Lessons from Lance « The New School of Information Security
  4358. Tenable Network Security: Auditing Open Ports on Windows.
  4359. Your BMW can be stolen by any idiot with a $30 hacking kit | Naked Security
  4360. Technology News: Security: Hacker Claims Old-School Tactic Brought GoDaddy to Its Knees
  4361. Users told: Get rid of Internet Explorer (again)
  4362. Microsoft offers workarounds for IE bug
  4363. Romanians Plead Guilty To Credit Card Hack On US Subway Shops ≈ Packet Storm
  4364. Sneak Peek at SecurityCenter 4.6
  4365. Tenable Network Security: New PostgreSQL 9.1 Audit Policies
  4366. Remote Access
  4367. VMware ESXi / vSphere Analysis
  4368. JustCloud 'Cloud' Backup Service Detection
  4369. Apache 2.2 < 2.2.23 Multiple Vulnerabilities
  4370. iTunes < 10.7 Multiple Vulnerabilities
  4371. Real Networks RealPlayer < Multiple Vulnerabilities
  4372. Sprint TV app on Android mobile devices
  4373. MS Skydrive 'Cloud' Backup Service Detection
  4374. Carbonite 'Cloud' Backup Service Detection
  4375. Foursquare app on an Android mobile device
  4376. Microsoft Visual Studio Team Foundation Server Detection (Credentialed Check)
  4377. MS12-061: Vulnerability in Visual Studio Team Foundation Server Could Allow Elevation of Privilege (2719584)
  4378. MS12-062: Vulnerability in System Center Configuration Manager Could Allow Elevation of Privilege (2741528)
  4379. MS 2736233: Update Rollup for ActiveX Kill Bits (2736233)
  4380. SolarWinds Orion NPM < 10.3.1 Multiple Vulnerabilities
  4381. ISC BIND Assertion Error Resource Record RDATA Query Parsing Remote DoS
  4382. WebSphere MQ 7.1 < MQ SVRCONN Channels Security Configuration Bypass
  4383. XnView < 1.99.1 JPEG Compressed TIFF Image Multiple Header Value Handling Overflow
  4384. LogAnalyzer index.php highlight Parameter XSS
  4385. MDaemon WorldClient < 12.5.7 Multiple Cross-site Scripting Vulnerabilities
  4386. Cloud Security Alliance tackles big data security
  4387. A Guide To Network Vulnerability Management - Dark Reading
  4388. Old Operating Systems Die Harder - Dark Reading
  4389. Microsoft Disrupts ‘Nitol’ Botnet in Piracy Sweep
  4390. Blackhole Exploit Kit updates to 2.0
  4391. Domino's Pizza says website hacked
  4392. More SSL trouble, (Thu, Sep 13th)
  4393. Apple unveils redesigned iPhone 5 with 4-inch display, 4G LTE
  4394. Google helps close 163 security vulnerabilities in iTunes
  4395. Antivirus programs often poorly configured, study finds
  4396. Foxit Reader 5.4 fixes DLL hijacking vulnerability
  4397. Google acquires VirusTotal, but plans to keep it independent
  4398. PenTesting: From Low Risk Issues to Sensitive Data Compromising - SpiderLabs Anterior
  4399. WSUS Monitoring Report
  4400. WSUS Monitoring
  4401. VMSA-2012-0013 : VMware vSphere and vCOps updates to third party libraries
  4402. Adobe Photoshop CS6 Multiple Buffer Overflow Vulnerabilities (APSB12-20)
  4403. Asterisk Manager Interface ExternalIVR Application Originate Action Remote Shell Command Execution (AST-2012-012)
  4404. EMail Security Virtual Appliance learn-msg.cgi Remote Code Execution
  4405. Mac OS X : Java for Mac OS X 10.6 Update 10
  4406. Cloudsafe365 Plugin for WordPress file Parameter Traversal Arbitrary File Access
  4407. Symantec Messaging Gateway 9.5.x Multiple Vulnerabilities (SYM12-013)
  4408. Spiceworks Client Version Detection
  4409. Mac Outlook Client Version Detection
  4410. Ustream mobile Android app streaming detection
  4411. Ustream mobile Android app detection
  4412. Google Chrome < 21.0.1180.89 Multiple Vulnerabilities
  4413. 100,000 Vulnerabilities
  4414. Schneier on Security: CSOs/CISOs Wanted: Cloud Security Questions
  4415. Secret account in mission-critical router opens power plants to tampering | Ars Technica
  4416. The Social-Engineer Toolkit (SET) v3.7 "Street Cred" has been released. «
  4417. Cracking Story – How I Cracked Over 122 Million SHA1 and MD5 Hashed Passwords « Thireus' Bl0g
  4418. The Exploit Magazine 02/2012 : The Exploit Magazine
  4419. Apple Releases Fix for Critical Java Flaw — Krebs on Security
  4420. BYOD creates generation of workaholics
  4421. 3 security mistakes your management is making now
  4422. Hackers on a plane: who has jurisdiction? (legal)
  4423. [papers] - How to Use PyDbg as a Powerful Multitasking Debugger
  4424. GarrettCom industrial switches open to attack
  4425. Tenable Network Security Secures $50 Million Series A From Accel Partners
  4426. Tenable Network Security Recognized for Outstanding Growth by Inc. Magazine
  4427. BYOD: Bring Your Own Devastation?
  4428. Weaknesses in MS-CHAPv2 authentication
  4429. Five 0days: HP in the security dock - The H Security: News and Features
  4430. Security Manager's Journal: Closing off a hole in Outlook
  4431. Malware Attack Against VMware Limited In Scope
  4432. Soldier of Fortran • Y'all encountered a Mainframe and didn't even know it!
  4433. Hiding Your Shells | Secure Planet
  4434. InfoSec Resources – JBOSS Exploitation
  4435. Disney Sitcom Says Open Source Is Insecure ≈ Packet Storm
  4436. Ghosts In The ROM: Hacking Into A 25 Year Old Macintosh Easter Egg | Cult of Mac
  4437. Tenable Network Security: New audit policies generated from DISA...
  4438. NetFlix on-demand media streaming to the Apple iPad
  4439. Sophos Anti-virus Version Detection
  4440. VMWare VI Client Version Detection
  4441. Apache 2.4 < 2.4.3 Multiple Vulnerabilities
  4442. Hulu on-demand media streaming to the Apple iPad
  4443. Opera < 12.01 Multiple Vulnerabilities
  4444. Eucalyptus Walrus REST Interface Key Verification Authentication Bypass (ESA-03)
  4445. Apache 2.4 < 2.4.3 Multiple Vulnerabilities
  4446. Oracle Integrated Lights Out Manager Default Credentials
  4447. Microsoft Windows SMB Registry : Windows 8 / Server 2012 Service Pack Detection
  4448. Scrutinizer < 9.5.2 Multiple Vulnerabilities
  4449. Bugzilla < 3.6.10 / 4.0.7 / 4.2.2 / 4.3.2 Multiple Information Disclosures
  4450. phpMyAdmin 3.4.x < / 3.5.x < Multiple XSS (PMASA-2012-4)
  4451. No Infosec Sacred Cows
  4452. Inside the Grum Botnet
  4453. Could The New Air Traffic Control System Be Hacked? : All Tech Considered : NPR
  4454. Stealing the Keys to the Kingdom through SQL injection
  4455. Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information
  4456. Shamoon the Wiper - Copycats at Work
  4457. Clown Gets Busted Using Steve Jobs' Stolen Ipad
  4458. Surveillance Device Uses Wi-Fi To See Through Walls
  4459. Breaking news, literally: Reuters hacked third time this MONTH
  4460. Tenable Network Security Unveils SecurityCenter Continuous View
  4461. Tenable Network Security Receives Highest Rating of "Strong Positive" in Leading Analyst Firm Vulnerability Assessment MarketScope Report
