PaulsBonusStories

From Security Weekly Wiki
Jump to navigationJump to search
  1. Distributed Guessing Attack Reels in Payment Card Data
  2. Hackers Waste Xbox One, PS4, MacBook, Pixel With USB Zapper
  3. Building Your Application Security Program: The People Problem
  4. Evilgrade - The Update Exploitation Framework 2.0.8
  5. Kaspersky Lab Report Identifies Top Data Breach Causes
  6. More Banks Plundered Through SWIFT Attacks
  7. Instagram Makes It Easier To Stalk Users
  8. New Cloud Attack Takes Full Control Of Virtual Machines With Little Effort
  9. Facial recognition can be tricked with Facebook photos
  10. VxWorks: Execute My Packets | Exodus Intelligence
  11. Epic Games Forums Hacked, SQL Injection Vulnerability Blamed
  12. Leaked ShadowBrokers Attack Upgraded to Target Current Versions of Cisco ASA
  13. Americans want passwords, not biometrics, survey finds
  14. Hacking smart cities: Dangerous connections
  15. How Bitcoin Helped Fuel An Explosion In Ransomware Attacks
  16. EFF Slams Disregard For User Privacy With Windows 10
  17. Four In Five Android Devices Inherit Linux Snooping Flaw
  18. Ashley Madison Agrees To Security Overhaul After Damning Report
  19. What Mr. Robot Can Teach Businesses About Security
  20. Unsecured DNSSEC Easily Weaponized, Researchers Warn
  21. GPG Patches 18-Year-Old Libgcrypt RNG Bug
  22. How to disable WPAD on Windows so hackers can't hijack your computer
  23. Hacker Jeopardy: When manhood is the question at Defcon - CNET
  24. Snowden Thinks Russia Hacked The NSA
  25. Baltimore Police Accused Of Illegal Mobile Spectrum Use With Stringrays
  26. Iran Investigating Possible Cyber Angle On Oil Fires
  27. Kaspersky Uncovers Malware Riding On The Back Of Google Adsense
  28. IoT Sockets Make For Another Big Security Problem
  29. People Ignore Security Alerts Up To 90% Of The Time
  30. Is Russia Hacking The US Election?
  31. Fortinet Follows Cisco In Confirming Shadow Broker Vuln
  32. Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
  33. Frequent Password Changes Is a Bad Security Idea
  34. Facebooks favorite hacker is back with an ironic security hole
  35. Raucous Ruckus router ruckus roundly rumbles: Infosec bod says Wi-Fi kit is weak, biz says no
  36. Patch vBulletin, or get popped
  37. Linux malware? That'll never happen. Ok, just this once then
  38. The Pwnies Have Been Awarded
  39. Apple Starts A Bug Bounty Program
  40. Rise Of The Hacking Machines
  41. How Many Zero-Day Vulns Is Uncle Sam Sitting On?
  42. Flaw In Samsung Pay Lets Hackers Wirelessly Skim Credit Cards
  43. Big Red Alert: Oracle's MICROS Payment Terminal Biz Hacked
  44. Project Sauron Malware Was Hidden For Five Years
  45. Half Of All Connected Cars Have Security Vulnerabilities
  46. Microsoft Proves Backdoor Keys Are A Terrible Idea
  47. Nobody Knows What Cyberattacks Really Cost
  48. Hackers could weaponize up to a billion monitors to spy on everyone
  49. NIST Recommends SMS Two-Factor Authentication Deprecation
  50. Saved from ransomware thugs... by rival ransomware thug
  51. Cloud Adoption Grows as Security Lags
  52. Snowden Designs Phone Case To Spot Hack Attacks
  53. The End Of Yahoo: Why Verizon Spent Big
  54. TechCrunch Defaced By Self-Professed White Hats
  55. Osram Lightify Light Bulbs Vulnerable To Hack
  56. Hackers Could Sniff Out Your Passwords If You're Typing Nearby
  57. Zero-day hole can pwn millions of LastPass users, all that's needed is a malicious site
  58. Airbus Is Making Drone Killers
  59. Guest Diary, Etay Nir: Flipping the Economy of a Hacker, (Wed, Jul 20th)
  60. Everything You Need To Know About Web Shells
  61. Drone operator arrested for flying over wildfire
  62. SeaWorld hacker and bomb hoaxer escapes prison sentence
  63. Alex Gibney on Stuxnet and why we need to talk about cyberwar
  64. Adobe, Microsoft Patch Critical Security Bugs Krebs on Security
  65. Gotta Catch Em All! WORLDWIDE! (or how to spoof GPS to cheat at Pokmon GO) - Insinuator
  66. Is Cloud Computing Really Secure? A Pragmatic Approach
  67. Update now: Macs and iPhones have a Stagefright-style bug!
  68. Ransomware on the Cheap
  69. 15 Vulnerabilities in SAP HANA Outlined
  70. EFF Files Lawsuit Challenging DMCAs Restrictions on Security Researchers
  71. The Mr. Robot Easter Egg Hunt Has Begun
  72. Bruce Schneier Joins The Tor Project
  73. Cisco Gives You Two Nasty Bugs To Fix Before The Weekend
  74. Thanks, Script Kiddies: 100 Gbps DDoS Attacks Now Commonplace
  75. Hackers Claim Credit For Crashing Pokemon Go
  76. IoT Insecurity: Pinpointing The Problems
  77. The coolest US agency is starting a revolution to get rid of computer viruses
  78. WikiLeaks under 'sustained attack' after announcing release of Turkey docs - CNET
  79. IoT spurs surprise surge in assembly language popularity | InfoWorld
  80. Criminals plant banking malware where victims least expect it | Ars Technica
  81. Pokemon Go has a really, REALLY serious Google security issue right now
  82. Enterprises leave vulnerable industrial control systems exposed online
  83. The FBI Says Its Malware Isnt Malware Because the FBI Is Good
  84. Fear My $50 Charger, For It Controls Your Android Phone's Keyboard
  85. MIT Anonymity Network Riffle Promises Efficiency, Security
  86. Drupal Patches Remote Code Execution Vulnerabilities in Three Modules
  87. Food Chain Wendy's Hit By Massive Hack
  88. HTTPS Is Not A Magic Bullet For Web Security
  89. Kim Dotcom Plans 2017 Relaunch Of Megaupload
  90. VPN Provider Claims Russia Seized Its Servers
  91. FDIC Was Hacked By China, And The CIO Covered It Up
  92. Juniper's Bug Hunters Fire Out Eight Patches
  93. Visiting a Website against the Owner's Wishes Is Now a Federal Crime
  94. Rigged YouTube videos can use Siri and Google Now to hijack your phone
  95. Fake Pokmon GO app watches you, tracks you, listens to your calls
  96. Drupal: Patch released today to fix a highly critical RCE in contributed modules, (Wed, Jul 13th)
  97. Password Sharing Is Now a Crime
  98. European Unions First Cybersecurity Law Gets Green Light - Bloomberg
  99. Researcher pops locks on keylogger, finds admin's email inbox The Register
  100. SSD Advisory Wget Arbitrary Commands Execution SecuriTeam Blogs
  101. UPC UBEE EVW3226 WPA2 Password Reverse Engineering, rev 3
  102. How Sony, Microsoft, and Other Gadget Makers Violate Federal Warranty Law | Motherboard
  103. Alarm systems alarmingly insecure. Oh the irony | Pen Test Partners
  104. Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
  105. A Case Study in Attacking KeePass harmj0y
  106. FBI Director: Clinton Emails Were Careless, Not Criminal
  107. Nasty BIOS bug slugs Gigabyte, hackers say
  108. Top Router Maker TP-Link Loses Control Over Configuration Domain
  109. D-Link Wi-Fi Camera Flaw Extends to 120 Products
  110. Celebgate Nudes Hacker Pleads Guilty
  111. Silent Circle Killed Their Warrant Canary
  112. New Backdooring Mac Malware Discovered
  113. WikiLeaks Downed In Apparent Heavyweight Hacker Feud
  114. Palo Alto Offers $16,000 In Looming CTF Hack Off
  115. Symantec Won't Fix Catastrophic Flaws Until Mid-July
  116. OpenIOC Sharing Threat Intelligence
  117. Facebook Using Physical Location to Suggest Friends
  118. What is your most unusual User-Agent?, (Wed, Jun 29th)
  119. Interview with an NSA Hacker
  120. Google Play Hit with Rash of Auto-Rooting Malware
  121. Planes, Trains and Automobiles Increasingly in Cybercriminals Bullseye
  122. Conficker Used in New Wave of Hospital IoT Device Attacks
  123. Ransomware targets corporate Office 365 users in 0-day campaign
  124. A hacker wants to sell 10 million patient records on the black market
  125. One Picture Can Unlock All Your Apps
  126. US Hospitals Hacked With Ancient Exploits
  127. Malware Spawns Botnet In 25,000 Connected CCTV Cameras
  128. The Top 5 Security Threats, And How To Defend Against Them
  129. Facebook 'Hack' Victim Exposes Passport Scam
  130. Symantec Flaws As Bad As It Gets, Claims Google's Project Zero
  131. Hackers Note That Most Breaches Just Need Normal Admin Tools
  132. Judge says the FBI can hack your computer without a warrant
  133. GitHub - RedBalloonShenanigans/MonitorDarkly: Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.
  134. ASUS UEFI Update Driver Physical Memory Read/Write codeinsecurity
  135. Verizon Patches Serious Email Flaw That Left Millions Exposed | Threatpost | The first stop for security news
  136. Email Servers For More Than Half of Worlds Top Sites Can Be Spoofed
  137. WordPress Security Update Patches Two Dozen Flaws
  138. AirPort owners: Apple's patched a mystery vuln
  139. 'Plane Hacker' Roberts hacks cows
  140. Stuxnet was the opening shot of decades of non-stop cyber warfare
  141. T-Mobile Rep Sells 1.5 Million Customer Records
  142. Google Turns To Codeless Tap Factor Authentication
  143. Mark Zuckerberg is paranoid about webcam spies for good reason
  144. Fraudsters are Buying IPv4 Addresses
  145. Tor coders harden the onion against surveillance
  146. WordPress Patches Zero Day in WP Mobile Detector Plugin
  147. Like Macros Before It, Attackers Shifting to OLE to Spread Malware
  148. Dont run JS email attachments: they can carry potent ransomware
  149. Hack The Pentagon Shutters 100 Bugs
  150. Database Corruption Erases 100,000 Air Force Investigation Records
  151. Russian Government Hackers Spent One Year Inside Our Servers, Admits DNC
  152. DeadUpdate: Kickin' it bigtime. GitHub
  153. NSA Using Insecure Word Macros
  154. Infecting Systems by Typosquatting Programming Language Libraries
  155. Github hit by massive password guessing attack
  156. BadTunnel: a vulnerability all Windows users need to patch
  157. Google To Shame Partners That Don't Offer Android Updates Quickly
  158. Reddit Resets 100,000 User Passwords After Surge In Hacked Accounts
  159. Adobe Flash: 6 Tips For Blocking Exploit Kits
  160. SandJacking Attack Puts iOS Devices At Risk to Rogue Apps
  161. Facebook Messenger may soon add end-to-end encryption
  162. How the Top 5 PC Makers Open Your Laptop to Hackers
  163. Microsoft Windows zero-day exploit hits the market with $90,000 price tag
  164. Printer security: Is your company's data really safe?
  165. Myspace data breach: 360 million accounts affected
  166. Report: IT Professionals Far Removed From Reality On Security
  167. Your WordPress and Drupal installs are probably obsolete
  168. Moxa Discontinuing Vulnerable Line of ICS Devices
  169. Shhhh! Facebook Is Listening
  170. TeamViewer denies hack, as users claim computers remotely hijacked
  171. Has TeamViewer Been Hacked?
  172. Google Feature Finally Addressing The 'I Lost My Phone' Problem
  173. Lenovo Tells Users to Uninstall Vulnerable Updater
  174. Google Patches Two High-Severity Flaws in Chrome
  175. Jeremiah Grossman: Life is Better without Username Reuse (email aliases FTW!)
  176. Jeremiah Grossman: 7 Tips to Get the Absolute Best Price from Security Vendors
  177. Apple hires crypto-wizard Jon Callas to beef up security
  178. APT Groups Finding Success with Patched Microsoft Flaw
  179. Google To Kill Passwords On Android
  180. Pastejack Attack Turns Your Clipboard Into A Threat
  181. Microsoft Bans Common Passwords That Appear In Breach Lists
  182. Anonymous Ops Trending, Where are the Other Hacktivists?
  183. Looking for Trouble
  184. When domain names attack: the WPAD name collision vulnerability
  185. Elders way better at password security than millennials
  186. Inside the world's second worst exploit toolkit
  187. 5 Reasons Enterprises Still Worry About Cloud Security
  188. Microsoft Disables Wi-Fi Sense on Windows 10
  189. 2012 LinkedIn Breach Just Got a Lot Worse: 117 Million New Logins For Sale
  190. Ubiquiti Networks Gear Targeted By Worm
  191. SkinTrack Turns Your Arm Into a Touchpad. Heres How It Works
  192. Apple bans Stefan Esser's iOS security info app
  193. OkCupid Study Reveals the Perils of Big-Data Science
  194. Google Chrome Will Switch Off Flash Content By Default
  195. Hacker Fans Give Mr. Robot Website Free Security Checkup
  196. TeslaCrypt's Master Key Released To The Public
  197. Vidyo Flaw Leaks Videos And Local Files
  198. You'll still be able to hack Linksys WRT routers with open source firmware despite new FCC rules
  199. Torvalds on the Internet of Things: Security plays second fiddle
  200. Windows 10 won't let you share WiFi passwords any more
  201. Hacker Finds Vulnerability In Mr Robot Website
  202. GCHQ Wants You To Stop Resetting Your Password
  203. Kiddicare Compromised
  204. Panama Papers Now Searchable
  205. Researcher Arrested For Disclosing Election Vulnerabilities
  206. WordPress Redirect Hack via Test0.com/Default7.com - Sucuri Blog
  207. Caleb Madrigal
  208. Freaking out over the DBIR
  209. 5 Things Devs Wish CISOs Knew About DevOps
  210. Top 3 Reasons Why Neglecting Application Security Is Risky Business
  211. Economist Detained for Doing Math on an Airplane
  212. The day we discovered our parents were Russian spies | World news | The Guardian
  213. Push Your ICS Vendor / Integrator To Do It Right
  214. Wendys: Breach Affected 5% of Restaurants
  215. Wendys admits to payment card malware infection
  216. Pornhub bug bounty program will pay hackers up to $25,000
  217. Documenting the Chilling Effects of NSA Surveillance
  218. I'm Writing a Book on Security
  219. Lean Threat Intelligence, (Mon, May 2nd)
  220. Bringing HTTPS to all blogspot domain blogs
  221. Practical Reverse Engineering Part 2 - Scouting the Firmware Hack The World
  222. Economy of mechanism The road to hell is paved with SAML Assertions
  223. Jailbreaking the Microsoft fitness band b0n0n's cottage
  224. haxx.ml Hacking Mattermost: From Unauthenticated to System...
  225. Building a Home Lab to Become a Malware Hunter - A Beginners Guide | AlienVault
  226. GitHub - reverse-shell/routersploit: The Router Exploitation Framework
  227. SAST vs PEN TESTING
  228. Snort Lab: Custom SCADA Protocol IDS Signatures
  229. IoT Security: Medical Devices Are the Next Target for Hackers
  230. Why it would have been a relief to know whos behind bitcoin
  231. 10-year-old Finnish boy uncovers Instagram comments vulnerability
  232. Are Your Web Applications Vulnerable to ImageTragick? Scan Them with Netsparker
  233. Craig Wright Revealed As Bitcoin Creator Satoshi Nakamoto
  234. I Am Craig Wright, Inventor Of Craig Wright
  235. Miniature Car Maker Drops Massive Malware
  236. How The Pwnedlist Got Pwned
  237. Instagram Hacked By 10-Year-Old Boy
  238. Two highly dangerous OpenSSL security bugs have been patched
  239. Kippos Cousin Cowrie, (Wed, Apr 27th)
  240. Gamekeeper turns poacher? The ex-Tor developer who unmasked Tor users for the FBI
  241. US-CERT to Windows Users: Dump Apple Quicktime Krebs on Security
  242. Linux infosec outfit does a Torvalds, rageblocks innocent vuln spotter
  243. Time for a patch: six vulns fixed in NTP daemon
  244. Batten down the hatches! OpenSSL preps fix for high impact vuln
  245. Spotify Denies Hack After Users' Personal Data Shows Up On Pastebin
  246. Businesses Pay $100,000 To DDoS Extortionists Who Never DDoS Anyone
  247. All Phones In India To Be Equipped With Panic Buttons From 2017
  248. Why its easier to fix a broken product than a broken team
  249. German Nuclear Power Plant Infected With Malware
  250. 10 Newsmakers Who Shaped Security In the Past Decade
  251. How To Stay Secure At The Hotel On A Business Trip
  252. Opera is the first big web browser with a built-in VPN
  253. Hackers turn their back on exploiting Java to focus on Flash flaws
  254. Misunderstanding Indicators of Compromise
  255. Security Lessons from C-3PO, Former CSO of the Millennium Falcon
  256. Cisco Patches Denial-of-Service Flaws Across Three Products
  257. 29% of Android devices cant be patched by Google
  258. How Hacking Team Got Hacked
  259. Judge tosses evidence obtained by FBI malware planted on dark website
  260. Hyping vulnerabilities is no longer helping application security awareness | TechCrunch
  261. RDP Replay Code Release
  262. Cisco Talos Blog: Ransomware: Past, Present, and Future
  263. Millions of Arris cable modems vulnerable to denial-of-service flaw | ZDNet
  264. 'CyberUL' Launched For IoT, Critical Infrastructure Device Security
  265. NoScript and other popular Firefox add-ons open millions to new attack | Ars Technica
  266. Practical Reverse Engineering Part 1 - Hunting for Debug Ports Hack The World
  267. SANS Penetration Testing | Scapy Cheat Sheet from SANS SEC560 | SANS Institute
  268. Windows 10 debuts Blue QR Code of Death and why malware will love it
  269. New JavaScript attack infects your phone and changes your router's DNS settings
  270. 0-day exploits more than double as attackers prevail in security arms race
  271. Journalist sentenced to 24 months in prison after hacking-related conviction
  272. New report claims gray hat hackers, not Cellebrite, helped crack San Bernardino iPhone
  273. Is Cloud Security An Exaggerated Concern? - Dark Reading
  274. Explicit Furry Podcast Airs On US Radio After Hack
  275. Half Of People Plug In USB Drives They Find In The Parking Lot
  276. Do US universities deserve an F in teaching cybersecurity?
  277. Weve got stalkers in our pockets
  278. Blackhole Exploit Kit Author Gets 8 Years
  279. BADLOCK Are Branded Exploits Going Too Far?
  280. The ransomware attack that knows where you live
  281. Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers -
  282. IoT IP camera teardown and getting root password
  283. Neighbour sick of you parking in his driveway? You'd better hack-proof your car
  284. Hacking Team lost its license to sell surveillance malware outside Europe
  285. Reddit Has Lost Its Warrant Canary
  286. Hacker Reveals $40 Attack That Steals Police Drones From 2km Away
  287. Turkey's Entire Citizenship Database May Have Been Leaked
  288. Hackers Demo Persistent, Quiet Attacks Through Windows DSC
  289. How To Make Big Bucks Hunting Cyber Bugs
  290. Defenders Need to Embrace Offensive Security Skillsets
  291. The latest Flash zero-day was used to spread Cerber ransomware
  292. Healthcare Organizations Must Consider The Financial Impact Of Ransomware Attacks
  293. China's Great Firewall inventor forced to use VPN live on stage to dodge his own creation
  294. Your car's computers might soon get malware protection
  295. Ubuntu Patches Kernel Vulnerabilities
  296. OSVDB Shuts Down For Good
  297. Flash zero-day in the wild to be fixed by Adobe
  298. FBI: $2.3 Billion Lost to CEO Email Scams
  299. Waaay Too Many Things Are Exposing VNC On The Internet
  300. Six Charged For Hacking Lottery To Spew Only Winning Tickets
  301. A Hundred Million Truecaller Users Vulnerable To Privacy Bug
  302. Some Old SAP Systems Have Default Kernel User Accounts
  303. LiveJournal Hit With Angler Exploit Kit
  304. FBI Investigates Hacks Against U.S. Law Firms
  305. Bash, better biometric security, Cortana and a flood of chatbots coming to Windows 10
  306. Cisco, Snort Scramble To Plug Malware Hole
  307. Nearly 1,500 Vulnerabilities Found In Automated Medical Equipment
  308. New self-protecting USB trojan able to avoid detection
  309. SDR Radio Academy: Reverse engineering a wireless car key fob.: phasenoise
  310. More on Purple Teaming Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
  311. [1]
  312. How to Avoid a Kings Ransom
  313. Dark Webs got a bad rap: 7 in 10 want it shut down
  314. 1418 Vulnerabilities In A Medical Device What Now?
  315. Ports Are Meaningless
  316. Stealthy USB Trojan hides in portable applications, targets air-gapped systems
  317. Mobile Security: Why App Stores Don't Keep Users Safe
  318. FBI Cybers Most Wanted
  319. TP-Link blocks open source router firmware to comply with new FCC rule | Ars Technica
  320. Once thought safe, DDR4 memory shown to be vulnerable to Rowhammer | Ars Technica
  321. What does Oman, the House of Cards, and Typosquatting Have in Common? The .om Domain and the Dangers of Typosquatting | ENDGAME
  322. Emergency Java Patch Re-Issued for 2013 Vulnerability
  323. FBI Warns On Risks Of Car Hacking
  324. MITRE Rolls Out New CVE System After Reg Reveal
  325. Only 0.1% Of You Are Doing Web Server Security Right
  326. Hacktivists caught tampering with water treatment plant
  327. Firmware bug in CCTV software may have given POS hackers a foothold
  328. Researchers Find Hole In SIP, Apple's Newest Protection Feature
  329. Vulnerability Scanners Turn Up Mostly False Positives
  330. Ironic: CCTV systems slide open a backdoor into your biz network
  331. Surprise! You have mystery PCs
  332. Attackers Packing Malware Into Powershell
  333. Threat Intelligence's Big Data Problem
  334. Even Sex Toys Arent Safe From Hackers, Tech Companies Warn
  335. It is time to prioritize security for Internet of Things and wearables
  336. Hotel light control hack illuminates lamentable state of IoT security
  337. Amazon goes after patent so you can pay by selfie
  338. LinkedIn Being Used To Prime Phishing Targets
  339. One of the Celebgate hackers pleads guilty to phishing iCloud and Google logins
  340. Home Depot To Pay $19.5 Million In Data Breach Settlement
  341. Safari, Flash Fall at Pwn2Own 2016 Day One
  342. SSH Honeypots (Ab)used as Proxy, (Sun, Mar 13th)
  343. Defence In Depth For Web Applications
  344. Erin Andrews awarded $55m over nude video shot through hotel door peep hole
  345. My last days at WhiteHat and setting sights on the future
  346. Why Your Security Tools Are Exposing You to Added Risks
  347. Quick Analysis of a Recent MySQL Exploit - SANS Internet Storm Center
  348. HTCAP
  349. A Warning for Wearables: Think Before You Emote
  350. Patch Management Still Plagues Enterprise
  351. DROWN Vulnerability Remains High Risk, Firms Say
  352. Trivial Path For DDoS Amplification Attacks Found
  353. Boffins Bust Biometrics With Inkjet Printer
  354. Security market to exceed $170 billion by 2020, analysts say
  355. Opera Becomes First Major Web Browser to Introduce Native Ad-Blocking Feature
  356. The @ legacy of Ray Tomlinson
  357. Before Moving on From RSA
  358. Cisco Patches A Bunch Of Cable Modem Vulns
  359. Tablets dead after six years
  360. Palo Alto Networks CEO At RSA: Security Isn't About Technology, It's About Trust
  361. Apple Reissues Security Update After Blocking Ethernet on Mac OS X
  362. Samsung now shipping 15.36TB PM1633a SSD -- world's largest capacity solid state drive
  363. Reinvented Ransomware Now Targeting WordPress Sites
  364. Over 700 Million Records Breached In 2015
  365. Is Your Smartphone Listening To You?
  366. DROWN Flaw Illustrates Dangers Of Intentionally Weak Crypto
  367. Hardcoded God-Mode Code Found In RSA 2016 Badge-Scanning App
  368. I got hacked mid-air while writing an Apple-FBI story
  369. Troy Hunt: Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs
  370. GitHub - firmadyne/firmadyne: Main repository
  371. GitHub - AFITWiSec/EZ-Wave: Tools for Evaluating and Exploiting Z-Wave Networks using Software-Defined Radios.
  372. CCDC Quals Notes (metasploit) Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
  373. Hacker Summer Camp Planning Guide System Overlord
  374. What It Takes to Master Security (Hint: It's Not Certs) - OpenDNS Blog
  375. GitHub - enddo/smod: MODBUS Penetration Testing Framework
  376. Practical TEMPEST Attack
  377. Hackers could hijack your computer via its vulnerable wireless mouse or keyboard
  378. Life with the Nest Protect: Are smart smoke detectors a dumb idea?
  379. Linux Mint Forum Database Compromised for at Least a Month Before Announcement
  380. Patient monitors altered, drug dispensary popped in collosal hospital hack
  381. With few options, companies pay hush money to data thieves
  382. How an audit can shore up your security strategy
  383. Nissan LEAF cloud security fail leaves drivers exposed
  384. Judge Confirms DoD Funded Research to Decloak Tor Users
  385. Confirmed: Carnegie Mellon University Attacked Tor, Was Subpoenaed By Feds
  386. NetworkMiner - The NSM and Network Forensics Analysis Tool
  387. GCHQ intel used to develop Stuxnet, claims new documentary
  388. Hack VMware, Score US$75K. Hack Flash, Get Much Less.
  389. Cisco Customers On Alert Over New Vulns
  390. Instagram Is Adding Two-Factor Authentication
  391. Glibc Vuln Puts All Linux Machines At Risk
  392. Sergey Lozhkin on How He Hacked His Hospital
  393. Popular home security system SimpliSafe can be easily disabled by burglars
  394. The Great EMV Fake-Out: No Chip For You!
  395. Using Eagles to Intercept Drones
  396. Instagram bug could have allowed others to read your direct messages
  397. Judge Demands that Apple Backdoor an iPhone
  398. Underage Hacker Is behind Attacks against US Government
  399. More IoT insecurity: The surveillance camera that anyone can log into
  400. 5 Big Incident Response Mistakes
  401. D-Link DSL-2750B Remote Command Execution
  402. ASUS Router Administrative Interface Exposure
  403. Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor, (Wed, Feb 10th)
  404. Weird Fitbit data helps one man discover his wife is pregnant
  405. We might use your IoT stuff to spy on you, says top spook James Clapper
  406. IoTs Day of Reckoning on the Horizon
  407. Power Grid Honeypot Puts Face on Attacks
  408. We're Going To Use Your Toothbrush To Spy On You, Says Clapper
  409. How To Hack The Power Grid Through Home Air Conditioners
  410. Cisco Security Kit Wide-Open To IKE Bug
  411. Hackers aren't smart -- people are stupid
  412. Moving to a Plugin-Free Web (Java Platform Group, Product Management blog)
  413. Week 5 In Review 2016
  414. Sources: Security Firm Norse Corp. Imploding Krebs on Security
  415. FortiGuard SSH backdoor found in more Fortinet security appliances | CSO Online
  416. Damn Vulnerable Safe - Insinuator
  417. GitHub - cve-search/cve-search: cve-search - a tool to perform local searches for known vulnerabilities
  418. Critical Wi-Fi Flaw Patched on Android
  419. Harvard Paper Rebuts Going Dark
  420. Toys Patched Against Flaws That Put Childrens Data, Safety At Risk
  421. Socat Warns Weak Prime Number Could Mean Its Backdoored
  422. Chromodo Browser Disables Same-Origin Policy
  423. Getting A Reverse Shell On Your Seagate Personal NAS
  424. eBay Refuses To Fix Flaw Exposing Users To Malware And Phishing Attacks
  425. Google Lumps MalwareBytes With A Bad Security Report
  426. In A UEFI World, "rm -rf /" Can Brick Your System
  427. More CISOs looking to recruit cyber-security trainers than leaders, analysts, engineers or pen testers
  428. Automating Vulnerability Scans, (Wed, Feb 3rd)
  429. EMET 5.5 Released, (Wed, Feb 3rd)
  430. Websites running WordPress hacked to display money-making ads for hackers
  431. The Internet of Things Will Be the World's Biggest Robot
  432. Interview: John Matherly On Check Point Blacklisting Shodan
  433. Hard-Coded Password Found In Lenovo File-Sharing App
  434. Magento Update Addresses XSS, CSRF Vulnerabilities
  435. Show us the code! You should be able to peek inside the gadgets you buy FTC commish
  436. Hacker Who Sent Heroin To Brian Krebs Pleads Guilty
  437. MiniUPnP Vulnerability Clears Way for Stack Smashing Attack
  438. NSAs top hacking boss explains how to protect your network from his attack squads
  439. BlackEnergy APT Group Spreading Malware via Tainted Word Docs
  440. Oracle plans to kill an attacker's favorite: the Java browser plug-in
  441. OpenSSL Patches Serious Flaw that Puts Popular Applications At Risk
  442. DDoS World Record Broken With 500 Gbps Attack In 2015
  443. Angler Exploit Kit Now Hooking Execs With Xmas Flash Hole
  444. Police destroy evidence with 10 failed passcode attempts on iPhone
  445. Worried about cyberattacks on US power grid? Stop taking selfies at work - CSMonitor.com
  446. SEC Consult: Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices
  447. Hot Potato Windows Privilege Escalation
  448. Autopwn every Android < 4.2 device on your network using BetterCap and the "addJavascriptInterface" vulnerability. - Simone Margaritelli
  449. 6 Tips for Turning Developers Into AppSec Allies
  450. Purple Teaming - Lessons Learned & Ruxcon Slides
  451. Casino Sues Security Firm for Failing to Contain Malware Infection
  452. The Evolution of the Wireless Penetration Test | Immunity Services
  453. OpenSSH Private Crypto Key Leak Patch | Threatpost | The first stop for security news
  454. /tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!, (Wed, Jan 20th)
  455. 123456 Still The Most Common Password For 2015
  456. Serious Linux Kernel Vulnerability Patched
  457. Oracle Unleashes 248 Security Updates In First Patch Release Of 2016
  458. Hot Potato Exploit Mashes Old Vulns Together
  459. Numbers dont lieits time to build your own router
  460. Linux vulnerability puts millions of people at risk -- Android users should panic
  461. FireEye buys iSight Partners for $200M
  462. HD Moore exiting Rapid7 for VC-land
  463. 26 of the craziest and scariest things the TSA has found on travelers
  464. HD Moore To Build New Venture Capital Firm
  465. DSA-3444 wordpress - security update
  466. Fortinet SSH Backdoor Found In Firewalls
  467. Was Sean Penn really responsible for El Chapos arrest? | Fusion
  468. Denial-of-Service Flaw Patched in DHCP
  469. Curious Tale of a Microsoft Silverlight Zero Day
  470. Adobe Patches Code Execution Flaws in Reader, Acrobat
  471. The Infamous 'Hacker Manifesto' Just Turned 30
  472. $30 Webcam Spun Into Persistent Network Backdoor
  473. Microsoft finally has a proper way to opt out of Windows 7/8 to Windows 10 upgrades
  474. Why thinking like a criminal is good for security
  475. IoT Security: $1-per-Thing To Protect Connected Devices
  476. Cisco fixes unauthorized access flaws in access points, wireless LAN controllers
  477. Powerball lessons for infosec
  478. Mythical vuln-disclosure program
  479. The Biggest Security Threats We'll Face In 2016
  480. IPv6 Celebrates Its 20th Birthday By Reaching 10 Percent Deployment
  481. Zerodium Offers $100k For Adobe Flash Bypasses
  482. Microsoft To Axe Support For Older Internet Explorer Next Week
  483. 'You're updated!' Drupal says, with fingers crossed behind back
  484. Exploiting Silent Circle's Secure Blackphone
  485. Uber to pay $20,000 in settlement over data breach
  486. SLOTH Attacks Up Ante on SHA-1, MD5 Deprecation
  487. Vulnerable Joomla! Installation under active attack | Symantec Connect Community
  488. Juniper ScreenOS Backdoor Password | Threatpost | The first stop for security news
  489. Advent tip #17: Reply All is probably not what you want
  490. Attacks Ramp Up Against Joomla Zero Day
  491. It was Shodan easy! MacKeeper user database left wide open
  492. IoT startup Afero goes end to end for security
  493. Got A Drone? It's Registration Time, Says The FAA
  494. Google's Project Zero Uncovers FireEye Vulnerability
  495. Windows 10: Microsoft now offers users two choices - "upgrade now" or "upgrade tonight"
  496. Over 680TB of data exposed in MongoDB databases
  497. Press Backspace 28 times to own unlucky Grub-by Linux boxes
  498. Boiled passports leave a bad taste in the mouth of authorities
  499. Congress Slips CISA Into A Budget Bill That's Sure To Pass
  500. The Programming Languages That Spawn The Most Software Vulnerabilities
  501. Lock up your top-of-racks, says Cisco, there's a bug in the USB code
  502. France Looking At Banning Tor, Blocking Public Wi-Fi
  503. Vulnerabilities found in Lenovo, Toshiba, Dell support software
  504. Linksys routers vulnerable through CGI scripts
  505. Trump Says "Closing The Internet" Is A Good Way To Fight Terrorism
  506. Known Security Flaw Found In More Antivirus Products
  507. Toys Could Be Used As Spying Devices, MPs Told
  508. Cisco Warning of Vulnerabilities in Routers, Data Center Platforms
  509. The Employee Password Habits That Could Hurt Enterprises
  510. Internet Root Name Servers Survive Unusual DDoS Attack
  511. Enforcing USB Storage Policy with PowerShell, (Wed, Dec 9th)
  512. New Burp Feature - ClickBandit, (Thu, Dec 10th)
  513. In patches we trust: Why software updates have to get better
  514. Bitcoins Creator Satoshi Nakamoto Is Probably This Unknown Australian Genius
  515. Australian Police Raid Chap's Home In Hunt For Bitcoin Creator
  516. Bitcoin whodunit leads to Oz - CNET
  517. Some notes on fast grep
  518. Adobe Flash Is Dead in Name Only
  519. Hacker Turns Raspberry Pi Zeros Into Selfie Slayers
  520. Could Hackers Break My Heart Via My Pacemaker?
  521. Microsoft tries to ease Windows 10 upgrade process - CNET
  522. More than 900 embedded devices share hard-coded certs, SSH host keys
  523. GreenDog's blog: 3 Attacks on Cisco TACACS+: Bypassing the Cisco's auth
  524. Dude, You Got Delld: Publishing Your Privates - Blog - Duo Security
  525. Samy Kamkar: MagSpoof - credit card/magstripe spoofer
  526. Version 2.2 Release jmk-foofus/medusa@5a7b76e GitHub
  527. Hello Barbie Security: Part 1 - Teardown Somerset Recon
  528. 5 Tips for Pentesters Using Python 3
  529. My SecTor Story: Root Shell on the Belkin WeMo Switch
  530. The Gartner Magic Quadrant: Four Traits From Top Performers
  531. Did Carnegie Mellon Attack Tor for the FBI?
  532. KeeFarce Extract KeePass Passwords (2.x) From Database
  533. Paris Terrorists Used Double ROT-13 Encryption
  534. Federal Legislation Targets Swatting Hoaxes
  535. Clearing the Air on Wi-Fi Software Updates | FCC.gov
  536. Its Way Too Easy to Hack the Hospital
  537. BadBarcode Internet Of Things Hack PacSec 2015 | Threatpost | The first stop for security news
  538. Siri's Lockscreen Bypass A Growing Privacy Issue For iOS Users
  539. US-China Security Review Commission Discusses 'Hack-Back' Laws
  540. Martel Police Body Camera Virus Found Embedded into Camera | iPower Technologies
  541. Failed Windows 3.1 system blamed for shutting down Paris airport | Ars Technica
  542. Trouble Brewing As iThing Coffee Machine Seems To Be Hackable
  543. Anonymous Declares War On Islamic State
  544. US Lawmakers Advised To Consider Hacking China Back
  545. The Lingering Mess from Default Insecurity
  546. ISA100 / WirelessHART Sentinel To Detect Jamming?
  547. How a mobile app firm found the XcodeGhost in the machine
  548. Wireless jammers cast a dark shadow on IoT security
  549. Fake IT admin tricked Cox rep into handing over customer database
  550. Court Says Tracking Web Histories Can Violate Wiretap Act
  551. Thanks for playing: New Linux ransomware decrypted, pwns itself
  552. Solving Security: If You Want Something New, Stop Doing Something Old
  553. Face-slapping alarm clock refuses to let you sleep in
  554. Exploit Writing and Mitigation Going Hand in Hand
  555. [webapps - vBulletin 5.1.x - PreAuth 0day Remote Code Execution Exploit]
  556. The top 10 apps that companies hate
  557. Hackers Claim Million Dollar Bounty For iOS Zero Day Attack
  558. Kevin Spacey Hired To Put The Hollywood Into Cyber Security
  559. No C&C server needed: Russia menaced by offline ransomware
  560. Mature & Unconfident: The Best Information Security Teams Ever!
  561. Library of Congress Says It's OK to Hack Your Car | WIRED
  562. Saving Systems from SQLi | WhiteHat Security Blog
  563. Boasting about your binges on Facebook could hurt your credit score
  564. Undercover cop answers Craigslist ad for a hacker
  565. How to become a pentester | Corelan Team
  566. Mathy Vanhoef: Advanced WiFi Attacks Using Commodity Hardware
  567. How to Commandeer a Store PA System
  568. Dont Be Fooled by Fake Online Reviews Part II
  569. Apple tells judge it's "impossible" to unlock a device running iOS 8 or higher
  570. Fitbit Vulnerability Means Your Tracker Could Spread Malware
  571. IoT security threats and how to handle them
  572. Smartwatch A Fashionable and Dangerous Gadget
  573. Attackers hijack CCTV cameras and network-attached storage devices to launch DDoS attacks
  574. To Find The Needle, Chop Down the Haystack: 5 Steps For Effective Threat Monitoring
  575. The First Rule Of Zero-Days Is No One Talks About Zero-Days
  576. Teen Who Hacked CIA Director's Email Tells How He Did It
  577. German Govt Mulls Security Standards For SOHOpeless Routers
  578. Hackers Make Cars Safer. Don't Ban Them From Tinkering
  579. Apple CEO Tim Cook Blasts Encryption Backdoors
  580. HP adds protection against firmware attacks to enterprise printers
  581. Can myriad wireless networks connect as one fast, secure system?
  582. FireEye Myth and Reality
  583. No End In Sight For Exposed Internet Of Things, Other Devices
  584. Google Patches Chrome, Changes Mixed Content Warnings
  585. WordPress Fixes Critical Stored XSS Error in Akismet
  586. Shocker: Net anarchist builds sneaky 220v USB stick that fries laptops
  587. You can hack a PC just by looking at it, say 3M and HP
  588. Cash Reward For Google.com Takeover Man
  589. Hackers Can Steal Your Brain Waves
  590. Half Of IRS's Servers Still Run Doomed Windows Server 2003
  591. Hackers Can Silently Control Siri From 16 Feet Away | WIRED
  592. 87% of Android devices are exposed to at least one critical vulnerability
  593. 'Fixed' app that fights parking tickets blocked in 3 cities
  594. Ongoing Flash Vulnerabilities, (Thu, Oct 15th)
  595. Scottrade Breach Affects 4.6 Million Customers
  596. Experian Breach Spills Data on 15 Million T-Mobile Customers
  597. Targeted Attack Exposes OWA Weakness
  598. Canceled Talk Re-Ignites Controversy Over Legitimate Security Research
  599. How A Single Car Could Spread Malware To Thousands More
  600. Home Routers Vaccinated By Benign Virus
  601. Edward Snowden Fails At Twitter And Notification Settings
  602. Data Easily Recovered From eBayed Smartphones, Disks
  603. Autonomous Vehicles as Bombs
  604. Whats in a Boarding Pass Barcode? A Lot
  605. Amazon AWS Web Application Firewall (WAF ) Launched
  606. Threatening to post a sex tape on Facebook isn't a crime, US court rules
  607. Information in Your Boarding Pass's Bar Code
  608. Stagefright 2.0 Vuln Affects Nearly All Android Devices
  609. Shell Shock Labs: [Part 1[EN] Hacking NETGEAR JWNR2010v5 Router - Authentication Bypass]
  610. Terminal escape sequences - the new XSS for Linux sysadmins
  611. The Inside Story Behind MS08-067 - Defender Mindset - Site Home - TechNet Blogs
  612. Jump ESP, jump!: How I hacked my IP camera, and found this backdoor account
  613. Week 39 In Review 2015
  614. Mistakenly-deployed test patch leads to suspicious Windows update , (Wed, Sep 30th)
  615. Apple removes iPhone app that reports US drone strikes
  616. State Trooper Vehicles Hacked
  617. Microsoft's enterprise-grade security is coming to Windows 10 IoT
  618. D-Link Accidentally Leaks Private Code-Signing Keys
  619. Unsupported Honeywell Experion PKS Vulnerable to Public Attacks
  620. Monica Lewinsky lawyer named as first outsider on secret US spy court
  621. It's baaaack: Stagefright 2.0 0day hoses all Android devices
  622. Poker Players Targeted By Card-Watching Malware
  623. Two-Week Old WordPress Malware Attack Is Blossoming Into Real Threat
  624. Security Wares Like Kaspersky Can Make You More Vulnerable To Attacks
  625. 650,000 Chinese Smartphones Used To Launch Ad Network DDoS Attack
  626. Week 37 In Review 2015
  627. How $100 And Knowledge Of Wireless Protocols Could Bring Cities To A Standstill - Forbes
  628. First-ever monthly Android security updates start to roll out | Ars Technica
  629. Microsoft Pushes a Dozen Security Updates Krebs on Security
  630. September 2015 Adobe Shockwave Security Patch | Threatpost | The first stop for security news
  631. Spawning Binds with Bluetooth
  632. Proxying Bluetooth devices for security analysis using btproxy Conor Patrick
  633. thinkst Thoughts...: Canarytokens.org - Quick, Free, Detection for the Masses
  634. attactics[dotorg: Extracting Hashes & Plaintext Passwords from Windows 10]