  4462. BYOD: Bring Your Own Devastation?
  4463. Mac OS X CIS and DISA STIG Auditing
  4464. CyberScope Monitoring (Active)
  4465. CyberScope Monitoring (Active and Passive)
  4466. Mac OS X, Linux and UNIX File Modification Monitoring
  4467. CyberScope System Report
  4468. Mac OS X, Linux and UNIX File Modification Monitoring Report
  4469. application music streaming on an Android mobile device
  4470. Pandora Internet radio streaming on an Apple iOS mobile device
  4471. Electro Industries GaugeTech SCADA Server Detection
  4472. Flash Player < 11.3.300.271 Code Execution (APSB12-18)
  4473. Wireshark 1.8.x < 1.8.2 Multiple Vulnerabilities
  4474. Cisco IOS Aironet Access Point DoS
  4475. Cisco IOS MallocLite BGP Update DoS
  4476. Cisco IOS Clientless SSL VPN DoS
  4477. Cisco IOS MMoH Information Leak
  4478. Scrutinizer Default Credentials Check
  4479. Scrutinizer < 9.5.2 d4d/statusFilter.php q Parameter SQL Injection
  4480. Kicking Out Bots with ModSecurity
  4481. Lotus Domino Scanner
  4482. Photo suggests Apple out to 'screw' hardware hackers
  4483. Security researcher cracks Microsoft's BlueHat prize-winning ROPGuard tool
  4484. Your career is over after a breach? Another Myth, Busted!
  4485. Hacking Embedded Devices: UART Consoles - MWR Labs
  4486. Cybersecurity Bill Fails in US Senate | SecurityWeek.Com
  4487. About Exploit Exercises
  4488. Reuters Hacked Due To Old WordPress Version
  4489. Huawei and Cyber Espionage, A Question of Trust but Verify
  4490. Triple DDoS vs. KrebsOnSecurity
  4491. Dropbox Hacked, Still No Two-Factor Auth
  4492. Errata Security: The tl;dr version of Moxie's MSCHAPv2
  4493. Trying to unmask the fake Microsoft support scammers! - Securelist
  4494. Baidu Workers Arrested For Deleting Posts For Money ≈ Packet Storm
  4495. Payroll admins targeted by dangerous Java exploit
  4496. RaspberryPi Image Occidentalis 0.1 Default Credentials
  4497. NBCOlympics application detection for Apple iPad - (accessed)
  4498. nginx < 1.2.x / 1.3.x < 1.2.1 / 1.3.1 Vulnerabilities with Windows directory aliases
  4499. Snort Events
  4500. Windows Unique Executables and New Commands
  4501. Scientific Linux Update Level
  4502. nginx on Windows Directory Aliases Access Restriction Bypass
  4503. Appweb < 3.3.3 Insecure SSL Renegotiation
  4504. Scientific Linux Security Update : on SL5.x i386/x86_64
  4505. Apple Xcode < 4.4 Multiple Vulnerabilities (Mac OS X)
  4506. Opera < 12.01 Multiple Vulnerabilities
  4507. Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate
  4508. Hacker Will Expose Potential Security Flaw In Four Million Hotel Room Keycard Locks - Forbes
  4509. BlackHat USA 2012: Day One
  4510. Black Hat 2012
  4511. Top 10 Things I Learned at Blackhat 2012 & Defcon 20 and Vegas
  4512. Tenable CSO, Marcus Ranum, Featured in Documentary and Quoted in Forbes
  4513. Tenable CEO, Ron Gula, Discusses Gamingo Breach on FoxNews
  4514. Ticketing Summary
  4515. Teredo Detection
  4516. Unsupported Windows Software Startup Detection
  4517. Windows Daily Command and User Summary
  4518. Mozilla Firefox 13.x < 13 Multiple Vulnerabilities
  4519. Mozilla SeaMonkey 2.x < 2.11 Multiple Vulnerabilities
  4520. Mozilla Thunderbird 13.x < 13 Multiple Vulnerabilities
  4521. VLC Media Player < 2.0.2 Ogg_DecodePacket Function OGG File Handling Overflow
  4522. Safari < 6.0 Multiple Vulnerabilities
  4523. Mac Software Update DNS Query Detection
  4524. ESPN ScoreCenterXL Video Stream Detection iOS
  4525. Cisco TelePresence Multipoint Switch XML-RPC DoS (cisco-sa-20110223-telepresence-ctms)
  4526. WaveMaker < 6.4.6 Security Bypass
  4527. Eaton Network Shutdown Module Default Administrator Credentials
  4528. Nagios XI < 2011R3.0 Multiple XSS Vulnerabilities
  4529. Sony VAIO Wireless Manager ActiveX Control WifiMan.dll Multiple Buffer Overflows
  4530. ISC BIND 9 Multiple Denial of Service Vulnerabilities
  4531. IBM attempts to redefine the IPS
  4532. Marlinspike demos MS-CHAPv2 crack
  4533. Hacks that work just by changing the URL » Secure Solutions
  4534. Low Hanging Fruit | AverageSecurityGuy
  4535. If Hackers Didn't Exist, Governments Would Have to Invent Them - Molly Sauter - The Atlantic
  4536. 140,000 KPN ADSL customers still using default password
  4537. Nvidia probes breach of hashed passwords
  4538. Vivotek Cameras Data Configuration Disclosure
  4539. Tenable Network Security: New DISA STIG MS Office 2010 Audit...
  4540. Tenable Network Security: New CIS SQL2005 Audit Policies
  4541. Tenable Network Security: New DISA STIG MacOSX 10.6 Audit Policy
  4542. Leveraging LCE Text Search for Specific Botnet Activity Tracking
  4543. Apple iPod, iPad and iPhone
  4544. Asterisk Remote Crash Vulnerability in Skinny Channel Driver (AST-2012-009)
  4545. Asterisk Remote Crash Vulnerability in voice mail application (AST-2012-011)
  4546. Evernote Client Detection
  4547. Java version detection
  4548. DB2 9.7 < Fix Pack 6 Multiple Vulnerabilities
  4549. DB2 9.8 < Fix Pack 5 Multiple Vulnerabilities
  4550. MS KB2719662: Vulnerabilities in Gadgets Could Allow Remote Code Execution
  4551. DNSSEC NSEC Records
  4552. VMSA-2012-0012 : VMware ESXi update to third party library
  4553. MySQL 5.5 < 5.5.23 Unspecified Vulnerability
  4554. Novell GroupWise WebAccess User.interface Directory Traversal
  4555. Pidgin < 2.10.5 mxit_show_message Function RX Message Inline Image Parsing Remote Overflow
  4556. Using Nmap to Screenshot Web Services Troubleshooting
  4557. Your Uncle Wants Tech Support? Give Him This USB Stick
  4558. 450,000 email addresses and plain-text passwords in circulation
  4559. USB drives left in car park as corporate espionage attack vector
  4560. - A Pentesticles Project!