  635. The Wordpress Plugins Playground, (Mon, Sep 14th)
  636. Hacking Team, Computer Vulnerabilities, and the NSA
  637. Remember those Facebook "Dislike Button" scams? This time it's real...
  638. WordPress Patches Serious Shortcodes Core Engine Vulnerability
  639. Maker Kid Busted for Clock Handcuffed Wearing NASA T-Shirt
  640. Scary, sophisticated malware found attacking Cisco routers
  641. Apple iOS 9 is out with a LOT of security holes patched
  642. Exploiting MS15-100 Vulnerability (CVE-2015-2509)
  643. iOS AirDrop vulnerability allows for malware installation on Apple devices
  644. Self-Destructing Computer Chip
  645. 5 Most Common Firewall Configuration Mistakes
  646. Zero-day vulnerabilities reportedly found in Kaspersky and FireEye security products
  647. 5 Free Security Analytics Tools
  648. Is John McAfee running for US president? 'My campaign manager told me not to comment'
  649. FireEye, Kaspersky Lab Scramble To Fix Bugs In Security Tools
  650. John McAfee Announces He's Running For President
  651. Cops Wardriving To Find MACs Of Stolen Gear
  652. Jessy Irwin on Password Security, Opsec and User Education
  653. Will New Security Features Win Over Windows Users?
  654. 10 things to do before you lose your laptop
  655. GM Took 5 Years To Fix A Full-Takover Hack In Millions Of OnStar Cars
  656. Yahoo! Refuses! To! Fix! Emoticon! Exploit! In! Messenger!
  657. Valasek: Todays Furby Bug is Tomorrows SCADA Vulnerability
  658. Save WiFi: Act Now To Save WiFi From The FCC | Hackaday
  659. espreto/wpsploit GitHub
  660. Yes, they just droned a hacker
  661. How CISOs can beat the information security skills-gap
  662. Victims Of US Government Mega-Breach Still Haven't Been Notified
  663. Ecuador Considered Smuggling Julian Assange In A Bag
  664. Netflix releases reflected XSS audit tool for biz
  665. The myth of the cybersecurity skills shortage
  666. What Windows Update for Business is, and what it is not
  667. Google Patches Critical Vulnerabilities in Chrome 45
  668. Secret Service agent pleads guilty to stealing money from Silk Road dealers
  669. Secret Service agent pleads guilty to stealing money from Silk Road dealers | Ars Technica
  670. Linux Foundation Releases Paranoid Internal Infosec Guide
  671. Goole, Mozilla, Microsoft Are Ending RC4 Support
  672. TSA Master Key Duplication & Why "Security Through (Not So) Obscurity" Fails - TrustedSec - Information Security
  673. ColdFusion Bomb: A Chain Reaction From XSS to RCE - Bishop Fox
  674. How to use Intel AMT and have some fun with Mainboards - Insinuator
  675. Sophisticated Security: What I learned from cracking 4000 Ashley Madison passwords
  676. It's Surprisingly Simple to Hack a Satellite | Motherboard
  677. These hackers warned the Internet would become a security disaster. Nobody listened. | The Washington Post
  678. Web.com Hacked! Credit Card information of 93,000 Customers Compromised
  679. Flash: Web Browser Plugins Are Vulnerable
  680. WordPress Compromises Behind Spike in Neutrino EK Traffic
  681. Patched Ins0mnia Vulnerability Keeps Malicious iOS Apps Hidden
  682. Why is the smart home insecure? Because almost nobody cares
  683. We're Just At The Beginning Of The Auto-Hacking Era
  684. Samsung Smart Fridge Leaves Gmail Logins Open To Attack
  685. Suicides Have Started Over The Ashley Madison Hack
  686. Ashley Madison Leak Reveals Its Ex-CTO Hacked Competing Site
  687. Grsecurity Stable Being Free To All Is Over
  688. Yet another Android security flaw: This time EVERYTHING is affected
  689. DIY Swiss Army Barbie multi-tool is ready for anything
  690. Industrial Control System Owners Unaware of Internet Connectivity
  691. Attackers are hijacking critical networking gear from Cisco, company warns | Ars Technica
  692. Four Often Overlooked Factors to Give Your Security Team a Fighting Chance
  693. Vulnerabilities Identified in Several WordPress Plugins
  694. Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool
  695. Ambient Sound Could Be The New Two-Factor Authentication System
  696. Uber is going on a security hiring binge
  697. Linus Torvalds on the state of software security, the Internet of Things, and the future of Linux - GeekWire
  698. Microsoft Drops Rush Internet Explorer Fix For Remote Code Exec Hole
  699. Zero Day Flaw Found In Mac OS X Yosemite Security Update
  700. Russian hackers accessed Pentagon's unclassified email system
  701. New malware turns your computer into a cellular antenna
  702. Ubiquity Stung $46.7 Million USD In E-Mail Spoofing Fraud
  703. XSS flaw put Salesforce accounts at risk of hijacking
  704. How to hack a Corvette with a text message
  705. It's alive! Patch Tuesday survives for Windows 10
  706. Dropbox Ups Its Security Game With USB Two Factor Authentication
  707. Your BMW Or Benz Could Also Be Vulnerable To That GM OnStar Hack
  708. Lenovo Hit With Criticism Over Second Rootkit-Like Utility
  709. Cisco warns customers about attacks installing rogue firmware on networking gear
  710. Buffer Overflow & Format String Attacks: Basics-Part 1
  711. Critical Remotely Exploitable Bug Haunts BIND
  712. Researchers Manipulate Rifles Precision Targeting System
  713. OwnStar Device Can Remotely Locate, Unlock, and Start GM Cars
  714. Goodbye Internet Explorer, Hello Edge
  715. Under 18s should get the right to remove themselves from the internet
  716. Researchers Hack Air-Gapped Computer With Cell Phone
  717. Gamers Steaming Over Dumb Valve Password Vuln
  718. Major Flaw In Android Phones Would Let Hackers In With Just A Text
  719. Security Industry Failing To Keep Pace With Hacker Innovation
  720. Xen fixes another virtual machine escape bug
  721. Want To Know How Your Board Thinks About Cybersecurity?
  722. Online Cheating Site AshleyMadison Hacked
  723. CVSS for ICS
  724. EFF Hopeful Car Hacking Demo Could Help Yield DMCA Exemption
  725. Hacking Team Claims It Always Sold Strictly Within the Law
  726. Four Zero Days Disclosed in Internet Explorer
  727. Chris Valasek on Car Hacking
  728. WordPress Patches Critical XSS Vulnerability in All Builds
  729. Ashley Madison Hacked: Site For People Who Can't Be Trusted Can't Be Trusted
  730. Adobe And Google Partner To Bolster Flash Security Via Project Zero
  731. Hackers Remotely Kill A Jeep On The Highway For Fun And Profit
  732. Going Too Far to Prove a Point
  733. LifeLock's woes continue as FTC claims violation of 2010 settlement
  734. The Jeep HACK What You Need To Know
  735. New research: Comparing how security experts and non-experts stay safe online
  736. Remotely Hacking a Car While It's Driving
  737. Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical
  738. gizmodo/full (Gizmodo) Apple's Thinking About Showing People Ads Based on Their Bank Balances
  739. Security Support Ends For Remaining Windows XP Machines
  740. Authentication Bypass Bug Hits Siemens Energy Automation Device
  741. Wi-Fi Alliance ushers in new era of intrusive apps
  742. Windows 10: you'll get UPDATES LIKE IT or NOT unless you have Enterprise Edition
  743. Hacking Team: We Were Taken Out By A Government Conspiracy
  744. Third Hacking Team Flash Zero-Day Found
  745. Adobe, MS, Oracle Push Critical Security Fixes
  746. After Flash, what will exploit kits focus on next?, (Thu, Jul 16th)
  747. Celebrity caught on police camera causes Twitter uproar
  748. Software and the bogeyman
  749. Your Wi-Fi Networks Soft Underbelly
  750. DMZ and Headless Chickens
  751. Finnish Decision is Win for Internet Trolls
  752. The Risks of Mandating Backdoors in Encryption Products
  753. Infamous Hacking Team Has Been Hacked
  754. Steer Clear Of Low-Tech Hacks: How To Keep Your Information Safe
  755. Ford's 400,000 Car Recall Could Be Tip Of An Auto Security Iceberg
  756. Adobe Tackles New Flash Threat After Hacking Team Leak
  757. Yet Another High Severity Bug Found In OpenSSL
  758. Three UK Politicians 'Hacked' Using Insecure WiFi
  759. Amazon just wrote a TLS crypto library in only 6,000 lines of C code
  760. Attackers Revive Deprecated RIPv1 Routing Protocol in DDoS Attacks
  761. Adobe patches zero-day Flash Player flaw used in targeted attacks
  762. Default SSH Key Found In Many Cisco Appliances
  763. Hundreds of Dark Web sites cloned and "booby trapped"
  764. Apple lets rip with update spate: OS X, iOS, Safari, iTunes, QuickTime
  765. TV's newest hacker drama "Mr. Robot" is technically sound, morally ambiguous
  766. Windows 10 Wi-Fi Sense feature shares your Wi-Fi network with your friends
  767. CyberUL is a dumb idea
  768. The disruptive effect of open-source startups
  769. US Navy caught trying to buy zero-day security flaws
  770. LinkedIn Goes Public with Its Private Bug Bounty
  771. Youre as secure as your apps developers allow them to be
  772. Wi-Fi Hacker Case Reveals Risks Faced By Home Users
  773. The Cardinals May Have Hacked The Astros
  774. EFF, ACLU Appeal License Plate Reader Case To California Supreme Court
  775. PowerShell the Blue Team - Windows PowerShell Blog - Site Home - MSDN Blogs
  776. HackerOne Connects Hackers With Companies, and Hopes for a Win-Win - The New York Times
  777. Research on The Trade-off Between Free Services and Personal Data
  778. Google launches Android bug bounty program
  779. Apple OS X and iOS in the vulnerability spotlight - meet "CORED," also known as "XARA"
  780. Should I panic because Lastpass was hacked?
  781. Hack Of LastPass Exposes Hashed Master Passwords
  782. Americans Resigned To Giving Up Their Privacy, Says Study
  783. Hacker Can Send Fatal Dose To Hospital Drug Pumps
  784. iOS 9 Users To Use 6 Digit Passcodes And 2-Step Auth
  785. Who's behind mysterious flights over US cities? FBI - CSMonitor.com
  786. USA Freedom Act Passes: What We Celebrate, What We Mourn, and Where We Go From Here | Electronic Frontier Foundation
  787. Nmap Development: Sourceforge Hijacks the Nmap Sourceforge Account
  788. Users with weak SSH keys had access to GitHub repositories for popular projects | ITworld
  789. Full Disclosure: More than 60 undisclosed vulnerabilities affect 22 SOHO routers
  790. OpenSesame - hacking garages in seconds
  791. Apple Moving to 2FA, Six-Digit Passcodes in iOS 9
  792. The Promises And Perils Of The Healthcare Internet Of Things
  793. [webapps - WordPress zM Ajax Login & Register Plugin 1.0.9 Local File Inclusion]
  794. [webapps - Wordpress Really Simple Guest Post <= 1.0.6 - File Include]
  795. What's the state of iPhone PIN guessing
  796. [webapps - WordPress Encrypted Contact Form Plugin 1.0.4 - CSRF Vulnerability]
  797. Sniffing and tracking wearable tech and smartphones
  798. An Exploit Kit dedicated to CSRF Pharming | Malware don't need Coffee
  799. Exploit Kit Delivers Pharming Attacks Against SOHO Routers | Threatpost | The first stop for security news
  800. moha99sa/EvilAP_Defender GitHub
  801. Cyber insurance: Only fools rush in | ITworld
  802. Cyber insurance: Only fools rush in | ITworld
  803. Google Online Security Blog: New Research: Some Tough Questions for Security Questions
  804. [webapps - IPLINK IP-DL-801RT-B - (Url Filter Configuration Panel) Stored XSS]
  805. Slew of Vulnerabilities Found in D-Link Storage Devices
  806. Microsoft Windows 10: Three Security Features To Know About
  807. Board Rooms Becoming More Security-Savvy
  808. Script tool a Docker shocker blocker
  809. New Exploit Leaves Most Macs Vulnerable To Permanent Backdooring
  810. New SOHO router security audit uncovers over 60 flaws in 22 models
  811. 95% Of Weapons, Explosives Missed In TSA Tests
  812. IoT Devices Hosted On Vulnerable Clouds In 'Bad Neighborhoods'
  813. The Dark Web Drug Lords Who Got Away
  814. Microsoft accidentally announced its new WiFi service
  815. IoT DANGERS: BYODs trashier cousin becoming a right tearaway
  816. Microsoft to Support SSH in Windows
  817. Mad John McAfee: 'Can you live in a society that is more paranoid than I'm supposed to be?'
  818. Branded Vulnerabilities May Change Enterprise Security
  819. Understanding TSA Math
  820. Study: Average Cost Of Data Breach Is $6.5 Million
  821. Password reset sites expose crackable PeopleSoft creds
  822. 1 In 20 Android Apps Hit By Apache Cordova Flaw
  823. Trojanized, info-stealing PuTTY version lurking online
  824. Changes to Export Control Arrangement Apply to Computer Exploits and More | Center for Internet and Society
  825. [2]
  826. Stink Bombs for Riot Control
  827. Possible Wordpress Botnet C&C: errorcontent.com, (Tue, May 26th)
  828. Race Condition Exploit in Starbucks Gift Cards
  829. IRS: Crooks Stole Data on 100K Taxpayers Via Get Transcript Feature
  830. Phones' accelerometers allow you to be tracked on the metro
  831. WordPress FeedWordPress 2015.0426 SQL Injection
  832. WordPress WP Photo Album Plus 6.1.2 Cross Site Scripting
  833. Phantom Menace Hack Strikes Oil Industry
  834. United Airlines Bug Bounty Pays With Miles
  835. Lets Call Stunt Hacking What it is, Media Whoring.
  836. Our Lord of the Flies moment
  837. How I Got Here: Marcus Ranum
  838. Toyota Prius batteries being targeted by car thieves
  839. 1.1 Million Hit In Another BlueCross BlueShield Breach
  840. Security Researchers Wary of Proposed Wassenaar Rules
  841. NetUSB Flaw Puts Millions Of Routers At Risk
  842. 90s-style security flaw puts millions of routers at risk
  843. How your next password could be your brain
  844. The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
  845. Half Of Retail, Healthcare Sites 'Always Vulnerable'
  846. A practical history of plane hacking: Beyond the hype and hysteria
  847. Compromised WordPress sites leaking credentials
  848. Vendors Step Up & Step Down
  849. License Plate Scanners Hidden in Fake Cactus
  850. PHP Hash Comparison Weakness A Threat To Websites, Researcher Says
  851. "Skynet" is real, and it could flag you as a terrorist
  852. Home Automation Software Z-Way Vulnerable to Remote Attacks
  853. Taking A Security Program From Zero To Hero
  854. Heartbleed, eat your heart out: VENOM vuln poisons countless VMs
  855. Home routers co-opted into self-sustaining DDoS botnet
  856. Dan Kaminsky on VENOM
  857. VENOM Vulnerability
  858. Venom Bug Threatens Virtual Machines
  859. Malvertising strikes on dozens of top adult sites | Malwarebytes Unpacked
  860. Netflix Releases FIDO Incident Response Tool
  861. Usbkill Script Can Render Computers Useless
  862. In charge of security? We need to talk...
  863. Would you buy an Ubuntu phone that doubled as a desktop PC?
  864. The Internet of Things will take a beating at DefCon
  865. Vixie Proposes 'Cooling-Off Period' For New Domains To Deter Cybercrime
  866. Infusion pump is hackable but rumours of death are exaggerated
  867. Millions of WordPress websites at risk from in-the-wild exploit
  868. 84,000 Ad Injectors Found Targeting Chrome
  869. Attackers exploit vulnerabilities in two WordPress plugins
  870. How to interview prospective employers
  871. iPad crash grounds dozens of American Airlines flights
  872. Tesla Twitter Account And Website Hijacked, Elon Musk Pwned
  873. Comments considered harmful: WordPress web hijack bug revealed
  874. WordPress Rushes Out Fix For Zero-Day Flaw
  875. Surgery Bot Can Be Hacked To Hack You To Pieces
  876. Note To Vendors: CISOs Don't Want Your Analytical Tools
  877. RSA Highlighted Impending IoT Troubles
  878. How To Crack Many Master Lock Combinations In 8 Tries Or Less
  879. Google Releases Password Alert Extension for Chrome
  880. A Year Later, XSS Vulnerability Still Exists in eBay
  881. WordPress Ecommerce Plugin Vulnerability Details Disclosed
  882. Wi-Fi Woes Continue To Plague Infosec
  883. To Evangelize Security, Get Out Of Your Comfort Zone
  884. Hackers gaining upper hand, security conference told
  885. 6 Most Dangerous New Attack Techniques in 2015
  886. Wi-Fi client vulnerability could expose Android, Linux, BSD, other systems to attacks
  887. CozyDuke Hackers Infiltrate The White House With 'Funny Monkey' Videos
  888. iOS Vulnerability Could Force Devices Into Endless Reboot Loop
  889. Man guns down computer after getting fed up with Blue Screen of Death
  890. Unsolicited Response Podcast: Rios on WhiteScope and Medical Device Security
  891. An Incredibly Insecure Voting Machine
  892. IRC Botnets alive, effective & evolving
  893. Security, Fast and Slow
  894. Reversing Belkins WPS Pin Algorithm
  895. Hacking the D-Link DIR-890L
  896. What the Ridiculous Fuck, D-Link?!
  897. D-Link router patch creates NEW SOHOpeless vuln
  898. Drug Pump's Security Flaw Lets Hackers Raise Dose Limits
  899. Hacked French Network Exposed Its Own Passwords During TV Interview
  900. 8th Grader Charged With Felony For Snagging Password
  901. Snowden's 'Sexy Margaret Thatcher' Password Isn't So Secure
  902. Unpatched 18 Year Old Windows MiTM Vuln Revived
  903. Prosecutors Suspect Man Hacked Lottery Computers
  904. Hackers Could Commandeer New Planes Through Passenger Wi-Fi
  905. SQLite 22 Bugs
  906. WordPress Ajax Store Locator 1.2 SQL Injection
  907. Flaw in WordPress caching plug-in could affect over 1 million sites
  908. Snapchat blocks access to all third-party apps in bid to improve security
  909. Researchers: IoT devices are not designed with security in mind
  910. Hacks On Critical Infrastructure Are More Common Than You Think
  911. Long Live the Botnet
  912. Watcher Passive Web Application Vulnerability Scanner
  913. Court might force US to reveal details of secret WiFi kill switch
  914. FBI warns WordPress users of ISIS threat: Patch and update now
  915. Penetration Testing: Youre Doing it Wrong (?) Part One
  916. Hillarys emails: Deleted but not gone
  917. Hotel WiFi Vuln Puts Guests At Risk
  918. RSA Bans Booth Babes
  919. The US Has Used Zero-Day Exploits For Quite A While
  920. Men Disguised As Women Storm NSA HQ
  921. Uber Denies It Was Hacked
  922. Flaw Deletes YouTube Videos In Just A Few Clicks
  923. Evidence Links China To GitHub Attack
  924. Cross-Site Scripting Vulnerability Discovered In WordPress Photo Gallery Plugin | Fortinet Blog
  925. Rush To Release Resulting In Vulnerable Mobile Apps
  926. Pin-pointing China's attack against GitHub
  927. Remote Code Execution Possible Via Dell System Detect
  928. http://arstechnica.com/security/2015/03/twitch-resets-user-passwords-fol...
  929. https://threatpost.com/cisco-small-business-ip-phones-open-to-remote-eav...
  930. http://arstechnica.com/security/2015/03/all-four-major-browsers-take-a-s...