  4561. 10 crazy IT security tricks that actually work | Security - InfoWorld
  4562. Malicious Process Detection
  4563. Botnet infections in the enterprise have experts advocating less automation
  4564. DNSchanger shutdown may kick 300,000 offline on Monday
  4565. The Dark Side Of QR Codes
  4566. Computer error triggers mass rocket launch
  4567. Stuxnet cyberattack by US a 'destabilizing and dangerous' course of action, security expert Bruce Schneier says
  4568. Children warned name of first pet should contain 8 characters and a digit | NewsBiscuit
  4569. SQL Injection Knowledge Base
  4570. Portable Web Application Penetration Testing Lab
  4571. Well done Sanyo (a great use of social media to get an urgent message out to the masses)
  4572. Use of infected Thumb Drives (USB Drives) is a major security weakness
  4573. Black Hat USA 2012 Top Picks
  4574. Microsoft IIS 6.0 PHP NTFS Stream Authentication Bypass
  4575. VMware Fusion 4.x < 4.1.3 (VMSA-2012-0009, VMSA-2012-0011)
  4576. Cisco AnyConnect Secure Mobility Client VPN Downgrade
  4577. Cisco AnyConnect Secure Mobility Client VPN Downloader Arbitrary Code Execution
  4578. Cisco AnyConnect Secure Mobility Client VPN HostScan Downgrade
  4579. MacOSX Cisco AnyConnect Secure Mobility Client Detection
  4580. MacOSX Cisco AnyConnect Secure Mobility Client Multiple Vulnerabilities
  4581. Symantec Message Filter Management Interface Default Credentials
  4582. Check_MK Agent Detection
  4583. Symantec Message Filter Multiple Vulnerabilities (SYM12-010)
  4584. IBM Lotus Domino Password Protected DB Enumeration
  4585. Basilic diff.php Command Injection
  4586. HP System Management Homepage < 7.1 Multiple Vulnerabilities
  4587. IrfanView FlashPix Plugin Heap Based Buffer Overflow
  4588. IrfanView Formats Plugin ECW Plugin File Handling Buffer Overflow Vulnerability
  4589. IrfanView Formats Plugin TTF File Buffer Overflow Vulnerability
  4590. IrfanView JPEG-2000 Plugin Remote Stack-based Buffer Overflow
  4591. Cisco WebEx ARF Player Buffer Overflow (cisco-sa-20120627-webex)
  4592. Cisco WebEx WRF Player Multiple Buffer Overflows (cisco-sa-20120627-webex)
  4593. Google Chrome < 20.0.1132.43 Multiple Vulnerabilities
  4594. FW/Proxy detection
  4595. Wireless Access Point Detection (PVS)
  4596. "Printer Bomb" spread using compromised .htaccess files
  4597. Hearing-aid hackers fine-tuning their own devices
  4598. Security On A Budget: Cracking Excel Passwords with vb Script
  4599. Man And Robot Linked By Brain Scanner
  4600. Android's Smartphones Used For Botnet
  4601. Schneier’s Thoughts on How to Break into Security
  4602. Pwn Plug Command Execution Using USB Sticks
  4603. Users enraged by Cisco's cloudy 'upgrade' to Linksys routers
  4604. Number of Serious Web Vulnerabilities Dropped in 2011, Report | SecurityWeek.Com
  4605. Cyberis Blog: Password Audit of a Domain Controller
  4606. Open Security Research: Hack Tips: CiscoWorks Exploitation
  4607. rewt dance: Exploiting Windows 2008 Group Policy Preferences - Expanded
  4608. rewt dance: BMC Remedy Password Descrambling
  4609. eHarmony Password Dump Analysis - SpiderLabs Anterior
  4610. RealNetworks Helix Server 14.x < 14.3.x Multiple Vulnerabilities
  4611. Flash player version detection
  4612. Outlook Social Connector version detection
  4613. Enhanced Botnet Detection
  4614. Active Inbound Connection From Host Listed in Known Bot Database
  4615. Cisco ASA 5500 Series DoS (cisco-sa-20120620-asaipv6)
  4616. Malicious Process Detection: Potentially unwanted software
  4617. MikroTik Winbox < 5.17 File Download DoS
  4618. Oracle iPlanet Web Server 7.0 < 7.0.15 Multiple Vulnerabilities
  4619. Winamp < 5.63 Multiple Vulnerabilities
  4620. ACDSee Pro < 5.2 Multiple Memory Corruption Vulnerabilities
  4621. HAProxy Trash Buffer Overflow Vulnerability
  4622. Quagga < 0.99.19 Multiple Vulnerabilities
  4623. CVSS for Penetration Test Results (Part I) - SpiderLabs Anterior
  4624. Apple’s iOS Security Overview – Intrepidus Group - Insight
  4625. More Disclosure of Vulnerabilities in Attacker Tools
  4626. Can You Stop a Targeted Attack?
  4627. How much will your driverless car know about you (and who will it tell)?
  4628. InfoSec Resources – Reconnaissance with Images
  4629. Too big to fail?
  4630. Two hackers plead guilty to LulzSec attacks on Web sites | Security & Privacy - CNET News
  4631. Users still slack about passwords: Trustwave
  4632. Kevin Mitnick to Kim DotCom: 'I hope you win'
  4633. Malicious Process Detection
  4634. iTunes < 10.6.3 Multiple Vulnerabilities
  4635. Tenable's Marcus Ranum Discusses "Why Passwords Aren't Secure"
  4636. Many vulnerable SAP systems exposed to the internet
  4637. Gartner: Web app firewalls can support secure application development
  4638. Code crackers break 923-bit encryption record
  4639. Top 10 fascinating facts about WWII code breaker Alan Turing - IT News from
  4640. Is What We Need…An OpSec K/T Boundary Extinction-Level Event?
  4641. Breach Notification in France
  4642. Targeted Malware for Industrial Espionage?, (Mon, Jun 25th)
  4643. The Importance of Cookie Recon
  4644. How to Break Into Security, Ptacek Edition
  4645. 3 Reasons Flame is a Game Changer
  4646. Roving Constant Contact E-mail Marketing Client Detection
  4647. Measuresoft ScadaPro Path Subversion Arbitrary DLL Injection Code Execution
  4648. MailEnable ForgottenPassword.aspx Username Parameter XSS
  4649. XnView
  4650. Rocket Software UniData
  4651. Kerio WinRoute Firewall Web Server Remote Source Code Disclosure
  4652. Windows 8 Harder For Malware?
  4653. Do You Scan with Network Security Controls Enabled or Disabled?
  4654. Who Doesn't Love Nerd Girls? | Digg Technology
  4655. Virtual analysis misses a third of malware
  4656. LinkedIn hit with $5M lawsuit over lost passwords
  4657. Falsehoods programmers believe about networks
  4658. Do Passwords Matter?
  4659. 587.txt
  4660. What Gets Measured, Matters
  4661. Top Four Mistakes Organizations Make When Breached
  4662. NT OBJECTives Releases New NTOEnterprise For Web Application Vulnerability Program Management
  4663. LastPass 2.0 Released but Beware Default PBKDF2 Setting
  4664. New Critical Microsoft IE Zero-Day Exploits in Metasploit
  4665. Joomla 2.5.5 security updates arrives with added features
  4666. Stogie Geeks - Cigar Podcast - Stogies - Elogio Habano Corona
  4667. Stogie Geeks - Cigar Podcast - Stogies - Viaje TNT (2011)
  4668. Stogie Geeks - Cigar Podcast - Stogies - Don Carlos Edicion de Aniversario
  4669. Stogie Geeks - Cigar Podcast - Stogies - Viaje Exclusivo Tower Cigars
  4670. Stogie Geeks - Cigar Podcast - Stogies - Liga Underdown Viva!
  4671. La Aurora Cien Anos Robusto
  4672. Cohiba Siglo II (2005
  4673. Tatuaje Capa Especial NHC
  4674. Opus X Rising 2009
  4675. Davidoff Millenium Pyramid
  4676. Padron 45th Anniversary Maduro
  4677. Davidoff Selecion 702
  4678. Paul Gamarian Symphony 20th (Toro)
  4679. La Flor Dominicana Conneticutt
  4680. EP Limitada 2010 Dark Ritual
  4681. Parsing Nessus CSV Reports with PowerShell
  4682. Encoding malicious PDFs avoids detection
  4683. Survey Says - Security Spending Going Up, Up, Up
  4684. How Intelligence Makes You Vulnerable
  4685. TippingPoint ZDI defectors launch new vulnerability buying program
  4686. Google warns about 'state-sponsored' hack attacks
  4687. Post-hack, companies fire back with their own attacks
  4688. Honeynet looks to trap USB malware
  4689. Tenable Network Security Reveals the Next Generation of Its SIEM Solution
  4690. Mozilla Thunderbird 12.x
  4691. Mozilla SeaMonkey 2.x
  4692. Mozilla Firefox 12.x
  4693. Chrome, Firefox, Opera and Safari (PVS)
  4694. MS12-036: Vulnerability in Remote Desktop Could Allow Remote Code Execution (2685939)
  4695. Citrix Provisioning Services Unspecified Request Parsing Remote Code Execution (CTX133039) (uncredentialed check)
  4696. F5 Multiple Products Root Authentication Bypass
  4697. Asterisk Remote Crash Vulnerability in Skinny Channel Driver (AST-2012-008)
  4698. iTunes
  4699. iTunes
  4700. WellinTech KingSCADA Detection
  4701. IBM WebSphere Application Server 8.0
  4702. VMSA-2012-0011 : VMware hosted products and ESXi and ESX patches address security issues
  4703. PHP 5.3.x
  4704. PHP 5.4.x
  4705. RuggedOS Web-Based Admin Interface Default Credentials
  4706. Security Advisory: IIS 6.0/7.5 Vulnerabilities [moderate risk] - ISOWAREZ BDAY RELEASE - security vulnerabilities database
  4707. BIG-IP network appliances remote access vulnerability
  4708. The Four Critical Security Flaws that Resulted in Last Friday's Hack - CloudFlare blog
  4709. Pentesting Web Services with Proprietary Formatted Input | Gremwell
  4710. SSH private key gives attackers access to BIG-IP appliances
  4711. UPDATE: Metasploitable 2!
  4712. UPDATE: PacketFence 3.4.0!
  4713. MySQL 1 Liner Hack Gives Root Access Without Password | Darknet - The Darkside
  4714. Teaching the Security Mindset
  4715. Why BYOD is the best problem IT departments ever faced
  4716. What the Security Features of Apple’s Mountain Lion Mean for the Enterprise
  4717. Password flaw leaves MySQL, MariaDB open to brute force attack
  4718. Exploit posted for vulnerable F5 kit
  4719. Cisco Zine: How to create self-signed certificates
  4720. Social Media: The Double-Edged Sword for the Security Community
  4721. MySQL 5.5
  4722. The Resilient Enterprise – Learning to Fail, Part 1
  4723. su: You’re doing it wrong
  4724. State of California & Rhode Island Websites Breached
  4725. 5 Ways You're Wasting Compliance Dollars
  4726. QuickBooks for Windows
  4727. PHP 5.3.x
  4728. Symantec Endpoint Protection Manager
  4729. Symantec Endpoint Protection Manager
  4730. ImageMagick
  4731. ImageMagick
  4732. ImageMagick
  4733. ImageMagick
  4734. Pretty Link Plugin for WordPress pretty-bar.php url Parameter XSS
  4735. Cobbler xmlrpc API power_system Method Remote Shell Command Execution
  4736. Firefox 12.x Multiple Vulnerabilities (Mac OS X)
  4737. Adobe AIR 3.x
  4738. Adobe AIR for Mac 3.x
  4739. Flash Player
  4740. Flash Player for Mac
  4741. Security vulnerability in MySQL
  4742. ISC Diary | IPMI: Hacking servers that are turned "off"
  4743. TheRook/subbrute · GitHub
  4744. Escaping Restricted Linux Shells
  4745. Week 23 in Review – 2012
  4746. Print bomb?, (Fri, Jun 8th)
  4747. How Does A Data Breach Affect Consumer Behavior?
  4748. VUPEN Breach? Tempest In A Teapot
  4749. Spear Phishing Attempt
  4750. Homeland Security as Security Theater Metaphor
  4751. LinkedIn dials 911 on password mega-leak hackers
  4752. Stogie Geeks - Cigar Podcast - Stogies - Arturo Fuente Shark
  4753. Stogie Geeks - Cigar Podcast - Stogies - La Aurora Escogidos
  4754. Bolivar Corona
  4755. EP Carrillo New Wave Short Run
  4756. Opus X Scorpio 2009
  4757. PG 15th Anniversary Torpedo
  4758. Julius Caesar Robusto
  4759. CroMagnon Anthrapology
  4760. Opus X LFMF 2009
  4761. Four Kicks from Crown Heads
  4762. La Aurora Cameroon Robusto
  4763. Camacho 11/18 Conneticutt
  4764. toolsmith: Security Investigations with PowerShell
  4765. Woes me information (cyber) security is hard
  4766. HUGE Microsoft security FAIL helped Flame virus spread - Computerworld Blogs
  4767. IPv6 Day 2012 – What Does It Mean?
  4768. It’s Time to Retire "Security" From Our Lingo
  4769. How security pros are handling data overload
  4770. SecurityTracker: Microsoft Windows Includes Some Invalid Certificates
  4771. Microsoft douses Flame
  4772. Tomorrow is World IPv6 Launch Day
  4773. Oracle Compliance Checks
  4774. DNSChanger Site Summary
  4775. Tenable Network Security's Jack Daniel to Present at Gartner Security & Risk Management Summit
  4776. Sharebar Plugin for WordPress sharebar-admin.php status Parameter XSS
  4777. Citrix XenApp Unspecified Remote DoS (CTX133159) (credentialed check)
  4778. Atlassian JIRA 5.0.1 XML Parsing Vulnerability
  4779. Ecava IntegraXor igcom.dll Traversal Arbitrary File Overwrite
  4780. HP SAN/iQ Root Shell Command Injection
  4781. Tornado
  4782. Bogus story: no Chinese backdoor in military chip
  4783. Adaptive User Interface Randomization As An Anti-Clickjacking Strategy
  4784. From LOW to PWNED [12] Trace.axd
  4785. Google's reCAPTCHA briefly cracked
  4786. Configuration Mistakes Make for Costly Security Gaps
  4787. Concerns Raised About Time Taken to Detect "Flame"
  4788. Apple Safari, QuickTime and iTunes (PVS)
  4789. Adobe AIR, Flash Player and Flash Media Server (PVS)
  4790. MySQL Server 5.5
  4791. phpMyAdmin simplexml_load_string() Function Information Disclosure (PMASA-2011-17)