  931. BIOS Hacking
  932. Maturing Your Vulnerability Management Program Part 1 | Core Security Blog
  933. 5 Ways to a Kick A$$ Vulnerability Management Program-Part 2
  934. Reverse Engineering Incentives
  935. How I hacked my smart bracelet
  936. The Internet Of Bring-Your-Own Things
  937. Researchers Use Heat To Breach Air-Gapped Systems
  938. Wind Turbine Blown Away By Control System Vulnerability
  939. Romanian Man Extradited To U.S. To Face Hacking Charges
  940. A $60 Gadget That Makes Car Hacking Far Easier
  941. Amazon.com Gives Out A T-Shirt For XSS Issue Reported
  942. Cisco Patches IOS To Stop Automation Exploitation
  943. Most Companies Expect To Be Hacked In The Next 12 Months
  944. 10 Ways To Measure IT Security Program Effectiveness
  945. The End of Pen Testing As We Know It?
  946. The 7 Best Social Engineering Attacks Ever
  947. D-Link patches yet more vulns
  948. Despite what you may have heard, Internet Explorer is not dead
  949. Black Hat USA 2015: Focus on Infrastructure
  950. Dont click on the porn video your Facebook friend shared
  951. Epic Google snafu leaks hidden whois data for 280,000 domains | Ars Technica
  952. Information Security: A Primer on IoT Security ... | SecurityStreet
  953. Door Skimmer + Hidden Camera = Profit
  954. Tool Release CANBus Protector
  955. OpenSSL Patch to Plug Severe Security Holes
  956. Top 10 API Security Considerations
  957. Analysis of a Remote Code Execution Vulnerability on Fortinet Single Sign On
  958. Double FREAK! A cryptographic bug that was found because of the FREAK bug
  959. EMET 5.2 is available (update)
  960. What ever it is, CISA isn't cybersecurity
  961. Visual Studio VSTFS protocol handler command injection
  962. Identifying When Someone Is Operating a Computer Remotely
  963. Full Disclosure: PHPMoAdmin Unauthorized Remote Code Execution (0-Day)
  964. No Wireshark? No TCPDump? No Problem! - SANS Internet Storm Center
  965. Tool Release Digital Bond CANBus-Utils Digital Bond's SCADA Security Portal
  966. DanMcInerney/net-creds GitHub
  967. Anatomy of a Hack
  968. Apartment complex threatens residents with $10k fines for negative online reviews
  969. Patch Tuesday patches FREAK, Universal XSS
  970. CIA spent last 10 years cracking Apples encryption
  971. What we know about security features on the Apple Watch
  972. Panda antivirus labels itself as malware, then borks EVERYTHING
  973. Mattel urged to scrap Wi-Fi mic Barbie after Register investigation
  974. Panda antivirus mistakenly flags itself as malware, bricks PCs
  975. Ford, Toyota and General Motors could be taken to court over hackable cars
  976. How To Keep Your Smart Home Safe
  977. Some notes on DRAM (#rowhammer)
  978. Latest WordPress bug highlights importance of securing the supply chain
  979. Lizard Squad Hackers Attack Lenovo After Superfish Scandal
  980. Twitter Triples Abuse Team, Knocks Dox
  981. US Air Traffic Control Vulnerable To Terrorist Hackers
  982. D-Link Removes Fingers From Ears, Preps Mass Router Patch
  983. The C99Shell Is Not Dead
  984. Abusing Blu-ray Players Pt. 1 Sandbox Escapes | NCC Group
  985. Pulling Remote Word Documents from RAM using Kali Linux | CYBER ARMS - Computer Security
  986. w00tsec: Extracting RAW pictures from memory dumps
  987. albinowax/ActiveScanPlusPlus GitHub
  988. The two most dangerous IT security sins, that everyone does
  989. Broadband routers: SOHOpeless and vendors don't care
  990. Listen to an actual Microsoft support scam as it happened
  991. How infosec hiring lost its way: Harsh findings in Leviathan report | ZDNet
  992. Lack of CSPRNG Threatens WordPress Sites | Threatpost | The first stop for security news
  993. Why We Should Design Some Things to Be Difficult to Use
  994. Information disclosure flaw exposes Netgear wireless routers to attacks
  995. Red Hat CEO: Todays IT department is in a fight for its life
  996. Mozilla's Flash-Killer 'Shumway' Appears In Firefox Nightlies
  997. BadUSB Vulnerabilities Live in ICS Gear Too
  998. Youre Not Paranoid, Someone Is Spying on Your Company
  999. Israel targeted by malware packaged with pornographic video
  1000. Christofer Hoff on Mixed Martial Arts, Active Defense, and Security
  1001. Samsung smart TVs don't encrypt the voice data they collect
  1002. BadUSB Poses Threat to Industrial Control Systems, Says Security Researcher
  1003. Microgrids and Smart Grid Resilience
  1004. End Users Causing Bulk Of Infosec Headaches
  1005. Critical 0-days in open source? The problem isn't code, it's CASH
  1006. Today I Am Releasing Ten Million Passwords
  1007. A Winning Strategy: Must Patch, Should Patch, Can't Patch
  1008. Microsoft Plugs 41 Internet Explorer Flaws
  1009. Chinese Hackers Compromised Forbes.com Using IE, Flash Zero Days
  1010. Hacker kicks one bit XP to 10 Windows scroll goal
  1011. Anthem data breach cost likely to smash $100 million barrier
  1012. Hacker finds vulnerability in Facebook, can delete your photo albums
  1013. Anthem Breach May Have Started in April 2014
  1014. Exploiting BadIRET vulnerability (CVE-2014-9322, Linux kernel privilege escalation) | Bromium Labs
  1015. Microsoft Packing More CVEs into Fewer Security Bulletins
  1016. Nscan: Fast Internet Wide Scanner | Python for Pentesting
  1017. AirPcap Channel Hopping With Python | Didier Stevens
  1018. OWASP Proactive Controls - OWASP
  1019. Droopescan Plugin Based CMS Security Scanner
  1020. The year the security dog caught the car
  1021. D-Link routers vulnerable to DNS hijacking
  1022. Welcome to my sit-stand desk nightmare | Ars Technica
  1023. 3 Disturbing New Trends in Vulnerability Disclosure
  1024. BMW's Software Security Patch A Sign Of Things To Come
  1025. Adobe Flash Zero Days Prove Signatures Are Dead
  1026. Adobe Begins Patching Third Flash Player Zero Day
  1027. Siemens Sighs: SCADA Bugs Abound
  1028. Attackers exploit zero-day flaw in popular WordPress plug-in
  1029. Critical Ghost bug could haunt WordPress and PHP apps, too | Ars Technica
  1030. Security 101: Show Your List!
  1031. Anthem Hacked US Health Insurance Provider Leaks 70 Million Records
  1032. Yet Another Emergency Flash Player Patch Krebs on Security
  1033. The Shadow File: Patching, Emulating, and Debugging a Netgear Embedded Web Server
  1034. GDS - Blog - BadSamba - Exploiting Windows Startup Scripts Using a Malicious SMB Server
  1035. delvelabs/vane GitHub
  1036. WTF! It Should Not Be Illegal To Hack Your Own Car's Computer
  1037. Building A Cybersecurity Program: 3 Tips
  1038. Small Drone Found On White House Lawn
  1039. Android Wi-Fi Direct Vulnerability Details Disclosed
  1040. Mark Dowd finds bug in ultra secure BlackPhone that lets attackers stalk users
  1041. Apple Patches Thunderstrike Bug in OSX, Fixes More Than 30 Flaws in iOS
  1042. Top smut site Flashes visitors, leaves behind nasty virus
  1043. The GHOST vulnerability what you need to know
  1044. Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK | Malware don't need Coffee
  1045. Java Patch Plugs 19 Security Holes Krebs on Security
  1046. Guest Blog: httpscreenshot - A Tool for Both Teams
  1047. Nobody thought BlackPhone was secure -- just securer
  1048. Some notes on GHOST
  1049. Meet Reuben Paul: 8 year old CEO, Cyber Security Ambassador and Haxpo Highlight Speaker
  1050. Had a data breach? Well, SPEAK UP, big biz Obama
  1051. Lizard Squads DDoS-For-Hire Service Built on Hacked Home Routers
  1052. Router creds admin/admin? Lizard Squad thanks you
  1053. Remember Corel? It's just entered .DLL hell
  1054. Insert 'Skeleton Key', unlock Microsoft Active Directory. Simples hackers
  1055. Why on Earth Is IBM Still Making Mainframes?
  1056. Instagram Flashed Your Privates To Picture Pervs
  1057. AMD Plugs Firmware Holes That Allowed Command Injection
  1058. 4 Mega-Vulnerabilities Hiding in Plain Sight
  1059. Warning: Using encrypted email in Spain? Do not pass go, go directly to jail
  1060. It's 2015 and home routers still leave their config web servers wide open
  1061. Security? Don't bother until it's needed says RFC
  1062. Internet of Things promises analytics boom
  1063. Four Disruptive Hacks to Come in 2015
  1064. Marriott Agrees to Stop Blocking Guest WiFi Devices
  1065. The International Conference on PASSWORDS 2014. - NTNU openVideo
  1066. ASUSWRT 3.0.0.4.376_1071 - LAN Backdoor Command Execution
  1067. pwntools CTF Framework & Exploit Development Library
  1068. Ouch! Home router security "bypass" actually means no security AT ALL
  1069. DevOoops: Spoofing GitHub Users
  1070. Obama's War on Hackers
  1071. Attack Attribution in Cyberspace
  1072. Internet of Things is a threat to privacy, says FTC
  1073. Thieves Jackpot ATMs With Black Box Attack
  1074. Thunderstrike shocks OS X with firmware bootkit
  1075. Self-XSS flaw in found Microsoft Dynamics CRM
  1076. OpenSSL Fixes Eight Security Vulnerabilities
  1077. Anybody can take North Korea offline
  1078. IoT Security: How to Protect Applications on the Edge
  1079. The Elephant in the Room is Compliance
  1080. Best Defense Against a Cyber-Attack Is to Know Your Adversary
  1081. Home Wi-Fi security's just as good as '90s PC security! Wait, what?
  1082. Poll: The Perimeter Has Shattered!
  1083. How To Become a CISO: Top Tips
  1084. 5 ways to prepare for Internet of things security threats
  1085. Mobile security top tips for protection for BYOD devices
  1086. New WordPress Password Policy in WP Password Policy Manager Plugin
  1087. 2014: The Year of Shaken Trust
  1088. Internet Of Things: 3 Holiday Gifts That Will Keep CISOs Up At Night
  1089. Employees Still Get More Access Than They Need
  1090. It's nearly 2015 and your Windows PC can still be owned by a Visual Basic script
  1091. Why You Shouldnt Use MAC Address Filtering On Your Wi-Fi Router
  1092. Coming to Blackphone: An app store loaded with privacy tools
  1093. Hacked payment card service transmitted some data in plaintext
  1094. Intel's IoT vision encompasses more than chips
  1095. Belden buys Tripwire for $710m: Will keep network burglars out of Internet of Things things
  1096. Sony Hackers Leak Netflix Deal Info
  1097. Judge Says Banks Can Sue Target (December 4 & 8, 2014)
  1098. Poodle Bug Returns, Bites Big Bank Sites
  1099. Not Enough CISOs to Go Around
  1100. The Sony Picture's Hack: Hollywood's Snowden Moment
  1101. Critical Remote Code Execution Flaw Found in WordPress Plugin
  1102. tcpdump multiple security vulnerabilities
  1103. Apache Site Hacked Through SSH Key Compromise
  1104. Sony just got hacked, doxxed, and shut down | News | Geek.com
  1105. Website Security - Protecting The Unknown - Software Vulnerabilities | Sucuri Blog
  1106. DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS The Register
  1107. Do you use SSL/TLS on internal comms?
  1108. Guest diary: Detecting Suspicious Devices On-The-Fly, (Tue, Nov 25th)
  1109. Bugtraq: WordPress 3 persistent script injection
  1110. google/firing-range GitHub
  1111. [DeepSec 2014 Trusting Your Cloud Provider. Protecting Private Virtual Machines Armin Simma | C (in)suit / ChrisJohnRiley]
  1112. [3]
  1113. Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools | Motherboard
  1114. Critical XSS Flaw Affects WordPress 3.9.2 And Earlier
  1115. Apple TV multiple security vulnerabilities
  1116. Remote Code Execution in Popular Hikvision Surveillance DVR
  1117. Don't Discount XSS Vulnerabilities
  1118. Regin: When did protection start?
  1119. Strength in numbers: Why layered network protection is priority
  1120. All Your Base, Encrypted They Are
  1121. Reversing Industrial firmware for fun and backdoors I
  1122. Reversing DELL's DRAC firmware
  1123. Wireless attacks against 'air gapped' targets are possible, Israeli team claims
  1124. You're Doing BYOD Wrong: These Numbers Prove It - Dark Reading
  1125. DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests | WIRED
  1126. BASHLITE Affects Devices Running on BusyBox
  1127. Major iOS security flaw Masque Attack reportedly uncovered, found to pose much bigger threat than WireLurker | 9to5Mac
  1128. Reverse Engineer a Verisure Wireless Alarm part 1 Radio Communications | Fun Over IP
  1129. SANS Digital Forensics and Incident Response Blog | Protecting Privileged Domain Accounts: Restricted Admin and Protected Users | SANS Institute
  1130. HP TippingPoint + Mobile Pwn2Own: Day 2 - HP Enterprise Business Community
  1131. HP TippingPoint + Mobile Pwn2Own = Zero Day Filter... - HP Enterprise Business Community
  1132. Disarming and Bypassing EMET 5.1
  1133. Additional information about CVE-2014-6324
  1134. Week 45 In Review 2014
  1135. BBC News - Pirate Bay co-founder 'TiAMO' arrested in Thailand
  1136. Chertoff Reminds Enterprises There is Hope in Security
  1137. WireLurker Malware Infects iOS and OS X
  1138. Whois someone else?, (Tue, Nov 4th)
  1139. Password hash disclosure in Linksys Smart WiFi routers | Weblog | Sijmen Ruwhof
  1140. Smeege Sec: Detecting and Exploiting the HTTP PUT Method
  1141. How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper | Cyber Security Labs @ Ben-Gurion University of the Negev
  1142. Reversing D-Links WPS Pin Algorithm
  1143. NSA-Approved Samsung Knox Stores PIN in Cleartext | Threatpost | The first stop for security news
  1144. Watch That Windows Update: FTDI Drivers Are Killing Fake Chips
  1145. Symantec Intelligence Report: September 2014 | Symantec Connect
  1146. [SecTorCA Reverse Engineering a Web Application for fun, behavior & WAF Detection | C (in)suit / ChrisJohnRiley]
  1147. Hacking with the Oldies!, (Thu, Oct 30th)
  1148. 3 ways to make your Gmail account safer | Naked Security
  1149. Millions of Drupal websites at risk from failure to patch
  1150. telnetd rulez: Cisco Ironport WSA Telnetd Remote Code Execution Vulnerability, (Wed, Oct 22nd)
  1151. Google goes beyond two-step verification with new USB Security Key
  1152. Leave your passwords at the Checkout Desk
  1153. Hackers hold 7 million Dropbox passwords ransom - CNET
  1154. snapchat-decrypt/README.md at master programa-stic/snapchat-decrypt GitHub
  1155. Index of /hitbsecconf2014kul/materials
  1156. SIM Card Forensics | 0xicf
  1157. Meet the NSAs hacker recruiter
  1158. Yahoo Servers Were Owned By Bash Bug Hackers
  1159. nullcon Goa 2014: Pentesting Proprietary RF Communications by Justin Searle @meeas - YouTube
  1160. The Best DerbyCon 2014 Talks for Red Teams | Strategic Cyber LLC
  1161. Protocol Differential Analysis
  1162. Some POODLE notes
  1163. Microsoft Patches Critical Windows, .NET Zero Day Flaws
  1164. Drupal Fixes Highly Critical SQL Injection Flaw
  1165. Russian Hackers Made $2.5B Over The Last 12 Months
  1166. Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
  1167. Man bites dog: HTTPS-menacing POODLE is 'hard to exploit' unless you're on public Wi-Fi
  1168. Anonabox Kickstarter Project Raises Controversy At Reddit
  1169. Smart Meters Can Be Hacked To Cut Power Bills
  1170. BadUSB Update
  1171. OpenSSL Releases Patch for POODLE Attack
  1172. SSLv3 POODLE Vulnerability Official Release, (Tue, Oct 14th)
  1173. Who ya gonna call? Ghostbusters cosplayers at NYCC
  1174. How Retail Can Win Back Consumer Trust
  1175. Android SMS worm Selfmite returns, more aggressive than ever
  1176. Who named "shellshock"?
  1177. Wget off the leash
  1178. Why (Cyber) Insurance Is Sexy
  1179. Medical Records For Sale in Underground Stolen From Texas Life Insurance Firm
  1180. In Home Depot Breach, Investigation Focuses on Self-Checkout Lanes
  1181. Top 10 Security Issues for REST APIs
  1182. Mucking About With SquashFS
  1183. Meet The Next Next-Gen Firewall
  1184. 7 Reasons To Love Passwords
  1185. Why hackers may be stealing your credit card numbers for years
  1186. Apple blames 'targeted attack' for leaked nude celebrity photos
  1187. Rich Mogull on Apple Pay
  1188. Hacker "weev" has left the United States
  1189. Protecting yourself against the celebrity iCloud hackers
  1190. Identifying Firewalls from the Outside-In. Or, "There's Gold in them thar UDP ports!", (Thu, Sep 4th)
  1191. Scared of brute force password attacks? Just 'GIVE UP' says Microsoft
  1192. Twitter offers a $140 bug bounty reward- The Inquirer
  1193. Some Cable Modems Found to Leak Sensitive Data Via SNMP
  1194. Hackers exploit critical vulnerability in popular WordPress theme component
  1195. One in Five Massachusetts Residents Breached in 2013
  1196. Feared Home Depot Breach Sparks More Interest in Backoff PoS Malware
  1197. Threats in Custom App Development: Enterprises Lack of Security
  1198. Wi-Fi Sense?
  1199. How I Hacked My Home, IoT Style
  1200. 10 Common Software Security Design Flaws
  1201. Backoff, Dairy Queen, UPS & Retail's Growing PoS Security Problem
  1202. Netflix releases home-grown DDoS detectors
  1203. Researchers camouflage haxxor traps with fake application traffic
  1204. Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections
  1205. Why Are Security Pros Blase About Compliance?
  1206. SSDP Amplification Scanner
  1207. Secure Development - One Bathroom Break At A Time
  1208. Masscan does STARTTLS
  1209. Retired US airport body scanners fail to spot guns, knives
  1210. Security of 'Things'
  1211. Researchers find its terrifyingly easy to hack traffic lights | Ars Technica
  1212. UPS Admits 51 Stores Hit With Malware For Five Months
  1213. BuildItSecure.ly - Securing the "Internet of Things", Together.
  1214. Internet Of Things Security Reaches Tipping Point
  1215. Why you need to do less if you want better security
  1216. The biggest iPhone security risk could be connecting one to a computer | Network World
  1217. Study finds firmware plagued by poor encryption and backdoors | PCWorld
  1218. Home routers supplied by ISPs can be compromised en masse - Computerworld
  1219. ISP-Supplied Home Routers Could be Compromised Through Protocol That Allows Remote Troubleshooting (August 10, 2014)
  1220. Good bot, bad bot? 23 million Twitter accounts are automated
  1221. BadUSB, keynote controversy: Black Hat USA 2014 videos now online
  1222. Your cons are just an excuse to drink and party
  1223. Free Wi-Fi - but it'll cost you your privacy
  1224. 3 security mistakes small companies make and how to avoid them
  1225. A Honeypot for home: Raspberry Pi, (Thu, Jul 31st)
  1226. General Availability for Enhanced Mitigation Experience Toolkit (EMET) 5.0
  1227. The Fundamental Insecurity of USB
  1228. Another Potential Retail Mega Breach At Sandwich Chain Jimmy Johns
  1229. Some Thoughts on Verizon DBIR
  1230. Binwalk v2.0 Released!
  1231. More fun with #TSA
  1232. [webapps - NETGEAR DGN2200 1.0.0.29_1.7.29_HotS - Password Disclosure vulnerability]
  1233. Four Steps to Successfully Implementing Security into a Continuous Development Shop
  1234. For Java: I Patch, Therefore I Am?
  1235. Active Directory Vulnerability Disclosure: Weak encryption enables attacker to change a victims password without being logged - Aorato
  1236. Car Hacker's Handbook
  1237. Fingerprinting Computers By Making Them Draw Images
  1238. "Password Storage Mistakes"
  1239. Can I use Dropbox?
  1240. On Mobile Device ICS App Security
  1241. Securing the Nest Thermostat
  1242. WordPress brute force attack via wp.getUsersBlogs, (Tue, Jul 22nd)
  1243. Car hackers build anti-car-hacking gadget
  1244. Firefox 31 has arrived - 11 bulletins, 3 critical, 0 visual surprises
  1245. New Feature: "Live" SSH Brute Force Logs and New Kippo Client, (Wed, Jul 23rd)
  1246. Thoughts on BrutPOS
  1247. Pre-order Your Copy of Spam Nation Now!
  1248. Please update Flash on your systems
  1249. This Common Home Appliance Can Compromise Your Entire Security
  1250. 10 Powerful Facts About Big Data - InformationWeek
  1251. Zendesk Insights Shows Its A Data-Driven World
  1252. Intrusive Healthcare
  1253. 6 Tips for Using Big Data to Hunt Cyberthreats
  1254. Etsys Threat Modeling
  1255. As security startups heat up, a reminder that security is not a product or service: its a value Tech News and Analysis