  4792. phpMyAdmin 2.11.x / 3.3.x
  4793. Cisco ASA Cut Through Proxy Authentication Vulnerability
  4794. Symantec Web Gateway ipchange.php Shell Command Injection (SYM12-006) (intrusive check)
  4795. Security problem in VMware vSphere 5
  4796. The Cost of Fixing Vulnerabilities vs. Antivirus Software
  4797. NJ mayor and son arrested for hacking site criticising their administration
  4798. 0xAli`s blog » Blog Archive » wordpress version finder
  4799. FireEye Malware Intelligence Lab:Even Hackers Don't Like to Work Weekends: Email Attack Trends from Q1 2012
  4800. CVRF v1.1 | ICASI
  4801. Texas school district to track kids through RFID tags
  4802. The Flame: Questions and Answers - Securelist
  4803. Iran uncovers Stuxnet-style Flame attack - IT News from
  4804. Patch management still big stumbling block in risk management, survey shows
  4805. Researchers find backdoor in milspec silicon
  4806. Logitech debuts new Wireless Solar Keyboard K760 for Mac, iPhone, and iPad | Crave - CNET
  4807. Inquiry is told of 64 complaints against Secret Service agents; Colombia scandal not isolated
  4808. Web Application Penetration testing with Google Chrome Browser
  4809. Top 10 Most Searched Metasploit Exploit and Auxiliary Modules
  4810. Gaining Administrative Shell Access Via Command Injection
  4811. Anatomy of a security hole – the break that broke sudo | Naked Security
  4812. Security you won't hate - "Focus Group" - YouTube
  4813. Free Wi-Fi: Friend or Foe? Infographic
  4814. Remote Malware Deployment and a Lil’ AV Bypass
  4815. Dissecting A Hacktivist Attack
  4816. Nmap Port Scanner 6.00
  4817. Sudo Netmask Error Lets Remote Authenticated Users Bypass Host Access Controls
  4818. Defend your phone against loose networks? There’s an app for that
  4819. Indian SMBs Facing Advanced Attack Threats
  4820. Lego for girls, this time hardware-hacker style
  4821. How Curt Schilling's video game dreams turned toxic
  4822. You travelers in hotels, please send ViewSource/pcaps
  4823. Introducing EMET v3
  4824. From LOW to PWNED [10] Honorable Mention: FCKeditor
  4825. Carnal0wnage & Attack Research Blog: From LOW to PWNED [9] Apple Filing Protocol (AFP)
  4827. Microsoft Adopts CVRF Format for Security Bulletins
  4828. Microsoft program breach led to early RDP vulnerability exploit
  4829. Cable companies expand free Wi-Fi
  4830. Cyberwar: You're Doing It Wrong!
  4831. New Nessus Feature Added: CSV Export
  4832. Tenable Network Security Named Top ‘Cyber Warrior’ at Baltimore SmartCEO VOLT Awards
  4833. Apple Safari, QuickTime and iTunes
  4834. Antivirus Software Check
  4835. QuickTime
  4836. SolarWinds Storage Manager Server LoginServlet loginName Parameter SQL Injection
  4837. phpMyAdmin Replication Setup js/replication.js Database Name XSS
  4838. HP SNMP Agents
  4839. Pidgin OTR
  4840. iTunes AppleTV client detection
  4841. Apple Hardware Detection
  4842. Google Chrome
  4843. QuickTime
  4844. Real Networks RealPlayer
  4845. PHP-CGI Vulnerability Exploited in the Wild | Sucuri
  4846. Risks of High SPF Sunscreen – flyingpenguin
  4847. Angry Birds tops corporate mobile blacklist, Facebook, YouTube follow
  4848. Apple QuickTime update for Windows only; Macs already secure
  4849. Hacking CCTV Security Video Surveillance Systems with Metasploit
  4850. passdb: Kronos Workforce Central: SuperUser/kronites #password
  4851. PowerShell, Shellcode, metasploit, x64
  4852. .secure domains require proof of security
  4853. FBI fears BitCoins
  4854. Netgear WNDRMAC Information Disclosure ≈ Packet Storm
  4855. Wonderware Archestra SuiteLink Resource Consumption
  4856. Step on it: Virus could lead to motion-powered gadgets
  4857. Laptops at Security Conferences, (Mon, May 14th)
  4858. From LOW to PWNED [8] Honorable Mention: Log File Injection
  4859. 10 Symptoms Of Check-Box Compliance
  4860. PVS and Facebook Game Detection
  4861. Facebook Games
  4862. Mac OS X Multiple Vulnerabilities (Security Update 2012-002)
  4863. CVE-2012-1675 Oracle Database TNS Poison 0Day Video Demonstration
  4864. Breaking in to Security - Survey Conclusions, Part 1 - DigiNinja
  4865. Tampon-Shaped USB Drive
  4866. Security Fail
  4867. DNSChanger Trojan: Not All Doom and Gloom
  4868. Don’t let them scare you
  4869. Web Application Firewalls and the False Sense of Security They can Create
  4870. Jetting off abroad? Pack protection ... for your Wi-Fi
  4871. PHP devs lob second patch at super-critical CGI bug
  4872. Security error in OS X 10.7.3 exposes passwords for legacy FileVault users
  4873. MS12-029 / MS12-030: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2680352 / 2663830) (Mac OS X)
  4874. MS12-029: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352)
  4875. MS12-030: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2663830)
  4876. MS12-031: Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution (2597981)
  4877. MS12-032: Vulnerability in TCP/IP Could Allow Elevation of Privilege (2688338)
  4878. MS12-033: Vulnerability in Windows Partition Manager Could Allow Elevation of Privilege (2690533)
  4879. MS12-034: Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)
  4880. MS12-034: Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578) (Mac OS X)
  4881. MS12-035: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2693777)
  4882. VMware Backdoor Response Uninitialized Memory Potential VM Break
  4883. Stupid Human Tricks: Security Job Interviews
  4884. RuggedCom will block industrial control backdoor
  4885. FTP a Dead Protocol or Very Much Alive? « Fighting In.Security
  4886. Alert: OX X Lion update exposes encryption passwords
  4887. From LOW to PWNED [6] SharePoint
  4888. DNSChanger Monitoring
  4889. Policy - Usenet .nzb File Detection
  4890. Polycom VoIP Client Detection
  4891. CiscoWorks Common Services HTTP Response Splitting
  4892. MediaWiki
  4893. VMSA-2012-0009 : VMware Workstation, Player, ESXi and ESX patches address critical security issues