  1256. Penetration Testing Scripts | Common Exploits - Penetration Testing Information
  1257. Episode #179: The Check is in the Mail
  1258. Remote Access Hack Compromises POS Vendor | Threatpost | The first stop for security news
  1259. Mysterious cyberattack compromises more than a thousand power plant systems | The Verge
  1260. Attackers poison legitimate apps to infect sensitive industrial control systems | Ars Technica
  1261. Burp Suite Tutorial Web Application Penetration Testing (Part 1)
  1262. Locking down PHP
  1263. OpenSSL describes its own sad state of affairs
  1264. Netflix Open Sources AWS Monitoring Tool: Security Monkey!
  1265. Living Up To Rock Star Status
  1266. How to Become a PMP
  1267. Exploding Cigarettes and AppSec
  1268. Plaintext Supermicro IPMI Credentials Exposed
  1269. Why A Secured Network Is Like The Human Body
  1270. Patched Code-Execution Bug Affects Most Android Users
  1271. Got a botnet? Thinking of using it to mine Bitcoin? Don't bother
  1272. Major SSL flaw found in iOS, OS X
  1273. Own goal as World Cup Wi-Fi passwords spilled in newspaper snap
  1274. SCADA/ICS Systems Under Attack In Europe Stuxnet-Style
  1275. Puppet Dashboard Multiple XSS Vulnerabilities
  1276. Asterisk PJSIP Channel Driver Multiple DoS Vulnerabilities (AST-2014-005 / AST-2014-008)
  1277. Asterisk HTTP Session Handling DoS (AST-2014-007)
  1278. Asterisk Manager Interface MixMonitor Privilege Escalation (AST-2014-006)
  1279. Brocade Fabric OS Default Credentials
  1280. Participants Database Plugin for WordPress query Parameter SQL Injection
  1281. Participants Database Plugin for WordPress < 1.5.4.9 query Parameter SQL Injection
  1282. Cisco TelePresence Supervisor MSE 8050 Multiple Vulnerabilities in OpenSSL
  1283. Cisco TelePresence MCU Series Devices Multiple Vulnerabilities in OpenSSL
  1284. Cisco ONS 15400 Series Devices Multiple Vulnerabilities in OpenSSL
  1285. Cisco Windows Jabber Client Multiple Vulnerabilities in OpenSSL
  1286. Cisco Adaptive Security Appliances Multiple Vulnerabilities in OpenSSL
  1287. Cisco ACE30 and ACE4710 OpenSSL 'ChangeCipherSpec' MiTM Vulnerability
  1288. Cisco Unsupported ACE Module Detection
  1289. Cisco TelePresence Supervisor Detection
  1290. Junos Pulse Secure Access IVE / UAC OS Multiple OpenSSL Vulnerabilities (JSA10629)
  1291. McAfee Web Gateway Multiple OpenSSL Vulnerabilities
  1292. McAfee ePolicy Orchestrator Multiple OpenSSL Vulnerabilities
  1293. Symantec Web Gateway < 5.2.1 Multiple Vulnerabilities (SYM14-010)
  1294. Cogent DataHub < 7.3.5 Multiple Vulnerabilities
  1295. AlienVault OSSIM 'av-centerd' Remote Code Execution
  1296. OSSIM SOAP Service Detection
  1297. Default Password (f00b@r) for 'root' Account
  1298. Countertack Sentinel User Interface Detection
  1299. Countertack Sentinel Detection
  1300. Havex Hunts For ICS/SCADA Systems - F-Secure Weblog : News from the Lab
  1301. Cisco Security Advisory: Undocumented Test Interface in Cisco Small Business Devices
  1302. Ten Years Later, Cabir Worm's Place in History is Unique | Threatpost | The first stop for security news
  1303. Black Hat USA 2014: Embedded & Vulnerable
  1304. Tavis Ormandy finds an embarrassing hole In more Microsoft products
  1305. Research Project Pays People to Download, Run Executables
  1306. Gear to Block Juice Jacking on Your Mobile
  1307. Ransomware with a happy ending | Naked Security
  1308. Vixie: Open Internet is Slowly Poisoning Us
  1309. Hacking the DSP-W215, Again, Again, Again
  1310. Hacking the DSP-W215, Again, Again
  1311. Hacking the DSP-W215, Again
  1312. Products endorsed by cybersec experts
  1313. Passive OS Detection Report
  1314. OpenSSL ChangeCipherSpec Dashboard
  1315. Samba < 3.6.20 / 4.0.11 / 4.1.1 Multiple Vulnerabilities
  1316. Citrix XenServer Windows Guest Tools Remote DoS
  1317. Citrix XenServer Tools Detection
  1318. Unsupported ScreenOS Operating System
  1319. IBM Tivoli Directory Server 6.0.x / 6.1 < 6.1.0.58 / 6.2 < 6.2.0.33 / 6.3 < 6.3.0.25 Javadoc Frame Injection
  1320. EMC Documentum D2 Privilege Escalation
  1321. Juniper ScreenOS 5.4 < 5.4.0r28 / 6.2 < 6.2.0r18 / 6.3 < 6.3.0r16 Malformed ICMP Echo Request DoS (JSA10604)
  1322. Juniper ScreenOS 5.4.x < 5.4.0r12 / 6.1.x / 6.2.x < 6.2.0r2 'about.html' Information Disclosure
  1323. Juniper ScreenOS < 5.4.0r10 / 6.0 < 6.0.0r6 / 6.1 < 6.1.0r2 Web Interface and Telnet Login Pages XSS (JSA10388)
  1324. OpenSSL 1.0.1 < 1.0.1h Multiple Vulnerabilities
  1325. OpenSSL 0.9.8 < 0.9.8za Multiple Vulnerabilities
  1326. Opera < 22 Multiple Chromium Vulnerabilities
  1327. Ubuntu 13.10 : linux vulnerabilities (USN-2241-1)
  1328. They Hack Because They Can
  1329. Botnets coming soon to a smart home or automated building near you
  1330. Linksys E4200 Vulnerability Enables Authentication Bypass
  1331. Vulnerabilities in IPMI Protocol Have Long Shelf Life
  1332. gizmodo/full (Gizmodo) How Teen Hackers Were Portrayed In 1980s Family Magazines
  1333. Critical OpenSSL Patch Available. Patch Now!, (Thu, Jun 5th)
  1334. New OpenSSL MITM Flaw Affects All Clients, Some Server Versions
  1335. Back To Basics
  1336. Hackers Infiltrate Desk Phones For Epic Office Pranks
  1337. CVE Iterator Report
  1338. OWASP Top 10
  1339. Passive OS Detection
  1340. SCAP Audit Summary Report
  1341. Stealer Malware
  1342. FireEye Status Dashboard
  1343. Mac OS X < 10.9.3 Multiple Vulnerabilities (Security Update 2014-002)
  1344. Mozilla Thunderbird 17 Script Execution in HTML Mail Replies
  1345. AppleTV < 6.1.1 Multiple Vulnerabilities
  1346. RTMP Connection Detection
  1347. Apple iOS 7.x < 7.1.1 Multiple Security Vulnerabilities
  1348. RTMP Connection Detection
  1349. PC Duo Detection
  1350. PC Duo Detection
  1351. Multicast Source Discovery Protocol Client Detection
  1352. Samba < 3.6.23 / 4.0.16 / 4.1.6 Multiple Vulnerabilities
  1353. McAfee ePolicy Orchestrator OpenSSL Information Disclosure (Heartbleed)
  1354. Mac OS X : Safari < 6.1.4 / 7.0.4 Multiple Vulnerabilities
  1355. IBM Domino 9.0.0 < 9.0.0 Interim Fix 4 iNotes Buffer Overflow (credentialed check)
  1356. IBM Domino 8.5.3 < 8.5.3 Fix Pack 5 Interim Fix 1 iNotes Buffer Overflow (credentialed check)
  1357. IBM Domino 9.0 < 9.0.0 Interim Fix 4 iNotes Buffer Overflow
  1358. IBM Domino 8.5.x < 8.5.3 Fix Pack 5 Interim Fix 1 iNotes Buffer Overflow
  1359. Western Digital Arkeia lang Cookie Crafted Local File Inclusion
  1360. Western Digital Arkeia lang Cookie Local File Inclusion
  1361. Western Digital Arkeia Virtual Appliance Unsupported Version Detection
  1362. Western Digital Arkeia Virtual Appliance Blank Password
  1363. Default Password (arkeia) for 'root' Account
  1364. Western Digital Arkeia Virtual Appliance Detection
  1365. IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.2 Multiple Vulnerabilities
  1366. RHEL 6 : gnutls (RHSA-2014:0595)
  1367. RHEL 5 : gnutls (RHSA-2014:0594)
  1368. Oracle Linux 6 : gnutls (ELSA-2014-0595)
  1369. Oracle Linux 5 : gnutls (ELSA-2014-0594)
  1370. FreeBSD : gnutls -- client-side memory corruption (027af74d-eb56-11e3-9032-000c2980a9f3)
  1371. IBM WebSphere Portal Apache Commons FileUpload DoS
  1372. PHP 5.5.x < 5.5.13 'src/cdf.c' Multiple Vulnerabilities
  1373. PHP 5.4.x < 5.4.29 'src/cdf.c' Multiple Vulnerabilities
  1374. Sendmail < 8.14.9 close-on-exec SMTP Connection Manipulation
  1375. Coolest Companies: Baltimore
  1376. Your devices Heartbleeding - again
  1377. 'Son Of Heartbleed' Hits Android And WiFi Networks
  1378. Your car is a giant computer - and it can be hacked
  1379. How I Got Here: Joe Grand
  1380. New attack methods can 'brick' systems, defeat Secure Boot, researchers say
  1381. Compliance: The Surprising Gift Of Windows XP
  1382. Linux users at risk as ANOTHER critical GnuTLS bug found The Register
  1383. 5 lessons from companies that get computer security right
  1384. Security Manager's Journal: We manage our threats, but what about our vendors?
  1385. Safely Storing User Passwords: Hashing vs. Encrypting
  1386. [webapps - D-Link Routers - Multiple Vulnerabilities]
  1387. What You Need To Know to Become a Penetration Tester
  1388. Can I drop a pacemaker 0day?
  1389. Mimikatz Against Virtual Machine Memory Part 1
  1390. [papers - TP-Link TD-W89 Config File Download / Exploiting the Host]
  1391. Nagios and NPRE
  1392. WordPress: unsafe at any speed
  1393. I Forgot My Wallet. Can I Borrow Yours?
  1394. LulzSec leader sentenced to time served after cooperating with police
  1395. That Snowden chap was SPOT ON says China
  1396. I saved Pinterest's business and all I have to show for it is a t-shirt
  1397. Windows XP hack resurrects patches for retired OS
  1398. Siemens Fixes DoS Flaw in Rugged OS Devices
  1399. Half Of eBay Users No Longer Trust It After Breach
  1400. Google To Have Botnet Of Cars
  1401. Black Hat USA 2014: Focus on Reverse Engineering
  1402. HackerOne Bug Bounty Platform Lands Top Microsoft Security Expert
  1403. TrueCrypt turmoil latest: Bruce Schneier reveals what he'll use instead
  1404. No, you can't remotely turn on phones
  1405. Why You Should Ditch Adobe Shockwave
  1406. Disclosing vs. Hoarding Vulnerabilities
  1407. Weev invoices feds for kidnapping him for 3 years
  1408. Another Site Breached - Time to Change your Passwords! (If you can that is), (Thu, May 22nd)
  1409. Locked In: Keeping Your Enterprise Encryption Keys in Order
  1410. Internet Explorer Zero Day Report
  1411. Cloud Storage Executive Report
  1412. Nessus Scan Report (Top 5)
  1413. Web Activity Report
  1414. CVSS Exploitability (E) and Remediation Level (RL) Risk Matrices
  1415. Cloud Storage
  1416. CVSS Temporal Risk Heat Map
  1417. Web Activity
  1418. CVSS Temporal Ratio
  1419. Google Chrome < 34.0.1847.131 (Mac) Multiple Vulnerabilities
  1420. Google Chrome < 34.0.1847.131 (Windows) Multiple Vulnerabilities
  1421. Google Chrome < 34.0.1847.132 (Linux) Multiple Vulnerabilities
  1422. Xerox Supernode Discovery Client Detection
  1423. Mozilla Firefox for Android < 24.0 Shared Library Loading Vulnerability
  1424. Mozilla Firefox for Android < 29.0 Addressbar/Phishing Vulnerability
  1425. Opera < 21.0 Multiple Vulnerabilities
  1426. Microsoft Internet Explorer 6 through 11 Arbitrary Code Execution
  1427. ISC BIND 9.10.0 Recursive Nameserver Denial of Service Vulnerability
  1428. Google Chrome < 34.0.1847.137 (Mac) Multiple Vulnerabilities
  1429. IWARP Server Detection
  1430. Twitch TV Client Detection
  1431. Mac iCal Client Detection
  1432. IWARP Client Detection
  1433. mDNS Query Response
  1434. AppleTV Detected
  1435. iTunes < 11.2.1 Insecure Permissions Local Privilege Escalation
  1436. InduSoft Web Studio < v7.1 + SP2 + P2 Security System Vulnerability
  1437. Schneider Electric SCADA Expert ClearSCADA 2013 R1 < 2013 R1.2 Remote Denial of Service Vulnerability
  1438. nginx 1.5.10 SPDY Memory Corruption
  1439. ESXi 5.5 < Build 1746974 / 5.5 Update 1 < Build 1746018 OpenSSL Library Multiple Vulnerabilities (including Heartbleed) (remote check)
  1440. ISC BIND 9 Recursive Server prefetch DoS
  1441. iTunes < 11.2.1 User Directory Insecure Permissions Vulnerability (Mac OS X)
  1442. iTunes < 11.2.1 User Directory Insecure Permissions Vulnerability (uncredentialed check)
  1443. Multiple Vendor SNMP public Community String Information Disclosure
  1444. Mac OS X : OS X Server < 3.1.2 Heap-Based Buffer Overflow
  1445. Google Chrome < 35.0.1916.114 Multiple Vulnerabilities (Mac OS X)
  1446. Google Chrome < 35.0.1916.114 Multiple Vulnerabilities
  1447. EZPZ One Click Backup Plugin for WordPress cmd Parameter Remote Command Execution
  1448. Bugzilla 2.0 < 4.4.3 / 4.5.3 Login Form XSRF
  1449. Bugzilla 2.0 < 4.0.12 / 4.2.8 / 4.4.3 / 4.5.3 Character Spoofing
  1450. FortiWeb < 5.2.0 Multiple XSRF Vulnerabilities
  1451. BlackBerry < 10.2.0.1443 Multiple Vulnerabilities
  1452. Good Ol SQLi Used to Hack Naval Database from Nuclear Carrier
  1453. How to wiretap a country
  1454. Bitly Installs Two-Factor Security After Insider Account Compromise
  1455. Why Your Router Is A Security Risk & How To Fix It
  1456. Schneider Electric asks users to patch Heartbleed again
  1457. Another Internet Explorer Zero Day Surfaces
  1458. Why is eBay burying news of its security breach from its users?
  1459. Hacking the D-Link DSP-W215 Smart Plug
  1460. eBay Urges Password Changes After Breach Krebs on Security
  1461. Brown HIV researchers make Dropbox secure with nCrypted Cloud
  1462. Target, Gap, other retailers join to share cyberthreat data
  1463. Penetration Testing Has Come Of Age Now Its Time to Move On | M-unition
  1464. Bitly hackers stole user credentials from offsite database backup
  1465. [4]
  1466. Moar Shellz!
  1467. carmaa/inception GitHub
  1468. BugsCollector | Web security tricks
  1469. Computer Forensics in Fiction
  1470. NetSec
  1471. Linux "got root" kernel bug patched after five years at large
  1472. Kippo Users Beware: Another fingerprinting trick, (Wed, May 14th)
  1473. Google opens up Glass to the US masses for $1,500 a pair
  1474. Is that Twitter account a bot? Researchers make app to find out
  1475. Don't let hackers know Mandiant founder checks his email on an iPad. Oh.
  1476. Deactivated User Accounts Die Hard
  1477. Dropbox finally fixes security vulnerability
  1478. SHA-2 Takes Off, Thanks To Heartbleed
  1479. Why Threat Intelligence Is Like Teenage Sex
  1480. Your Android phone viewed illegal porn. To unlock it, pay a $300 fine
  1481. Google acquires restaurant website builder Appetas
  1482. Serious security flaw in OAuth, OpenID discovered
  1483. McAfee accused of McSlurping Open Source Vulnerability Database The Register
  1484. Unix find Cheat Sheet
  1485. 300k servers vulnerable to Heartbleed one month later
  1486. New iPhone lock screen flaw gives hackers full access to contact list data
  1487. Google stops scanning Gmail messages for ads in Apps for Education - Network World
  1488. Hacking Traffic Systems for Fun and Chaos
  1489. Windows XP Systems Also Get Out-of-Band IE Zero-Day Patch
  1490. Popular Ad Blocker Drops Support for IE6 and IE7
  1491. What a Toilet Hoax Can Tell Us About the Future of Surveillance - Jennifer Golbeck - The Atlantic
  1492. JTAG Slides
  1493. Fun with IDS funtime #3: heartbleed
  1494. The Rise of the Insider in a Collaborative IT World
  1495. Study finds data moving to cloud, encrypted or not
  1496. AOL Subscriber Data Stolen: You've Got Pwned
  1497. Thief in the night: Stealing in a digital age
  1498. FortiGate Scan Report
  1499. System Configuration Report
  1500. Admin Discovery Report
  1501. Tenable Admin
  1502. Executive Vulnerability Metrics
  1503. Oracle Sun Role Manager Identified
  1504. 9P File Share Client Detection
  1505. 9P File Share Server Detection
  1506. AllMyApps Client Detection
  1507. ArcGIS Client Detection
  1508. Airplay Client Detection
  1509. Anipang Internet Gaming Detection
  1510. 5by5 Media Streaming Detection
  1511. HP Print Server Detection
  1512. Aviator Browser Detection
  1513. Fortinet OpenSSL Information Disclosure
  1514. MaraDNS 1.2.12.06 / 1.3.05 Wildcard Resource Record Remote DoS
  1515. HP LeftHand OS Unmanaged Host Detection
  1516. MS14-020: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)
  1517. OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities
  1518. Ajax Pagination (twitter Style) Plugin for WordPress Local File Inclusion
  1519. Silex USB Device Server Web Configuration Page Empty Password
  1520. CUPS < 1.7.2 is_path_absolute Function XSS
  1521. OpenVPN Installed
  1522. FortiWeb 5.x < 5.0.4 XSS
  1523. Symantec Messaging Gateway 10.x < 10.5.2 Management Console XSS (SYM14-006)
  1524. NAS4Free Web UI Default Credentials
  1525. Oracle OpenSSO Multiple Vulnerabilities (April 2014 CPU)
  1526. Oracle OpenSSO Detection
  1527. Cisco IOS IKE Module DoS
  1528. MS KB2963983: Vulnerability in Internet Explorer Could Allow Remote Code Execution
  1529. MS KB2961887: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  1530. Flash Player for Mac <= 11.7.700.275 / 13.0.0.201 Pixel Bender Component Buffer Overflow (APSB14-13)
  1531. Flash Player <= 11.7.700.275 / 13.0.0.182 Pixel Bender Component Buffer Overflow (APSB14-13)
  1532. Snapchat's Expired Snaps Are Not Deleted, Just Hidden
  1533. Not to be outdone by Microsoft, Adobe announces zero-day exploit patch for Flash
  1534. Dell Automates Driver Downloads with New Driver Pack Catalog
  1535. Human-implanted RFID chips
  1536. Satellite Communications Wide Open To Hackers
  1537. Query to find active vulnerabilities 30 days old or more
  1538. SCAP Audit Summary
  1539. HeartBleed Dashboard
  1540. CVSS Base Risk Host Matrices
  1541. NetFlow Monitor Dashboard
  1542. CVSS Base Risk Matrices
  1543. CUPS < 1.7.2 Reflected Cross-Site Scripting Vulnerability
  1544. Mac OS X : Safari < 6.1.3 / 7.0.3 Multiple Vulnerabilities
  1545. Google Chrome < 34.0.1847.116 Multiple Vulnerabilities
  1546. TLSv1 Traffic Negotiation Detection
  1547. DTLS Heartbeat Negotiation Detection
  1548. DTLS v1.2 Traffic Negotiation Detection
  1549. DTLS v1.0 Traffic Negotiation Detection
  1550. SSL Content-Type Heartbeat Detection
  1551. OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities
  1552. Windows RDP / Terminal Services Detection
  1553. UDP Protocol Detection
  1554. Generic TCP Protocol Detection
  1555. DNSSEC Client Query Detection
  1556. MediaWiki Password Reset Cross-site Request Forgery Vulnerability
  1557. MailStation Server Detection
  1558. TLS v1.1 Traffic Negotiation Detection
  1559. Fortinet Security Device Detection
  1560. AirMail OSX Client Detection
  1561. Social Network Activity Executive Report
  1562. HeartBleed Report
  1563. NetFlow Monitor Report
  1564. Flash Player for Mac <= 11.7.700.272 / 12.0.0.77 Multiple Vulnerabilities (APSB14-09) (Mac OS X)
  1565. Cisco IOS XR ICMPv6 Redirect Denial of Service
  1566. WMI EMET Configuration Enumeration
  1567. BlackBerry < 10.2.0.1055 qconnDoor Buffer Overflow
  1568. Amazon Linux AMI : openssl Information Disclosure Vulnerability (ALAS-2014-320)
  1569. SSL Certificate Chain Contains RSA Keys Less Than 2048 bits (PCI DSS)
  1570. Adobe AIR for Mac <= 4.0.0.1628 Multiple Vulnerabilities (APSB14-09)
  1571. BACnet Protocol Detection
  1572. MediaWiki Unsupported Version Detection
  1573. Amazon Linux AMI Update: kernel / openssh Denial of Service (ALAS-2014-319)
  1574. Notorious troll and hacker Weev has conviction overturned
  1575. OpenSSL: The single line of code that broke online security
  1576. How To Securely Erase Your SSD Without Destroying It
  1577. The security of the most popular programming languages
  1578. Google Might Reward Secure Websites With Better Ranking
  1579. Galaxy S5 Fingerprint Scanner Hacked With Glue Mould
  1580. Organizations suffer SQL Injection attacks, but do little to prevent them
  1581. HD Manufacturer LaCie Admits Yearlong Data Breach
  1582. Windows XP Alive & Well in ICS/SCADA Networks
  1583. Black Hat USA 2014: Pentesting? Thought You'd Never Ask
  1584. Troy Hunt: Everything you need to know about the Heartbleed SSL bug
  1585. Heartbleed
  1586. Difficulty of Detecting OpenSSL Heartbleed Attacks Adds to Problem
  1587. What Have We Learned: OpenSSL Heartbleed Bug
  1588. Not just websites hit by OpenSSL's Heartbleed PCs, phones and more under threat
  1589. "Heartbleed heartache" - should you REALLY change all your passwords right away?