  4894. PHP Unsupported Version Detection
  4895. RuggedOS Telnet Server Default 'factory' Account Backdoor
  4896. Scrutinizer
  4897. Life as a nautical broadband specialist
  4898. Is it So Bad for the CIO to Report to the CFO?
  4899. CIOs: Will You Be Relevant in 2017?
  4900. Two Things I Wish Companies Cared More About: Cloud & Acquisitions Risks
  4901. For free Wi-Fi, please deposit your dog poop here
  4902. From LOW to PWNED [4] Browsable Directories
  4903. From LOW to PWNED [3] JBoss/Tomcat server-status
  4904. From LOW to PWNED [1] Exposed Services and Admin Interfaces
  4905. Advanced Attacks Call For New Defenses - Dark Reading
  4906. Wireless Printing in the Enterprise - Input Output
  4907. The 99% Goes Cyber
  4908. Iran makes its own anti-virus software – would you buy it?
  4909. Fun with Password Managers
  4910. Boeing Paying Hackers to Break into Their Systems
  4911. Software Inventory
  4912. Netstat Active Connections
  4913. Exploits By Platform
  4914. Skype client detection
  4915. Rockwell Automation Service detection
  4916. Intuit QuickBooks Help System Multiple Vulnerabilities
  4917. Juniper Junos J-Web CPU Utilization DoS (PSN-2012-04-547)
  4918. Juniper Junos SSH TACACS+ Incorrect Permissions (PSN-2012-04-545)
  4919. How To Hide From Face-Detection Software
  4920. Skype divulges user IP addresses - The H Security: News and Features
  4921. NfSpy – ID-spoofing NFS Client Tool – Mount NFS Shares Without Account
  4922. Who's tracking phone calls that target your computer? Stay Tuned to the ISC, (Sun, Apr 29th)
  4923. Nissan Confirms Cyber Attack and Network Breach
  4924. Vulnerability Management Evolution: Evolution or Revolution?
  4925. Google staff knew for years about Street View data breach
  4926. Inception | Break & Enter
  4927. CVSS – Vulnerability Scoring Gone Wrong « Neohapsis Labs
  4928. RuggedCom Owes its Customers an Explanation
  4929. Security Teams Need Better Intel, More Offense
  4930. Backdoor in industrial networking hardware
  4931. Macs more likely to carry Windows malware than Mac malware, study finds
  4932. OS X Mass Exploitation - Why Now?
  4933. Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
  4934. VMware confirms ESX source code had been stolen and published
  4935. Three No-Nos When Interviewing For an InfoSec Job
  4936. USB drive uses voice recognition for increased security
  4937. WordPress fixes file upload security problems
  4938. Firefox skirts Windows security feature to make silent updates happen
  4939. Monitor OS X LaunchAgents folders to help prevent malware attacks | MacFixIt - CNET Reviews
  4940. 15-year-old arrested for hacking 259 companies | ZDNet
  4941. XSS Shortening Cheatsheet « Neohapsis Labs
  4942. The Trouble with IPv6
  4943. Security Issues in IPv6 Transition
  4944. Real Networks RealPlayer < (Build Multiple Vulnerabilities
  4945. TeamViewer detection
  4946. Tenable Selected for DISA’s ACAS Vulnerability Management Solution
  4947. Tenable Network Security Named Assured Compliance Assessment Solution for the Defense Information Systems Agency
  4948. SSL Resume With Different Cipher Issue
  4949. Citrix XenServer vSwitch Controller < 2.0.0+build11349 Multiple Vulnerabilities
  4950. HP System Management Homepage < 7.0 Multiple Vulnerabilities
  4951. Mac OS X OSX/Sabpab Trojan Detection
  4952. IBM Tivoli Directory Server Web Administration Tool Unspecified XSS
  4953. Why You Should Turn Your Game Consoles Off
  4954. HP study finds widespread custom Web application flaws
  4955. Fun Hacking in a Bus - Traveling from New York to Toronto [Greyhound/Trailways]
  4956. Universal IPSec VPN client for Android 4.0
  4957. Android Trojan distracts Japanese with anime and porn
  4958. Techie gets naked to protest TSA
  4959. Should teachers and students be Facebook friends?
  4960. Anonymous Must Evolve Or Break Down, Say Researchers
  4961. Compliance isn't security, but companies still pretend it is, according to survey
  4962. Marriott Puts An End To Shady Ad Injection Service | TechCrunch
  4963. ISC Diary | Not your Parent's Wireless Threat
  4964. FBI: Smart Meter Hacks Likely to Spread — Krebs on Security
  4965. ISC Diary | SAMBA "root" credential remote code execution.
  4966. Week 15 in Review – 2012
  4967. "Phrack 68, better late than never."
  4968. Log Standards: Put Up, Shut Up, Give Up or Throw Up?
  4969. Stuxnet worm was planted by inside man
  4970. What not to do in cybersecurity compliance
  4971. Vulnerabilities, Exploits, and Good Dental Hygiene
  4972. Facebook Game - The Smurfs & Co Detected
  4973. VMSA-2012-0007 : VMware hosted products and ESXi/ESX patches address privilege escalation
  4974. nginx 1.0.7 - 1.0.14 / 1.1.3 - 1.1.18 ngx_http_mp4_module Buffer Overflow
  4975. Samba 3.x < 3.6.4 / 3.5.14 / 3.4.16 RPC Multiple Buffer Overflows
  4976. Snort IDS Events
  4977. Monitoring And Understanding User Activity
  4978. The Value of Web Exploitation
  4979. Applying Security Intelligence to Patch Management
  4980. Apple taking technical, legal action against Flashback malware
  4981. Dangerous Samba vulnerability affects all Linux systems
  4982. DDOS attacks on financial services firms explode
  4983. Malware-infected flash cards shipped out with HP switches
  4984. Computer software engineers have the best job in the world
  4985. Wicked exploit found in Linux WiFi
  4986. PHP 5.2.x filter_globals Subsequence Request Parsing Remote Code Execution
  4987. Apple's security code of silence: A big problem
  4988. Massive firewall vendor lets domain expire | DomainIncite - Domain Name News & Opinion
  4989. Hotel Wifi JavaScript Injection - Justinsomnia
  4990. Arms Race In Zero Days Spells Trouble For Privacy, Public Safety | threatpost
  4991. » Blog Archive » windows privilege escalation via weak service permissions
  4992. ModSecurity Advanced Topic of the Week: Automated Virtual Patching using OWASP Zed Attack Proxy - SpiderLabs Anterior