  1590. * Patch Now: OpenSSL "Heartbleed" Vulnerability, (Tue, Apr 8th)
  1591. Heartbleed vendor notifications, (Wed, Apr 9th)
  1592. All things not Heartbleed, (Thu, Apr 10th)
  1593. Brace Yourselves (and your Users / Clients) for Heartbleed SPAM, (Thu, Apr 10th)
  1594. Heartbleed Bug: What Can You Do? Krebs on Security
  1595. Test your server for Heartbleed (CVE-2014-0160)
  1596. existential type crisis : Diagnosis of the OpenSSL Heartbleed Bug
  1597. Prezi got Pwned: A tale of responsible disclosure - Engineering at Prezi
  1598. 42 days to go for XP 8 tips if you arent going to make it
  1599. Meet the next-gen USB cable that could sweep away all others
  1600. Android Botnet Targets Middle East Banks
  1601. Amazon Web Services Combing Third Parties for Exposed Credentials
  1602. DNS-Based Amplification Attacks Key on Home Routers
  1603. What took you so long Apple? 26 remote exec bugs die in OS X Safari
  1604. Google Wants Supreme Court To Rule On Street View Privacy Case
  1605. PCI Status
  1606. Social Network Activity Dashboard
  1607. Council on CyberSecurity 20 Critical Security Controls Dashboard
  1608. Cybersecurity Asset Management
  1609. PVS Trust Relationships
  1610. Cybersecurity Framework Audit Dashboards
  1611. PHP 5.5.x < 5.5.10 Multiple Vulnerabilities
  1612. Apple iOS 7.x < 7.1 Multiple Security Vulnerabilities
  1613. Google Chrome < 33.0.1750.149 Multiple Vulnerabilities
  1614. Flash Player < 11.2.202.341 / 12.0.0.77 Multiple Vulnerabilities
  1615. lighttpd < 1.4.35 Multiple Vulnerabilities
  1616. Synology DiskStation Manager <= 4.3-3827 'value' Parameter SQL Injection Vulnerability
  1617. Google Chrome OS < 33.0.1750.152 Multiple Security Vulnerabilities
  1618. Google Chrome < 33.0.1750.152 (Linux) Multiple Vulnerabilities
  1619. Google Chrome < 33.0.1750.152 (Mac) Multiple Vulnerabilities
  1620. Google Chrome < 33.0.1750.154 (Win) Multiple Vulnerabilities
  1621. OpenSSH < 6.6 Remote Restriction Bypass Vulnerability
  1622. Whitehat Aviator Version Detection
  1623. Sina Weibo Usage Detection
  1624. Mozilla Firefox < 28.0 / ESR version < 24.4 Multiple Vulnerabilities
  1625. Mozilla SeaMonkey < 2.25 Multiple Vulnerabilities
  1626. Mozilla Thunderbird < 24.4 Multiple Vulnerabilities
  1627. Firefox OS < 1.2.2 / 1.3 Directory Traversal Vulnerability
  1628. Firefox OS Detection
  1629. Mozilla Firefox for Android < 28.0 Multiple Vulnerabilities
  1630. Mozilla Firefox for Android < 28.0.1 'file:' Protocol Information Disclosure
  1631. cURL/libcURL 7.x < 7.35.0 Multiple Vulnerabilities
  1632. Canon PIXMA MX722 Information Disclosure Vulnerability
  1633. RuggedCom Rugged Operating System < 4.1 (or 3.11.5 for RS950G) Remote Denial of Service
  1634. Account Weakness Report
  1635. PCI Configuration Report
  1636. Group Management Report
  1637. PVS Detections Executive Report
  1638. TCP Metrics Report
  1639. PVS Detections Report - Top 50 Exploitable Vulnerabilities
  1640. Council on CyberSecurity - Critical Security Controls Report
  1641. PVS Detections Report - Devices and Services
  1642. Top Advice for CISOs
  1643. Marcus Ranum and Anton Chuvakin explore big data and security
  1644. SeaMonkey < 2.25 Multiple Vulnerabilities
  1645. IBM SPSS SamplePower 3.0.1 < 3.0.1 IF2 vsflex8l ActiveX Control Remote Code Execution
  1646. WebSphere MQ 7.5 < 7.5.0.3 Information Disclosure
  1647. ZTE F460 / F660 Cable Modems web_shell_cmd.gch Administrative Backdoor
  1648. IBM WebSphere Portal Tagging Reflected XSS
  1649. IBM WebSphere Portal Unspecified URL Manipulation Arbitrary File Access
  1650. IBM WebSphere Portal Improper Access Control Checks
  1651. Cisco AsyncOS for Email Security Appliances Software Remote Code Execution (CSCug79377)
  1652. Cisco AsyncOS for Content Security Management Appliances Software Remote Code Execution (CSCug80118)
  1653. stunnel < 5.00 PRNG State Security Weakness
  1654. Dell KACE K1000 < 5.5.90547 / 5.4.76849 Arbitrary File Upload and Command Execution
  1655. McAfee Email Gateway Version
  1656. McAfee Email Gateway Multiple Vulnerabilities
  1657. MantisBT 1.1.0 < 1.2.16 Multiple Vulnerabilities
  1658. PHP PHP_RSHUTDOWN_FUNCTION Security Bypass
  1659. Autodesk AutoCAD Detection
  1660. Autodesk AutoCAD < 2014 Multiple Vulnerabilities
  1661. Autodesk AutoCAD DWG Buffer Overflow
  1662. Default Password (ironport) for 'admin' Account
  1663. Default Password (ironport) for 'enablediag' Account
  1664. Cisco Email Security Appliance Web UI Default Credentials
  1665. Cisco Content Security Management Appliance Web UI Default Credentials
  1666. Mobile ATM Attack Uses SMS To Dispense Cash
  1667. GUI Bugs Expose Information Disclosure, Privilege Escalation | Threatpost | The first stop for security news
  1668. Microsoft: 0Day Exploit Targeting Word, Outlook Krebs on Security
  1669. Ephemeral Apps
  1670. S4x14 Session: You Name It; We Analyze It
  1671. California man who lasered two helicopters to face 14 years behind bars
  1672. Hack of Boxee.tv exposes password data, messages for 158,000 users
  1673. Dumb hackers leave encryption keys on victims' PCs
  1674. Researcher Lights Fire Under Tesla Security
  1675. Hackers Use Security Camera DVRs As Bitcoin Mining Rig
  1676. SmartTV, dumb vuln: Philips hard-codes Miracast passwords The Register
  1677. 'Thingularity' Triggers Security Warnings
  1678. Ad tracking: Is anything being done?
  1679. Researchers Divulge 30 Oracle Java Cloud Service Bugs
  1680. How I got root with Sudo | Securus Global Blog
  1681. Redpoint: Discover & Enumerate BACnet Devices
  1682. Smarter People are More Trusting
  1683. Brian Krebs Subject of Sony Pictures Movie Deal | The State of Security
  1684. A few updates on "The Moon" worm, (Tue, Mar 25th)
  1685. Most ATMs will remain on Windows XP after Microsoft pulls plug on OS support
  1686. The Internet of Things is being used to mine digital currency
  1687. Hackers Can Force ATMs to Spit Out Money With a Text Message
  1688. Forget black hats the best hackers are going grey and getting legit The Register
  1689. About 55k In San Francisco Impacted In Theft Of Sutherland Computers
  1690. Metadata Poses Both Risks And Rewards
  1691. Microsoft Outlook Users Face Zero-Day Attack
  1692. Full Disclosure List Rises From the Ashes For Fresh Start
  1693. Beware this big iOS flaw -- and it's not alone | Security & Privacy - CNET News
  1694. Lenny Zeltser on Moats
  1695. Are Credit Monitoring Services Worth It?
  1696. Carnal0wnage & Attack Research Blog: Webmin Brute Forcing
  1697. WordPress XML-RPC PingBack Vulnerability Analysis - SpiderLabs Anterior
  1698. To Err Human, To Automate Secure | Radware Blog | Radware Blog
  1699. Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping | Ars Technica
  1700. The Cyber Security Skills Gap - J4vv4D
  1701. New iOS flaw makes devices susceptible to covert keylogging, researchers say | Ars Technica
  1702. RFID Wallets/Sleeves. How much Security do they provide? | Pentura Labs's Blog
  1703. ChrisTruncer/EyeWitness GitHub
  1704. Trey Ford: Testing, notification should not be criminalized (slides) | Page 6 | ZDNet
  1705. BsidesSF 2014 Fix What Matters
  1706. Hackers Can Infect Your Computer Even If It's Not Connected To The Internet
  1707. Target overhauls security and compliance group, CIO resigns
  1708. Hackers Take Control Of 300,00 Home Routers
  1709. CIA Found To Be Hacking The Senate Intelligence Committee
  1710. Hackers Churning Out 55,000 Malware Variants Every Day
  1711. Cisco Patches Authentication Flaw in Wireless Routers
  1712. Tenable Unveils Industrys First Integrated Threat and Vulnerability Management Capabilities for Faster Resolution of Critical Security Incidents
  1713. SC Magazine Interviews Tenables Jack Daniel
  1714. Tenable Adds Cloud Management and Multi-Scanner Support to Nessus
  1715. RSA News: Tenable Enhances Platform
  1716. A New Airborne WiFi Virus Spreads Like the Common Cold
  1717. "Researchers at the University of Liverpool claim to have created a computer virus that can spread via Wi-Fi as effic...
  1718. C programming: you are teaching it wrong
  1719. Windows XP Ends After 12 Years, Apple Snow Leopard After 4
  1720. Car Hacking: You Cannot Have Safety without Security
  1721. Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy
  1722. DDoS & Security Reports NTP ATTACKS: Welcome to The Hockey Stick Era
  1723. Swiss Firm Digs Up 300,000+ Usernames/Passwords on Pastebin | Threatpost | The first stop for security news
  1724. Time to Harden Your Hardware? Krebs on Security
  1725. Compliance Summary
  1726. Account Weakness
  1727. CVE Analysis
  1728. Event Vulnerabilities
  1729. Compliance Summary Report
  1730. PVS Detections Report - Traffic
  1731. CVE Monthly Status Report
  1732. Opera < 19.0 (for Mac) Address Bar URI Spoof Vulnerabilities
  1733. Palo Alto Device Detection
  1734. Apache Tomcat 6.0.x < 6.0.39 Multiple Vulnerabilities
  1735. Quicktime (for Windows) < 7.7.5 Multiple Vulnerabilities
  1736. Apple Quicktime 7.7.5 Multiple Vulnerabilities
  1737. Mac OS X < 10.9.2 Multiple Vulnerabilities
  1738. Mac OS X : Safari < 6.1.2 / 7.0.2 Multiple Vulnerabilitieses
  1739. Windows Phone Operating System Version Detection
  1740. Apple iOS 7.x < 7.0.6 / 6.x < 6.1.6 Data Security Vulnerability
  1741. PostgreSQL < 9.3.3 / 9.2.7 / 9.1.12 / 9.0.16 / 8.4.20 Multiple Vulnerabilities
  1742. Google Chrome for iOS < 33.0.1750.14 Unspecified Security Vulnerability
  1743. Microsoft Operating System Detection
  1744. MariaDB Client 5.5.x < 5.5.36 Remote Multiple Denial of Service Vulnerabilities
  1745. Google Chrome < 33.0.1750.117 Multiple Vulnerabilities
  1746. MariaDB Client 5.5.x < 5.5.35 Buffer Overflow Vulnerability
  1747. HNAP Protocol Detection
  1748. RuggedCom Rugged Operating System < 3.12.4 (or 4.0 for RSG2488) Remote Denial of Service via SNMP
  1749. IBM Domino < 9.0.1 Unspecified IMAP Remote Denial of Service Vulnerability
  1750. Apache Subversion < 1.6.21 / 1.7.9 Remote Denial of Service Vulnerability
  1751. Titan FTP Server < 10.40 Build 1829 Directory Traversal Vulnerability
  1752. PHP 5.5.x < 5.5.9 Multiple Vulnerabilities
  1753. Pale Moon Browser Version Detection
  1754. Pale Moon < 24.3.2 Unspecified Security Vulnerability
  1755. OS Detection
  1756. Microsoft Version Check
  1757. Apple Version Check
  1758. Unsupported Cisco Operating System
  1759. Ubiquiti airCam < 1.2.0 ubnt-streamer RTSP Service Remote Code Execution
  1760. MS KB2934802: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  1761. Serv-U FTP Server < 15.0.1.20 DoS
  1762. PostgreSQL 8.4 < 8.4.20 / 9.0 < 9.0.16 / 9.1 < 9.1.12 / 9.2 < 9.2.7 / 9.3 < 9.3.3 Multiple Vulnerabilities
  1763. Core FTP Server Detection
  1764. Core FTP Server < 1.2 Build 508 Multiple Buffer Overflow Vulnerabilities
  1765. Core FTP Server < 1.2 Build 515 Multiple Vulnerabilities
  1766. SFTP Supported
  1767. Anonymous SFTP Enabled
  1768. Nortel Meridian Integrated RAN Default Admin Credentials
  1769. Apple iOS 6.x < 6.1.6 'SSLVerifySignedServerKeyExchange' Certificate Validation Weakness
  1770. Apple iOS 7.x < 7.0.6 'SSLVerifySignedServerKeyExchange' Certificate Validation Weakness
  1771. Cisco Firewall Services Module Software Denial of Service (cisco-sa-20140219-fwsm)
  1772. Zimbra Collaboration Server Aspell Spell Check Service Detection
  1773. Zimbra Collaboration Server aspell.php dictionary Parameter XSS
  1774. CoSoSys Endpoint Protector < 4.4.0.1 Unspecified XSS
  1775. Artweaver 3.x < 3.1.6 AWD File Buffer Overflow
  1776. ASUS Routers flag Parameter XSS
  1777. Enumerate Local Users
  1778. Jenkins < 1.551 / 1.532.2 and Jenkins Enterprise 1.509.x / 1.532.x < 1.509.5.1 / 1.532.2.2 Multiple Vulnerabilities