  4993. Week 14 in Review – 2012
  4994. 8 Simple Tips to Secure a Mac from Malware, Viruses, & Trojans
  4995. Russian AV company claims 600,000 Macs infected by Flashback
  4996. arms itself against misuse
  4997. Joomla! 2.5.4 closes more security holes
  4998. Lost Smart Phones and Human Nature
  4999. Are Facebook passwords fair game for employers?
  5000. Apple patches Mac Java zero-day bug
  5001. Week 13 in Review – 2012
  5002. SSL Chain Cert Fun with Nessus « Stack Exchange Security Blog
  5003. Mobile Device Vulnerability Management Flagged as Top Concern for Security Professionals in 2012
  5004. Security Pros Worry Most About Mobile Threats, But Most Have No Way To Detect Them
  5005. Curb Their Enthusiasm: CEO Optimism Can Be A Security Risk - Forbes
  5006. Week 10 in Review – 2012 | Infosec Events
  5007. Detection of possible Apple's iCloud service.
  5008. Apple iOS 3.0 through 5.0.1 Multiple Vulnerabilities
  5009. Tenable Network Security Certified as Approved Scanning Vendor (ASV) by PCI Security Standards Council
  5010. VMSA-2012-0003 : VMware VirtualCenter Update and ESX 3.5 patch update JRE
  5011. You Know What’s Dead? Security…
  5012. Proper Equipment Disposal
  5013. Support, Technical
  5014. Cisco Zine: Cisco Linksys WAG54GS CSRF Change Admin Password
  5015. Five ways to protect yourself from Wi-Fi honeypots
  5016. 5 signs that you've lost control over your cloud apps
  5017. Hackers penetrate smut site, claim to have slurped users' privates
  5018. Testing the Security of Virtual Data Centers
  5019. Slide Show: 10 Movie Scenes Of Authentication Worth Rewatching
  5020. Healthcare Security Pros Need To Speak The Language Of Finance
  5021. 5% of websites have had at least 1 SQL Injection vulnerability without needing to login
  5022. Engineer Shows TSA Nude Scanners are Useless
  5023. Ray Ozzie says the PC is dead
  5024. Stolen iPad leads to 780lb crystal meth seizure
  5025. The one tiny slip that put LulzSec chief Sabu in the FBI's pocket
  5026. Researchers find MYSTERY programming language in Duqu Trojan
  5027. Chrome Falls In First Five Minutes Of Hacking Contest
  5028. Wardriving for Zigbee
  5029. The Art of Keylogging with Metasploit & Javascript
  5030. Fixing Vulnerabilities On A Shoestring
  5031. US e-voting system cracked in less than 48 hours
  5032. Nmap Iptables Shell Script
  5033. Most organizations take months -- or years -- to discover a breach
  5034. How GitHub handled getting hacked
  5035. Polycom Web Management Interface Command Injection
  5036. iPhone photo-slurping loophole sparks app privacy fears
  5037. Stolen NASA laptop had Space Station control codes
  5038. Android a photo-slurper too: report
  5039. NASA lost 'full control' to hackers, pwned 13 times last year
  5040. toolsmith: Pen Testing with Pwn Plug
  5041. Experts avoid AV because they can - the rest of you should still use it
  5042. Week 9 in Review – 2012
  5043. Enumerating URLs from IP Addresses Using Bing’s Search API
  5044. '0-day exploit middlemen are cowboys, ticking bomb' | ZDNet
  5045. Southwest Airlines iPhone app vulnerable to hackers, study says | TechKnow Bytes — Colorado technology — The Denver Post
  5046. Horde Groupware contains backdoor - The H Security: News and Features
  5047. Using Metasm To Avoid Antivirus Detection (Ghost Writing ASM)
  5048. Computer Security Blog | Learning The Offensive Security: Bypassing Web Application Firewalls with SQLMap Tamper Scripts
  5049. Exploiting Sudo format string vunerability : VNSECURITY / CLGT TEAM
  5050.  InfoSec Institute – IT Training and Information Security Resources – WordPress Security: Plugins and Vulnerability Scanning Tools
  5051. Should we be focusing on vulnerabilities or exploits? | ZDNet
  5052. anti-virus rants: is the iphone really malware free?
  5053. How to survive the RSA and BSides Deconfalon
  5054. Adobe ships zero-day vulnerability patch for Flash Player
  5055. Russian polling cameras face DDoS attacks
  5056. Intel Chefs Bake WiFi Into Mobile Chips
  5057. Security Advisory: Vulnerabilities in D-Link DAP 1150 - security vulnerabilities database
  5058. PHP Vulnerability Hunter v. Released
  5059. Avi Rubin: All Your Devices Can Be Hacked
  5060. Twitter Enables HTTPS By Default At Last
  5061. PSA: Paula Deen, Sausage Pancake Egg Sandwiches & Security…
  5062. Why are we talking philosophy instead of technology?
  5063. I Want to Detect and Respond to Intruders But I Don't Know Where to Start!
  5064. The Cloud’s Low-Rent District
  5065. Continuous patching – is it viable in the enterprise?
  5066. I’ve always wondered how many vulnerable devices
  5067. Dumping Cleartext Credentials with Mimikatz
  5068. What people think industry analysts do
  5069. Jacking injection/fuzz strings for web hacking
  5070. Cisco Zine: Nmap for IOS? No, IOSMap
  5071. Employment for security professionals at all-time high
  5072. Android Security Threat From 'Reverse Smudge Engineering'
  5073. Adobe issues Flash Player update, fixes Adobe XSS zero-day flaw
  5074. The Sudafed Security Trade-Off
  5075. Been Caught Stealin'
  5076. Linux Live Environments: Cool Tools Even For Windows Folks
  5077. Penetration Tests: Not Getting 'In' Is An Option
  5078. Easy Directory Traversal with Burp
  5079. Some IDS comments
  5080. Standing Desk 2.0
  5081. Infosec: Where’s our “Long Tail”?
  5082. The Toughest Question in Digital Security
  5083. Forcing Flash to Play in the Sandbox
  5084. It all started with a Pillow Fight….
  5085. I’m Sorry I Called Your Baby Ugly … But It Is
  5086. Red Hat Network Satellite Server spacewalk-backend Remote and Local Password Disclosure
  5087. Trustwave admits issuing man-in-the-middle digital certificate, Mozilla debates punishment
  5088. Top 10 pirated movies in the world (infographic)
  5089. Keeping up with the hackers (chart)
  5090. How Many Monitors Is Too Many?
  5091. Caffeine fix? Now you can literally inhale it.
  5092. Don’t Stick That in There – HID (Human Interface Device)
  5093. [webapps] - OSCommerce v3.0.2 - Persistent Cross Site Vulnerability
  5094. Android and Security - Official Google Mobile Blog
  5095. FBI Conference Call Tapped By Antisec
  5096. Sophos 2012 Security Threat Report, (Fri, Feb 3rd)
  5097. Two Approaches to Managing Mobile Devices
  5098. Microsoft Internet Explorer 'Forced Tweet' Cross Domain
  5099. Remotely start your car using an Arduino
  5100. Apple revises Snow Leopard security update
  5101. 'Psycho Siri': Scariest Siri parody yet? | Crave - CNET
  5102. Job-seeking Marriott hacker gets 30 months' porridge
  5103. Satellite phone encryption cracked - Telegraph
  5104. PHP 5.3.10 fixes critical remote code execution vulnerability
  5105. Boardroom Spying for Fun and Profit
  5106. When will wearables be wearable?
  5107. Why I Love Routerpwn? Simplicity!
  5108. 10 SharePoint Security Mistakes You Probably Make
  5109. Basics of embedded firewalls - Exploding the myths
  5110. Firewalls and SSL: More Profitable than Facebook
  5111. Apple and Apache security fixes and releases, (Wed, Feb 1st)
  5112. Who’s Behind the World’s Largest Spam Botnet?
  5113. SocialShield Releases the Top Social Networking Terms Kids Don’t Want Their Parents To Know
  5114. Island Hopping the SpiderLabs Way
  5115. VeriSign Breached
  5116. Hacker extracts RFID credit card details
  5117. HTC Android phones expose Wi-Fi passwords to apps
  5118. Critical PHP vulnerability being fixed
  5119. Opera < 11.61 Multiple Vulnerabilities
  5120. Google Chrome < 16.0.912.77 Multiple Vulnerabilities
  5121. OpenSSL 0.9.8s DTLS Denial of Service
  5122. McAfee Security-as-a-Service (SaaS) mcCIOScn.dll ShowReport Method Remote Command Execution
  5123. WebSphere MQ Client < / Buffer Overflow
  5124. WebSphere MQ Server < / Buffer Overflow
  5125. HP Managed Printing Administration jobDelivery Script Directory Traversal (intrusive check)
  5126. HP Managed Printing Administration < 2.6.4 Multiple Vulnerabilities
  5127. HP Managed Printing Administration Detection
  5128. New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
  5129. Cisco Security Appliances at risk from Telnet bug
  5130. Symantec publishes pcAnywhere security recommendations
  5131. Why Your Company Needs To Hack Itself
  5132. Hacking Seen as Rising Risk With Car Electronics
  5133. When Antivirus Firms Can't Tell They've Been Hacked, We're All Doomed
  5134. Students busted for hacking computers, changing grades
  5135. Feds say Megaupload user content could be deleted this week
  5136. Warnings About Windows Exploit, pcAnywhere
  5137. Shmoocon Demo Shows Easy, Wireless Credit Card Fraud
  5138. Rootkit has rhythm
  5139. Iran To Execute Programmer
  5140. toolsmith: Security Onion
  5141. T-Mobile reused staff passwords
  5142. Using False Alarms to Disable Security
  5143. Why should senior management be involved in security decisions?
  5144. Rising Network Insecurity… and the Need to Re-examine Security Fundamentals
  5145. Understanding collisions and duplex in wireless
  5146. Microsoft Anti-XSS Library Bypass (MS12-007)
  5147. Why more APs aren’t always better
  5148. Basic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)
  5149. How To Run Penetration Tests From The Amazon Cloud - Without Getting Into Trouble
  5150. What the heck is SOPA?
  5151. Top 10 Trends In Information Security
  5152. I Left My Data In El Segundo - Dark Reading
  5153. Reflection Scan: an Off-Path Attack on TCP
  5154. Symantec admits to more exposed code
  5155. Dusseldorf airport closes security holes
  5156. Cisco IP Video Phone E20 Default Account Lets Remote Users Obtain Root Access
  5157. Into the cloud -- securely
  5158. Fundamental Oracle flaw revealed
  5159. Secunia sets six-month deadline for vulnerability disclosures
  5160. Custom Wineador™ Creations - Home
  5161. Five Principles To Better Your Security Monitoring
  5162. Wireshark 1.4.x and 1.6.x updates close security holes
  5163. PHP 5.3.9 released with hash DoS fix
  5164. Recovering a Hacked Gmail Account
  5165. 10 years of breach
  5166. Sysinternals Updates -, (Fri, Jan 13th)
  5167. PRC Targeting DoD Smart Cards
  5168. Time to check your DNS settings?
  5169. Windows Live may be a vulnerability for Xbox Live users
  5170. Zappos Says Hackers Accessed 24 Million Customers' Account Details
  5171. ACROS Security Blog: Is Your Online Bank Vulnerable To Currency Rounding Attacks?
  5172. Flying the Fraudster Skies
  5173. How Come My Blog/Podcast Wasnt Nominated?
  5174. Best Book Bejtlich Read in 2011
  5175. An example of likejacking (Facebook clickjacking)
  5176. Google Renews Push Into China
  5177. [Honeypot Alert] Extensive ‘setup.php" Scanning Detected
  5178. Show me your SSID’s, I’ll Tell Who You Are!
  5179. How a Baptist pastor in Florida became the go-to IT guy
  5180. Robot Makers Not Thrilled To Be Stuck Next To Justin Bieber ≈ Packet Storm
  5181. Apple, RIM deny claims of data backdoor for Indian government
  5182. "Can you be forced by law to decrypt your computer? US v. Fricosu court case rages on"
  5183. When Someone Else's Insider is Your Threat
  5184. The inconvenient truth about passwords
  5185. Oracle: Firewalls Against SQL Injection Are a Good Idea After All
  5186. Why Security Does Not Concern Generation Y
  5187. Microsoft denies Xbox Live security breach
  5188. Smart meter SSL screw-up exposes punters' TV habits
  5189. HP sneaks out printer firebomb firmware security fix
  5190. Apple patent stashes passwords in chargers
  5191. Paul Ryan turns against SOPA following a Reddit-based attack
  5192. Adobe to release zero-day fixes for Reader and Acrobat
  5193. Microsoft finally vanquishes the BEAST-related bug
  5194. Microsoft releases MS11-100 for Security Advisory 2659883
  5195. WPS Security on Wireless Access Points pwn3d: VIDEO
  5196. When to Give Your Girlfriend Your Password
  5197. Hacking group releases more Stratfor subscriber data - Computerworld
  5198. The Most Influential Voices in Security
  5199. Patator – Multi Purpose Brute Forcing Tool
  5200. Wi-Fi Protected Setup (WPS) PIN Brute Force Vulnerability, (Fri, Dec 30th)
  5201. "Hacking Google for Fun and Profit"
  5202. Is Code Quality Seasonal?
  5203. The Siemens SIMATIC Remote, Authentication Bypass (that doesn’t exist)
  5204. Password Improvements Coming To Windows 8
  5205. Reversing Industrial firmware for fun and backdoors I
  5206. Not 0wning That ColdFusion Server but Helping...
  5207. Splunk Remote Root Exploit
  5208. A look back at 2011’s security landscape
  5209. "Ettercap updated after more than seven years."
  5210. "PuTTY Stored Plaintext Passwords in Memory After Authentication"
  5211. DARPA Shredder Challenge
  5212. Path of Least Resistance : FishNet Security
  5213. VLAN Hacking |  InfoSec Institute – IT Training and Information Security Resources
  5214. Prepping for 2012: 3 Tips When Speaking to the Board of Directors
  5215. Metasploit Pentest Plugin Part 1
  5216. Top 5 mobile phone security threats in 2012
  5217. VPN An Oft-Forgotten Attack Vector
  5218. Microsoft gets silent upgrade religion, will push IE auto-updates
  5219. Feds cuff KISS rock star's DDoS suspect
  5220. Backdoors in industrial control systems
  5221. Can Security Teams And DBAs Play Nicely?
  5222. Study: Chrome the most secure browser
  5223. Dumbest Camera Ban Ever
  5224. BonkersWorld: Backwards Compatibility
  5225. Shamir’s predictions of the future
  5226. Two Bets on 2012
  5227. 8 Out of 10 Software Apps Fail Security Test
  5228. MS11-080 - A Voyage into Ring Zero
  5229. Two zero-day vulnerabilities found in Flash Player
  5230. The security threat Stephen King warned us about?
  5231. Chief Hava's Top Cigars of 2011 (Honorable Mentions)
  5232. Cigar Tip: Give the Gift of Cigars this Christmas
  5233. Security Advisory: [security bulletin] HPSBPI02728 SSRT100692 rev.1 - Certain HP Printers and HP Digital Senders, Remote Firmware Update Enabled by Default - security vulnerabilities database
  5234. nCircle Patterns Blog: Which Half of Your Business Are You Protecting?
  5235. HP Faces Class Action Lawsuit Over Printer Software Vulnerability
  5236. Facebook glitch gave access to other users' private pictures
  5237. "apologises" for bundling
  5238. Staff to be banned from sending emails - Telegraph
  5239. Carnal0wnage & Attack Research Blog: Embeding A Link To A Network Share In A Word Doc
  5240. Hacking On A Dime: “Hacking” Printers - PJL Basics
  5241. Top 5 Security Influencers
  5242. sslyze – Fast and Full-Featured SSL Configuration Scanner
  5243. 3 Common Ways Security Fails People
  5244. How being Green Makes You Stink at Security: Print Bigger
  5245. Aggressive Mode VPN — IKE-Scan, PSK-Crack, and Cain
  5246. Justin Bieber stabbed by a crazed fan? It’s a Facebook scam
  5247. Week 48 In Review