  1779. MyBB < 1.6.11 Multiple Vulnerabilities
  1780. Mac OS X < 10.9.2 Multiple Vulnerabilities
  1781. Mac OS X Multiple Vulnerabilities (Security Update 2014-001)
  1782. Mac OS X : Safari < 6.1.2 / 7.0.2 Multiple Memory Corruption Vulnerabilities
  1783. Apache Tomcat 6.0.x < 6.0.39 Multiple Vulnerabilities
  1784. Apache Tomcat 7.0.x < 7.0.50 Multiple Vulnerabilities
  1785. Apache Tomcat 8.0.x < 8.0.3 Content-Type DoS
  1786. Apache Tomcat 7.0.x < 7.0.52 Content-Type DoS
  1787. StruxureWare SCADA Expert ClearSCADA Detection
  1788. StruxureWare SCADA Expert ClearSCADA Unspecified Vulnerability
  1789. CoDeSys 2.x Development System Detection (credentialed check)
  1790. Ubuntu 12.10 : linux vulnerabilities (USN-2114-1)
  1791. Ubiquiti airCam Detection
  1792. Microsoft .NET Framework Unsupported
  1793. Multiple Vulnerabilities in Cisco Intrusion Prevention System Software (cisco-sa-20140219-ips)
  1794. QuickTime < 7.7.5 Multiple Vulnerabilities (Windows)
  1795. Mitsubishi Electric Automation MC-WorX 8.x ActiveX Control Remote Code Execution
  1796. MariaDB 5.1 < 5.1.69 NAME_CONST Query DoS
  1797. MariaDB 5.2 < 5.2.15 NAME_CONST Query DoS
  1798. MariaDB 5.3 < 5.3.13 Multiple DoS Vulnerabilities
  1799. MariaDB 5.5 < 5.5.36 Multiple DoS Vulnerabilities
  1800. MariaDB 10 < 10.0.9 Multiple DoS Vulnerabilities
  1801. phpMyAdmin 3.x >= 3.3.1 / 4.x < 4.1.7 import.php XSS
  1802. ImageMagick < 6.8.7-6 WritePSDImage PSD Handling Memory Corruption
  1803. ImageMagick < 6.8.8-5 Multiple PSD Handling Buffer Overflows
  1804. Unified SIP Phone 3905 Unauthorized Access
  1805. Cisco 9900 Series IP Phone Crafted Header Unregister Vulnerability
  1806. Blue Coat ProxySG Local User Modification Race Condition
  1807. Cisco Jabber for Windows Detection
  1808. Cisco Jabber for Windows 9.x < 9.2(2) 'Send Screen Capture' File Write
  1809. McAfee ePolicy Orchestrator < 4.6.7 HF 940148 XML Entity Injection
  1810. McAfee ePolicy Orchestrator Unsupported Version Detection
  1811. Foxit Reader < 6.1.4 imgseg.dll Path Subversion Arbitrary DLL Injection Code Execution
  1812. DameWare Remote Support Detection
  1813. DameWare Remote Support < 9 Hotfix 2 / 10 Hotfix 2 DWExporter.exe Buffer Overflow
  1814. Jenkins < 1.545 Subversion Plugin Information Disclosure
  1815. Subversion 1.3.x - 1.7.14 / 1.8.x < 1.8.8 mod_dav_svn DoS
  1816. Grails resources plug-in WEB-INF / META-INF File Disclosure
  1817. Zabbix < 1.8.20 / 2.0.11 / 2.2.2 Multiple Vulnerabilities
  1818. Over 2,560 Internal Security Breaches Occurred In US Businesses Every Day
  1819. Another Day a New Router Vulnerability Discovered
  1820. Common Linux Misconfigurations - InfoSec Institute
  1821. WRT120N fprintf Stack Overflow
  1822. Apple TV Hacking, Counterattacks, and Certificate Pinning Intrepidus Group - Insight
  1823. Technical Details Behind a 400Gbps NTP Amplification DDoS Attack | CloudFlare Blog
  1824. The Keystone Rocks - Foundation Chips of Pentesting Tips Part 1 - SpiderLabs Anterior
  1825. Hackers circulate thousands of FTP credentials, New York Times among those hit
  1826. Dear Asus router user: You've been pwned
  1827. Webcams exposed in Google Drive clickjack attack
  1828. Malware-flinging Linksys vulnerability confirmed as a HNAP1 bug
  1829. Belkin patches WeMo bug
  1830. 5 Tactics To Help Triage Patching
  1831. Belkin Wemo Smart Home Networks In Danger Of Hacks
  1832. Hackers Are Switching To Chargeware Scams
  1833. Two-Factor Authentication Vulnerability Identified in WordPress Plugins
  1834. Email Attack on Vendor Set Up Breach at Target
  1835. Egor Homakov: How I hacked Github again.
  1836. Cheat Sheets - OWASP
  1837. Cheat Sheets - Packet Life
  1838. Re-enabling JTAG and Debugging the WRT120N
  1839. Cracking Linksys Encryption
  1840. Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem
  1841. Please Dont Lock this Door Tonight
  1842. The Failure of the PCI-DSS?
  1843. HTTP NTLM Information Disclosure
  1844. NTP Reflection Attacks
  1845. Linksys Worm ("TheMoon") Captured, (Thu, Feb 13th)
  1846. HVAC Integrators Billing Connection Led to Target Breach
  1847. Detecting Car Hacks
  1848. BBC News - Huge hack 'ugly sign of future' for internet threats
  1849. How I hacked Instagram to see your private photos - insertCoin
  1850. A Snapchat Hack Is Sending People Pictures of Smoothies
  1851. Edward Snowden Got a Bunch of NSA Info By Stealing a Coworker's Password
  1852. Suspected Mass Exploit Against Linksys E1000 / E1200 Routers - Internet Security | SANS ISC
  1853. Have a Linksys router? Now's a good time to update that firmware
  1854. Hacked X-Rays Could Slip Guns Past Airport Security
  1855. Meet The Man Who Hacked Jeopardy
  1856. Snowden's tools for hacking NSA not exactly high tech
  1857. 'No, I CAN'T write code myself,' admits woman in charge of teaching our kids to code
  1858. Evan Schuman: Get ready, IT; here comes the Internet of Things
  1859. John McAfee declares war on Android
  1860. Patch Tuesday brings Microsoft fixes and Adobe Shockwave update
  1861. FlashCanvas <= 1.5 Reflected Cross-site Scripting Attack
  1862. PVS Detections
  1863. Shockwave Player <= 12.0.7.148 Multiple Memory Corruption Vulnerabilities (APSB14-06)
  1864. MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (2928390)
  1865. MS14-010: Cumulative Security Update for Internet Explorer (2909921)
  1866. MS14-009: Vulnerabilities in .NET Framework Could Allow Privilege Escalation (2916607)
  1867. MS14-008: Vulnerability in Microsoft Forefront Protection for Exchange Could Allow Remote Code Execution (2927022)
  1868. MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution (2912390)
  1869. MS14-006: Vulnerability in ICMPv6 Could Allow Denial of Service (2904659)
  1870. MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2916036)
  1871. Web Site Client Access Policy File Detection
  1872. Using Security Center to find Default & Common Credential
  1873. Mobile Devices Perceived as Security Industry's Weakest Link, Finds '2014 Cyberthreat Defense Report'
  1874. Relative Date Summary Report
  1875. Do you have HVAC systems on your internal network?
  1876. Mozilla Firefox < 27.0 / 24.3 (ESR version) Multiple Vulnerabilities
  1877. Mozilla Firefox for Android < 27.0 Multiple Vulnerabilities
  1878. Mozilla SeaMonkey < 2.24 Multiple Vulnerabilities
  1879. Mozilla Thunderbird < 24.3 Multiple Vulnerabilities
  1880. Google Chrome < 32.0.1700.102 Multiple Vulnerabilities
  1881. OID parsing
  1882. Adobe AIR <= 3.9.0.1380 Multiple Vulnerabilities (APSB14-02)
  1883. Flash Player (Internet Explorer) <= 11.9.900.170 Multiple Vulnerabilities (APSB14-02)
  1884. Flash Player < 12.0.0.43 Multiple Vulnerabilities (APSB14-02)
  1885. Flash Player <= 11.7.700.260 / 12.0.0.43 (inferred) Remote Code Execution (APSB14-04)
  1886. Flash Player <= 11.7.700.260 / 12.0.0.43 Multiple Vulnerabilities (APSB14-04)
  1887. Google Chrome < 32.0.1700.107 Remote Code Execution
  1888. CVE Trending by Year
  1889. Emerson Network Power Avocent MergePoint Unity 2016 < 1.14 / 1.18 download.php filename Parameter Directory Traversal
  1890. Sophos Anti-Virus Engine < 3.50.1 System Objects DoS
  1891. Cisco Secure ACS Portal Interface Session Hijacking
  1892. Oracle Secure Global Desktop Multiple Vulnerabilities
  1893. Oracle Secure Global Desktop Unsupported Release
  1894. Synology DiskStation Manager (DSM) Detection
  1895. Synology DiskStation Manager 4.0-x < 4.0-2259 / 4.1-x / 4.2-x < 4.2-3243 SLICEUPLOAD Function Remote Code Execution
  1896. Synology DiskStation Manager < 4.3-3776 Update 2 Multiple Vulnerabilities
  1897. Synology DiskStation Manager < 4.3-3776 Update 3 info.cgi Multiple Parameters XSS
  1898. Synology DiskStation Manager 4.3-x < 4.3-3810 Update 1 Multiple Vulnerabilities
  1899. Synology DiskStation Manager < 4.3-3810 Update 3 Multiple FileBrowser Component Directory Traversal Vulnerabilities
  1900. Synology DiskStation Manager uistrings.cgi lang Parameter Directory Traversal
  1901. Novell Client 2 Vba32 AntiRootKit DoS
  1902. McAfee VirusScan Enterprise 8.8 < 8.8 Patch 1 DoS
  1903. Microsoft Internet Explorer Version Detection
  1904. IBM SPSS SamplePower 3.0.1 < 3.0.1 IF1 ActiveX Control Remote Code Execution
  1905. Oracle Identity Manager October 2013 CPU
  1906. Artweaver Detection
  1907. Artweaver 3.x < 3.1.5 JPG File Handling Stack-based Buffer Overflow
  1908. WinSCP < 5.1.6 RSA Signature Blob Integer Overflow
  1909. Red Hat JBoss Enterprise Application Platform 6.1.0 Security Update (RHSA-2013-1843)
  1910. Dell KACE K1000 Web Detection
  1911. Dell KACE K1000 < 5.5 Multiple SQL Injection Vulnerabilities
  1912. IrfanView MrSID Plugin < 4.37 Multiple Buffer Overflows
  1913. Adobe Digital Editions 2.0.0 'rmsdk_wrapper.dll' Memory Corruption (APSB13-20)
  1914. Adobe Digital Editions 2.0.1 Memory Corruption (Mac OS X)
  1915. HP B-series SAN Network Advisor Installed (Linux)
  1916. Dell KACE K2000 < 3.3.52857 Multiple Vulnerabilities
  1917. WinSCP < 5.1.7 Multiple Vulnerabilities
  1918. MediaWiki < 1.19.10 / 1.21.4 / 1.22.1 Multiple Vulnerabilities
  1919. Microsoft hoping users will get friends, family to leave Windows XP - Los Angeles Times
  1920. Using your Mobile to protect you from criminals
  1921. 10 of the Biggest Trends in Technology For 2014
  1922. Trojan.Win32.FSYSNA.fej AKA Chewbacca
  1923. Passive Vulnerability Scanner (PVS) 4.0.1 Now Available
  1924. Leveraging Logins and Login Failures to Track Insiders
  1925. Event Vulnerability Indicators
  1926. Vulnerability Top Ten
  1927. Xbox Gaming Console Detection
  1928. iTunes for Windows < 11.1.4 Multiple Vulnerabilities
  1929. iTunes (for OS X) < 11.1.4 Tutorials Content Injection
  1930. CUPS < 1.7.1 Local Privilege Escalation Vulnerability
  1931. Google Chrome for Android < 32.0.1700.99 Multiple Unspecified Vulnerabilities
  1932. SC Magazine Reviews SecurityCenter Continuous View
  1933. A fine mess: Global data breach legislation
  1934. Vulnerability Top Ten Executive Report
  1935. Nessus Scan Report
  1936. Insider Threat Report
  1937. Cisco Secure ACS RMI Arbitrary File Read (CSCud75169)
  1938. Cisco Secure ACS Portal Cross-Site Scripting (CSCue65949)
  1939. Puppet Symlink File Overwrite
  1940. Landing Pages Plugin for WordPress wp-admin/edit.php post Parameter SQL Injection
  1941. Cisco TelePresence Video Communication Server SIP DoS
  1942. StruxureWare SCADA Expert ClearSCADA < 2013 R2 Remote DoS
  1943. JBoss Detection
  1944. IBM Tivoli Storage Manager Client 6.3.1.x < 6.3.2.0 / 6.4.x < 6.4.1.0 ReFS Insecure File Permissions
  1945. McAfee VirusScan Enterprise < 8.8 / 8.7 HF643440 CLI Local Privilege Escalation
  1946. SAP GUI DLL Loading Arbitrary Code Execution (Note 1511179)
  1947. memcached < 1.4.17 Multiple Vulnerabilities
  1948. Oracle Access Manager Installed (credentialed check)
  1949. Oracle Access Manager October 2013 Critical Patch Update
  1950. MediaWiki < 1.19.11 / 1.21.5 / 1.22.2 Multiple Remote Code Execution Vulnerabilities
  1951. McAfee VirusScan Enterprise 8.5 / 8.7 hcp:// Security Bypass
  1952. memcached SASL Authentication Security Bypass
  1953. Symantec Workspace Virtualization Agent Detection
  1954. Symantec Workspace Virtualization 6.x < 6.4.1953 Local Privilege Escalation (SYM13-011)
  1955. IBM Global Security Kit 7 < 7.0.4.48 / 8 < 8.0.50.16 DoS
  1956. Pidgin < 2.10.8 Multiple Vulnerabilities
  1957. IBM Global Security Kit 7 < 7.0.4.47 / 8 < 8.0.50.13 DoS
  1958. Flash Player for Mac <= 11.7.700.260 / 12.0.0.43 Unspecified Remote Code Execution (APSB14-04)
  1959. MS KB2929825: Update for Vulnerability in Adobe Flash Player in Internet Explorer
  1960. Amazon Linux AMI : openssl Remote Crash Vulnerability (ALAS-2014-273)
  1961. Amazon Linux AMI : nss Man-in-the-middle Vulnerability (ALAS-2014-274)
  1962. Amazon Linux AMI : varnish Multiple Vulnerabilities (ALAS-2014-276)
  1963. Amazon Linux AMI : xorg-x11-server Buffer Overflow Vulnerability (ALAS-2014-277)
  1964. Amazon Linux AMI : gnupg Side-channel Attack Vulnerability (ALAS-2014-278)
  1965. Amazon Linux AMI : quagga Denial of Service (ALAS-2014-279)
  1966. Amazon Linux AMI : ca-certificates Man-in-the-middle Vulnerability (ALAS-2014-281)
  1967. Amazon Linux AMI : libXfont Buffer Overflow Vulnerability (ALAS-2014-282)
  1968. Amazon Linux AMI : augeas Privilege Vulnerability (ALAS-2014-286)
  1969. Amazon Linux AMI : puppet Filesystem Vulnerability (ALAS-2014-288)
  1970. Firefox ESR 24.x < 24.3 Multiple Vulnerabilities (Mac OS X)
  1971. Firefox < 27.0 Multiple Vulnerabilities (Mac OS X)
  1972. Thunderbird < 24.3 Multiple Vulnerabilities (Mac OS X)
  1973. Firefox ESR 24.x < 24.3 Multiple Vulnerabilities
  1974. Firefox < 27.0 Multiple Vulnerabilities
  1975. Mozilla Thunderbird < 24.3 Multiple Vulnerabilities
  1976. SeaMonkey < 2.24 Multiple Vulnerabilities
  1977. MongoDB < 2.3.2 BSON Object Length Handling Memory Disclosure
  1978. How I Lost My $50,000 Twitter Username Medium
  1979. A chain is only as strong as its weakest link DNS Hijack Monitoring | Corelan Team
  1980. Reversing the WRT120Ns Firmware Obfuscation - /dev/ttyS0
  1981. RFKiller/mass-deauth GitHub
  1982. DanMcInerney/wifijammer GitHub
  1983. SecUpwN/Android-IMSI-Catcher-Detector GitHub
  1984. Target Hackers Broke in Via HVAC Company
  1985. Installing Nessus on Kali Linux and Doing a Credentialed Scan
  1986. JavaScript: the one true language
  1987. Exploring the Telephony Denial of Service (TDoS)
  1988. Dancho Danchev's Blog - Mind Streams of Information Security Knowledge: A Peek Inside a Customer-ized API-enabled DIY Online Lab for Generating Multi-OS Mobile Malware
  1989. Mobile Malware Captures Keystrokes and Screengrabs | Threatpost - English - Global - threatpost.com
  1990. Nest Team Will Become Google's Core Hardware Group
  1991. Only Your Heartbeat Can Unlock This Bitcoin Wallet
  1992. Wikipedia Remote Execution Vulnerability Patched | Threatpost - English - Global - threatpost.com
  1993. Details Emerge on Latest Adobe Flash Zero-Day Exploit
  1994. Rare Twitter username stolen | In2EastAfrica East African news, Headlines, Business, Tourism, Sports, Health, Entertainment, Education
  1995. Target Hackers Used Stolen Vendor Credentials
  1996. Chewbacca Attack Hits Shops In 11 Nations
  1997. US Hotels Look Into Data Security Breach
  1998. The Government Wants Our Cars To Talk To Each Other
  1999. Windows XP Support Cut-Off Could Lead To Spam Boom
  2000. 800,000 Orange France Customers Face Cyberattack
  2001. Anyone Using POS Is At Risk
  2002. Target traces security breach to stolen vendor credentials
  2003. Toy Maker Hasbros Site Serving Drive-By Download Attacks
  2004. High-Volume DDoS Attacks Top Operational Threat to Businesses, Service Providers
  2005. Would NFC smartphones have helped at Target?
  2006. Remote code execution bug in Yahoo servers leads to root access
  2007. Use MediaWiki and hate malware? This patch is for you
  2008. Multi-platform Java bot marshals ZOMBIE FORCE against spammers
  2009. Red or Blue, I'm Usually The Only Woman On The Team -- Dark Reading
  2010. VMware vCloud Director Logout CSRF (VMSA-2014-0001)
  2011. Informix Server Global Security Kit SSL/TLS DoS
  2012. No sixth sense: '123456' is worst password of 2013 | Crave - CNET
  2013. Snapchat's new verification already hacked | Security & Privacy - CNET News
  2014. Linksys & Netgear Backdoor by the Numbers | Skizzle Sec
  2015. Metasploit: Making Your Printer Say "Feed Me a ... | SecurityStreet
  2016. How I bypassed 3rd-degree profiles in LinkedIn
  2017. SI6 Networks
  2018. Apple punts patches for holes in Pages and OS X, Windows iTunes
  2019. Michaels Data Breach Under Investigation
  2020. Punish careless employees to reduce security breaches, vendor says
  2021. Authentication bypass bug exposes Foscam webcams to unauthorized access
  2022. IBM Domino 8.5.x < 8.5.3 FP6 iNotes Multiple XSS (uncredentialed check)
  2023. IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (uncredentialed check)
  2024. IBM Domino 8.5.x < 8.5.3 FP6 iNotes Multiple XSS (credentialed check)
  2025. IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (credentialed check)
  2026. MySQL debian.cnf Plaintext Credential Disclosure
  2027. Serv-U FTP Server < 15.0.0.0 Multiple Security Vulnerabilities
  2028. XnView 2.x < 2.13 Multiple Buffer Overflows
  2029. Oracle Java SE Multiple Vulnerabilities (January 2014 CPU)
  2030. Oracle Java SE Multiple Vulnerabilities (January 2014 CPU) (Unix)
  2031. Google Chrome < 32.0.1700.76 Multiple Vulnerabilities
  2032. Google Chrome < 32.0.1700.77 Multiple Vulnerabilities (Mac OS X)
  2033. Oracle Database January 2014 Critical Patch Update
  2034. MySQL 5.1.x < 5.1.72 Multiple Vulnerabilities
  2035. MySQL 5.1.x < 5.1.73 Multiple Vulnerabilities
  2036. MySQL 5.5 < 5.5.34 Multiple Vulnerabilities
  2037. MySQL 5.5.x < 5.5.35 Multiple Vulnerabilities
  2038. MySQL 5.6.x < 5.6.14 Multiple Vulnerabilities
  2039. MySQL 5.6.x < 5.6.15 Multiple Vulnerabilities
  2040. CUPS 1.6.x >= 1.6.4 / 1.7.x < 1.7.1 lppasswd Information Disclosure
  2041. BlackBerry < 10.1.0.1880 Multiple Flash Player Code Execution Vulnerabilities
  2042. Symantec Endpoint Protection Client < 11.0.7.4 / 12.1.2 (SYM14-001)
  2043. Symantec Endpoint Protection Manager < 11.0.7.4 / 12.1.2 RU2 (SYM14-001)
  2044. ColdFusion Extended Support Version Detection
  2045. ColdFusion Unsupported Version Detection
  2046. ColdFusion Extended Support Version Detection (credentialed check)
  2047. ColdFusion Unsupported Version Detection (credentialed check)
  2048. MapServer < 5.6.9 / 6.0.4 / 6.2.2 / 6.4.1 SQL Injection
  2049. Drupal 6.x < 6.30 OpenID Module Account Hijacking
  2050. Drupal 7.x < 7.26 Multiple Vulnerabilities
  2051. DTLS Client Detection
  2052. Sony PlayStation 4 Detection
  2053. MySQL 5.5.x < 5.5.35 Remote Code Execution
  2054. MySQL 5.1.x < 5.1.73 Remote Code Execution
  2055. Sonos Device Detection
  2056. SmartTV Device Detection
  2057. Plex Application Detection
  2058. Sonatype Nexus < 2.7.1 'XStream' Object Remote Code Execution Vulnerability
  2059. SANS 6 Categories of Critical Log Information
  2060. CIP-002 Identification of Critical Cyber Assets Report
  2061. Malware Detection
  2062. Target breach shows payment system security needs less talk, more action
  2063. FireEye Finds Six Android Malware Variants Stealing Data
  2064. Bluetooth Hackers Allegedly Skimmed Millions Via Gas Stations
  2065. Read this before you buy another hard drive | HITBSecNews
  2066. How a Math Genius Hacked OkCupid to Find True Love - Wired Science
  2067. Chrome Browser Becomes Eavesdropping Tool
  2068. Critical Infrastructure Protection Bill Passed in Committee
  2069. SANS 6 Categories of Critical Log Information
  2070. Encryption On The Wire
  2071. The Changing Face Of The IT Security Team
  2072. MySQL 5.x < 5.6.13 Multiple Vulnerabilities
  2073. Mac OS X : Safari < 6.1.1 / 7.0.1 Multiple Vulnerabilitieses
  2074. Google Chrome < 32.0.1700.76 Multiple Vulnerabilities
  2075. Xbox Gaming Console Detection
  2076. KiSS PC-Link Client Detection
  2077. Daily Host Alerts Report: Hosts Accessed by Users
  2078. Critical and Exploitable Vulnerabilities Report
  2079. Daily Host Alerts Report: Users Accessing Hosts
  2080. Errors and Warnings Report
  2081. VMware Workstation 9.x < 9.0.1 VMX Process DoS (VMSA-2014-0001) (Linux)
  2082. Oracle Identity Management Detection
  2083. Oracle Internet Directory LDAP Server Unspecified Remote Information Disclosure
  2084. Detecting The Trojan.POSRAM Malware
  2085. Nessus Compliance Checks for FortiGate Devices
  2086. The S4 SCADA Security Conference
  2087. Nessus 5.2.5 Is Available for Download
  2088. Hacking Risk Grows for Outdated ATMs
  2089. Apples Very Different BYOD Philosophy
  2090. A Walk Through the ICS Village
  2091. HealthCare.gov security -- 'a breach waiting to happen' | Security & Privacy - CNET News
  2092. Microsoft will furnish malware assassin to XP users until mid-2015
  2093. Hacker Turns Mouse Into A Webcam
  2094. Introduction to Anti-Fuzzing: A Defence in Depth Aid | NCC Group
  2095. The Internet of Things Is Wildly Insecure And Often Unpatchable | Wired Opinion | Wired.com
  2096. WordPress Plugins Exploitation Through the Big Data Prism - The Akamai Blog
  2097. A First Look at the Target Intrusion, Malware
  2098. 2013 Toolsmith Tool of the Year: Recon-ng
  2099. The Hidden Backdoors to the City of Cron | Sucuri Blog
  2100. Businesses are building shopper profiles based on sniffing phones WiFi
  2101. Apple Settles with FTC, Will Refund at Least $32.5 Million in App Store Purchases
  2102. Cisco Discloses Existence of Undocumented Backdoor in Routers
  2103. Critics Cut Deep on Yahoo Mail Encryption Rollout
  2104. Drug overdose caused death of hacker | Security & Privacy - CNET News
  2105. Yahoo enables default HTTPS encryption for Yahoo Mail
  2106. Skipfish Scanner Used in Financial Sector Attacks | The State of Security
  2107. avast! blog Mobile malware a real threat in 2014
  2108. At CES, Belkin bets big on WeMo | CES 2014: Appliances - CNET Blogs
  2109. Snapchat Hack Affects 4.6 Million Users
  2110. Anatomy Of A 22-Year-Old X Window Bug: Get Root With Uncovered Flaw
  2111. OpenSUSE forums hacked in ANOTHER vBulletin attack
  2112. Mikko Hypponen Still Speaking at the RSA Conference
  2113. Researchers publish Snapchat code allowing phone number matching after exploit disclosures ignored | ZDNet
  2114. gizmodo/full (Gizmodo) Surprise! It's Super Easy to Identify People From Metadata
  2115. Trojan program hijacks World of Warcraft accounts despite two-factor authentication
  2116. Flash Memory Cards Contain Powerful, Unsecured Microcontrollers
  2117. Probes Against Linksys Backdoor Port Surging
  2118. OpenSSL Hackers Used Weak Password at Web Host to Deface Site
  2119. Noted speaker, Mikko Hypponen, cancels RSA talk in protest to NSA collaboration allegations
  2120. Growing human organs inside pigs in Japan
  2121. Researcher Uncovers Backdoor In DSL Routers
  2122. FireEye buys outfit that lifted the lid on Chinese cyber-espionage
  2123. Hacker backdoors Linksys, Netgear, Cisco and other routers
  2124. ATM hacker Barnaby Jack's death blamed on accidental drug overdose The Register
  2125. NERC (CIP-002) Identification of Critical Cyber Assets
  2126. Port 22 Non-SSH Traffic Detection
  2127. Port 21 Non-FTP Traffic Detection
  2128. Samba < 3.6.22 / 4.0.13 / 4.1.3 Multiple Vulnerabilities
  2129. Port 443 Non-SSL Traffic Detection
  2130. Nessus HTML5 UI 2.1 Provides Enhanced Usability
  2131. Monthly Executive Report
  2132. Exploitable by Malware
  2133. Unsupported OS Report
  2134. Daily Host Alerts Report
  2135. Space Rogue from L0pht and Hacker News Network Joins Tenable Network Security
  2136. Ask A VC: Accels Ping Li On The Impact Of Data-Driven Software and More
  2137. Does retail security take a backseat during the 'holiday IT lockdown'?
  2138. Industry Predictions for 2014; Part 4: Managed Security Services
  2139. Industry Predictions for 2014; Part 3: The Effect and Influence of Government
  2140. Defending against self-destructing PCs, other mythical security threats Read more: Defending against self-destructing PCs, other mythical security threats
  2141. DB2 9.7 < Fix Pack 9 Multiple Vulnerabilities
  2142. Wireshark 1.8.x < 1.8.12 Multiple DoS
  2143. Wireshark 1.10.x < 1.10.4 Multiple DoS
  2144. LiveZilla < 5.1.2.1 Multiple Vulnerabilities
  2145. Novell iPrint Client < 5.93 DoS
  2146. OpenMediaVault Web Detection
  2147. OpenMediaVault Default Administrator Credentials
  2148. SuperMicro Device Uses Default SSH Host Key
  2149. SuperMicro Device Uses Default SSL Certificate
  2150. Zabbix 1.9.x < 1.9.4 zabbix_agentd DoS
  2151. Quagga 0.99.21 bgp_attr.c BGP Update DoS
  2152. Oracle Fusion Middleware Web Services Component Remote Information Disclosure
  2153. Asterisk Multiple Vulnerabilities (AST-2013-006 / AST-2013-007)
  2154. Subversion 1.6.x / 1.7.x / 1.8.x < 1.6.23 / 1.7.11 / 1.8.1 Multiple Vulnerabilities
  2155. Subversion 1.8.x < 1.8.2 FSFS Repository Corruption
  2156. Subversion 1.4.x - 1.7.12 / 1.8.x < 1.8.3 Multiple Symlink File Overwrite Vulnerabilities
  2157. Subversion 1.4.x - 1.7.13 / 1.8.x < 1.8.5 Multiple DoS
  2158. Apple Motion Installed (Mac OS X)
  2159. Apple Motion < 5.1 OZDocument::parseElement() Function MOTN File Subview Attribute Handling Integer Overflow
  2160. Winamp Unsupported
  2161. Safari Unsupported
  2162. VMSA-2013-0016 : VMware ESXi and ESX unauthorized file access through vCenter Server and ESX
  2163. NTP monlist Command Enabled
  2164. Splunk Enterprise 6.x < 6.0.1 Malformed Packet DoS
  2165. Winamp < 5.666 Multiple Memory Corruptions
  2166. HP Data Protector Multiple Vulnerabilities
  2167. ScMM DSL Modem/Router Backdoor Detection
  2168. Cisco WAAS Mobile Server Detection
  2169. Cisco WAAS Mobile Server Web Administration Interface Detection
  2170. Cisco WAAS Mobile Server Web Administration Default Credentials
  2171. Cisco WAAS Mobile Server < 3.5.5 Remote Code Execution
  2172. Lessons for CSOs in Snowden exploit of NSA networks
  2173. SSL SMTP Client Detection
  2174. Mozilla Thunderbird < 24.2 Multiple Vulnerabilities
  2175. Mozilla SeaMonkey 24.2 Multiple Vulnerabilities
  2176. Mozilla Firefox < 26.0 / 24.2 (ESR version) Multiple Vulnerabilities
  2177. Magnet Link Detection
  2178. Exploitable by Malware
  2179. iLO 3 < 1.65 / iLO 4 < 1.32 Multiple Vulnerabilities
  2180. CCC, 100-gbps, and your own private Shodan
  2181. How we know the 60 Minutes NSA interview was crap
  2182. DinoSec Blog
  2183. THC-Hydra 7.5 Released - Fast Parallel Network Logon Cracker - Darknet - The Darkside
  2184. All of Androids top 100 apps have been hacked and banking apps are now a prime target, report finds
  2185. How hackers made minced meat of Department of Energy networks
  2186. Security prediction for 2014: It will get worse
  2187. Edward Snowden Pens An Open Letter To The People Of Brazil
  2188. Android Nasty Sends Your Texts To China
  2189. Important Security Update for D-Link Routers Krebs on Security
  2190. GCC Poison | Leaf Security Research
  2191. Using a Hosts File To Make The Internet Not Suck (as much)
  2192. Mobile Device Tips, Tricks and Resources
  2193. Nvidia exploit could turn render farms into password crackers, bitcoin miners, researchers claim
  2194. The top 8 security threats of 2013
  2195. Guilty Verdict in First Ever Cybercrime RICO Trial | Threat Level | Wired.com
  2196. BBC News - Bots now 'account for 61% of web traffic'
  2197. Errata Security: Literally the nicest thing Ive ever done
  2198. How to find out if your password has been stolen | ZDNet
  2199. Network Security Tip of the Week
  2200. Installing PVS, the Passive Vulnerability Scanner
  2201. Flash Player for Mac <= 11.7.700.252 / 11.9.900.152 Multiple Vulnerabilities (APSB13-28)
  2202. Adobe AIR for Mac <= 3.9.0.1210 Multiple Vulnerabilities (APSB13-28)
  2203. Flash Player <= 11.7.700.252 / 11.9.900.152 Multiple Vulnerabilities (APSB13-28)
  2204. Adobe AIR <= AIR 3.9.0.1210 Multiple Vulnerabilities (APSB13-28)
  2205. SeaMonkey < 2.23 Multiple Vulnerabilities
  2206. Mozilla Thunderbird < 24.2 Multiple Vulnerabilities
  2207. Firefox < 26.0 Multiple Vulnerabilities
  2208. Firefox ESR 24.x < 24.2 Multiple Vulnerabilities
  2209. Thunderbird < 24.2 Multiple Vulnerabilities (Mac OS X)
  2210. Firefox < 26.0 Multiple Vulnerabilities (Mac OS X)
  2211. Firefox ESR 24.x < 24.2 Multiple Vulnerabilities (Mac OS X)
  2212. Shockwave Player <= 12.0.6.147 Memory Corruptions (APSB13-29)
  2213. VMware Player 5.x < 5.0.3 LGTOSYNC.SYS Guest Privilege Escalation (VMSA-2013-0014)
  2214. VMware Fusion 5.x < 5.0.4 LGTOSYNC.SYS Privilege Escalation (VMSA-2013-0014)
  2215. IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.1 Multiple Vulnerabilities
  2216. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities (Mac OS X)
  2217. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities
  2218. ManageEngine Desktop Central Default Administrator Credentials
  2219. ManageEngine Desktop Central AgentLogUploadServlet Arbitrary File Upload
  2220. ManageEngine Desktop Central AgentLogUploadServlet Arbitrary File Upload (intrusive check)
  2221. ManageEngine Desktop Central Detection
  2222. Jenkins Accessible without Credentials
  2223. VMSA-2013-0014 : VMware Workstation, Fusion, ESXi and ESX patches address a guest privilege escalation
  2224. Atlassian Confluence < 4.3.7 Multiple Vulnerabilities
  2225. Monitorix Built-in HTTP Server Remote Command Execution
  2226. Amazon Silk Web Browser Detection
  2227. OpenSSL < 0.9.8x / < 1.0.0j / < 1.0.1c Remote Denial of Service Vulnerability
  2228. Bitcoin Client Detection (Stratum)
  2229. Bitcoin Client Detection (JSON/RPC)
  2230. Bitcoin Client Detection (Bitcoin Protocol)
  2231. UPNP Traffic Detection (Client)
  2232. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities
  2233. Google Chrome < 31.0.1650.57 Multiple Remote Code Execution Vulnerabilities
  2234. Google Chrome < 31.0.1650.48 Multiple Vulnerabilities
  2235. Apple Deployed Software Version Detection
  2236. Apple iOS 7.x < 7.0.4 Purchases Authentication Bypass
  2237. Apple iOS 7.x < 7.0.3 Multiple Vulnerabilities
  2238. Apple iOS 7.x < 7.0.2 Multiple Vulnerabilities
  2239. Opera Web Browser Version Detection
  2240. Opera < 18.0 Multiple Unspecified Vulnerabilities
  2241. Innominate Security Technologies mGuard SCADA Security Device Detection
  2242. Advantech Embedded Controller Detection
  2243. Malware Indicators Report
  2244. Remediation Instructions Report by Host
  2245. Executive 7 Day Summary
  2246. Passive Bitcoin Detection Indicator
  2247. Fortinet Firewall Dashboard
  2248. Daily Host Alerts
  2249. MS SQL Server Audit
  2250. Unknown Process(es)
  2251. NIST 800-53 Pie Charts
  2252. Secure your Apache server from DDoS, Slowloris, and DNS Injection attacks
  2253. No security ever built into Obamacare site: Hacker
  2254. Pen tester scoops source code in bug hunt contest, has to argue for prize The Register
  2255. Malware jumps 'air gap' between non-networked devices | Security & Privacy - CNET News
  2256. Using The Human Perimeter To Detect Outside Attacks
  2257. SANS Technology Institute accredited for masters in security
  2258. Hacker-built drone can hunt, hijack other drones
  2259. Shadow IT is undermining your security
  2260. OSIRT WordPress OptimizePress hack (file upload vulnerability)
  2261. Bypassing Seagate ATA Security Lock
  2262. Security Advisory: Stem Innovation IZON Hard-coded Credentials (CVE-2013-6236) - security vulnerabilities database
  2263. Depth Security: Dahua DVR Authentication Bypass - CVE-2013-6117
  2264. Juniper JunOS crossite scripting
  2265. Vivotek IP cameras authentication bypass
  2266. HP Integrated Lights-Out security vulnerabilities - security vulnerabilities database
  2267. isowall: an isolating firewall
  2268. Muddying The Water On Security And Embedded Devices
  2269. Maslows Hierarchy Of Security Product Needs & Vendor Selection
  2270. Top Security Predictions for 2014
  2271. Whats my name? No, really, what is it?
  2272. GitHub resets user passwords following rash of account hijack attacks
  2273. Who's The Boss Over Your JBoss Servers? -- Dark Reading
  2274. Going Back to the Future in the Name of Better Security
  2275. vBulletin.com's password database hack gives forum admins the jitters
  2276. SCADA flaws put world leaders at risk of TERRIBLE TRAFFIC JAM
  2277. Linux backdoor squirts code into SSH to keep its badness buried The Register
  2278. Hacking of forum software firm vBulletin spawns host of zero-day attacks- The Inquirer
  2279. Netflixers Beware: Angler Exploit Kit Targets Silverlight Vulnerability
  2280. Troy Hunt: Adobe credentials and the serious insecurity of password hints
  2281. Tavis Ormandy: QNX
  2282. w00tsec: Unpacking Firmware Images from Cable Modems
  2283. Multiple Vulnerabilities in Cisco IOS XE Software for 1000 Series Aggregation Services Routers (cisco-sa-20131030-asr1000)
  2284. Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20131106-sip)
  2285. OpenSSH v6.2 / v6.3 Remote Memory Corruption Vulnerability
  2286. OpenSSH 6.2 / 6.3 Remote Memory Corruption Vulnerability
  2287. Copyright Indicator
  2288. ACG Maryland - 2013 Deal of the Year Finalist - Tenable Network Security & Accel Partners
  2289. Risky Business Podcast #304 -- Tech heavyweights target NSA
  2290. Why Ben Franklin would have excelled in cyber security
  2291. Tenable Network Security Named a Deloitte 2013 Technology Fast 500 Award Winner
  2292. MS SQL Server Audit Report
  2293. Oracle DB Audit Report
  2294. Copyright Report
  2295. Adobe ColdFusion Multiple Vulnerabilities (APSB13-27) (credentialed check)
  2296. SeaMonkey < 2.22.1 NSS and NSPR Multiple Vulnerabilities
  2297. Oracle JavaServer Faces Multiple Partial Directory Traversals
  2298. Its the little things that count | Andy ITGuy - Information Security Blog
  2299. Healthcare.gov will eventually be functional, but how secure?
  2300. Defenders Still Chasing Adequate Threat Intelligence Sharing
  2301. Research Into BIOS Attacks Underscores Their Danger
  2302. Barracuda Web Application Firewall Now In AWS Marketplace
  2303. Hackers Take Limo Service Firm for a Ride Krebs on Security
  2304. Attacking the Spanning-Tree Protocol
  2305. 4 reasons BadBIOS isn't real | Security - InfoWorld
  2306. Apple II DOS source code released
  2307. The TRUTH about mystery Trojan found in SPAAACE
  2308. Security researcher Cdric 'Sid' Blancher dead at 37
  2309. MS13-088: Cumulative Security Update for Internet Explorer (2888505)
  2310. MS13-089: Critical Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution (2876331)
  2311. MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986)
  2312. MS13-091: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2885093)
  2313. MS13-092: Vulnerability in Hyper-V Could Allow Elevation of Privilege (2893986)
  2314. MS13-093: Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure (2875783)
  2315. MS13-094: Vulnerability in Microsoft Outlook Could Allow Information Disclosure (2894514)
  2316. MS13-095: Vulnerability in Digital Signatures Could Allow Denial of Service (2868626)
  2317. MS KB2868725: Update for Disabling RC4
  2318. MS KB2862152: Vulnerability in DirectAccess Could Allow Security Feature Bypass
  2319. Flash Player <= 11.7.700.242 / 11.9.900.117 Memory Corruptions (APSB13-26)
  2320. MS KB2898108: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  2321. Adobe AIR <= 3.9.0.1030 Memory Corruptions (APSB13-26)
  2322. Flash Player for Mac <= 11.7.700.242 / 11.9.900.117 Memory Corruptions (APSB13-26)
  2323. Adobe AIR for Mac <= 3.9.0.1030 Memory Corruptions (APSB13-26)
  2324. Zabbix < 1.8.18 / 2.0.9 Multiple SQL Injection Vulnerabilities
  2325. Oracle DB Audit
  2326. Firefox ESR < 17.0.10 Multiple Vulnerabilities (Mac OS X)
  2327. Firefox ESR 24.x < 24.1 Multiple Vulnerabilities (Mac OS X)
  2328. Thunderbird ESR < 17.0.10 Multiple Vulnerabilities (Mac OS X)
  2329. Firefox ESR < 17.0.10 Multiple Vulnerabilities
  2330. Mozilla Thunderbird < 24.1 Multiple Vulnerabilities
  2331. ImageMagick < 6.7.8-8 gif.c Memory Corruption
  2332. Citrix XenDesktop Director Detection
  2333. Citrix XenDesktop BrokerAccessPolicyRule Policy Rule Remote Security Bypass
  2334. IBM Domino 8.5.x < 8.5.3 FP 5 Multiple Vulnerabilities
  2335. IBM Domino 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
  2336. IBM Notes 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
  2337. RSA Authentication Agent for Web for IIS Installed
  2338. RSA Authentication Agent for Web for IIS 7.1.x < 7.1.2 Filter Bypass
  2339. vBulletin upgrade.php Accessible
  2340. Oracle Database Patch Info (Unix / Linux) (credentialed check)
  2341. Oracle Database Patch Info (Windows) (credentialed check)
  2342. Reputation of Windows Executables: Known Process(es)
  2343. Reputation of Windows Executables: Unknown Process(es)
  2344. MS KB2896666: Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution
  2345. Zabbix Web Interface Default Administrator Credentials
  2346. Tenable Network Security Joins Amazon Web Services (AWS) Marketplace to Provide On-Demand AMI Vulnerability Scanning
  2347. Threatlist Trending
  2348. PVS Network Trending
  2349. Mac OS X : Safari < 6.1 Multiple Security Vulnerabilities
  2350. Google Chrome < 30.0.1599.101 Multiple Vulnerabilities
  2351. Remediation Instructions Report by Severity
  2352. Remediation Instructions Report by Vulnerability
  2353. The badBIOS Analysis Is Wrong. at RootWyrm's Corner
  2354. Researcher Finds Method to Insert Malicious Firmware Into Currency Validator | Threatpost | The First Stop For Security News
  2355. Meet badBIOS, the mysterious Mac and PC malware that jumps airgaps | Ars Technica
  2356. Healthcare.govs Coming Security Crackup
  2357. #badBIOS features explained
  2358. Tracking Risk
  2359. Apache mod_fcgid Module < 2.3.9 fcgid_header_bucket_read() Function Heap Buffer Overflow
  2360. Panda AdminSecure Communications Agent < 4.50.0.10 Directory Traversal
  2361. Puppet Enterprise < 3.1.0 Multiple Vulnerabilities
  2362. Novell ZENworks umaninv Information Disclosure
  2363. EMC NetWorker 8.x < 8.0.2.3 Management Console Information Disclosure
  2364. Apache PHP-CGI Remote Code Execution
  2365. Oracle Secure Global Desktop Linux Installation Detection
  2366. Oracle Secure Global Desktop Administration Console Detection
  2367. Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (credentialed check)
  2368. Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (remote check)
  2369. Mozilla Thunderbird < 24.1 / 17.0.10 (ESR) Multiple Vulnerabilities
  2370. Mozilla SeaMonkey < 2.22 Multiple Vulnerabilities
  2371. Mozilla Firefox < 25.0 / 24.1 (ESR version) / 17.0.10 (ESR version) Multiple Vulnerabilities
  2372. ISAKMP Server Detection
  2373. ISAKMP Client Detection
  2374. Encapsulating Security Payload (ESP) Session Setup
  2375. Executive Patch Mitigation Report
  2376. Be sure you are prepared for OS X 10.9 Mavericks | Security Spread
  2377. Scan Shows 65% of ReadyNAS Boxes on Web Vulnerable to Critical Bug
  2378. Seven essentials for VM management and security
  2379. Netgear Root Compromise Via Command Injection
  2380. Tenda Shuts Router Backdoor Found By D-Link Hole Prober
  2381. Your Kettle Could Be A Spambot!
  2382. Systems with Sensitive Data
  2383. Virus Trending
  2384. Executive Age Summary Report
  2385. Mac OS X < 10.9 Multiple Vulnerabilities
  2386. SEW Eurodrive SCADA server detection
  2387. Schneider Electric Accutech Manager RF Successful Authentication
  2388. Schneider Electric Accutech Manager RF Server Detection
  2389. Schneider Electric Accutech Manager RF Failed Authentication
  2390. Schneider Electric Accutech Manager RF Client Detection
  2391. Moore Industries Embedded SCADA server detection
  2392. Indusoft Web Studio Server Detection
  2393. Indusoft Web Studio Client Detection
  2394. Indusoft Remote Code Execution Flaw
  2395. SSL Cipher Block Chaining Cipher Suites Supported
  2396. Dropbear SSH Server < 2013.59 Multiple Vulnerabilities
  2397. Puppet Unauthenticated Remote Code Execution
  2398. Puppet Enterprise < 3.0.1 Multiple Vulnerabilities
  2399. Doctors disabled wireless in Dick Cheneys pacemaker to thwart hacking
  2400. Ten Physical Security Tips for Mobile Devices - Cyveillance Blog - The Cyber Intelligence Blog
  2401. Capturing The Flag, SQLi-Style -- Dark Reading
  2402. Researchers uncover holes that open power stations to hacking | Ars Technica
  2403. From China, With Love - /dev/ttyS0
  2404. Mobile Summary Report
  2405. ZenPhoto Cross Site Scripting and SQL Injection Vulnerabilities
  2406. Beck IPC Embedded SCADA server detection
  2407. Hirschmann Automation and Control Embedded SCADA server detection
  2408. OnCell Wireless SCADA server detection
  2409. Solar Log SCADA server detection
  2410. Stulz Air Conditioning SCADA server detection
  2411. Dropbear SSH Memory Corruption Denial of Service and User Enumeration Weakness
  2412. Apache 'mod_fcgid' Module Heap Buffer Overflow Vulnerability
  2413. RuggedCom Rugged Operating System Multiple Security Vulnerabilities
  2414. Tenable Network Security Expands EMEA Team
  2415. SAI Global Deploys Tenable Network Security to Combat Security Vulnerabilities and Compliance
  2416. SSH Server Vulnerabilities
  2417. Snort IDS Events
  2418. Palo Alto Firewall Dashboard
  2419. Age Summary Dashboard
  2420. RuggedCom Rugged Operating System < 3.12.2 Multiple Vulnerabilities
  2421. Adobe RoboHelp 10 Unspecified Memory Corruption (APSB13-024)
  2422. XEROX ColorQube Device Detection
  2423. XEROX WorkCentre Multiple Unspecified Vulnerabilities (XRX13-006)
  2424. XEROX ColorQube Multiple Unspecified Vulnerabilities (XRX13-006)
  2425. HP LaserJet Printers Multiple Vulnerabilities
  2426. IBM DB2 and DB2 Connect Detection (credentialed)
  2427. DB2 10.1 < Fix Pack 3 Multiple Vulnerabilities
  2428. DB2 10.1 < Fix Pack 3 Multiple Vulnerabilities (credentialed)
  2429. Cisco NX-OS Software BGP Denial of Service Vulnerability (CSCtn13055)
  2430. Mac OS X : Java for OS X 2013-005
  2431. Mac OS X : Java for Mac OS X 10.6 Update 17
  2432. Oracle Database October 2013 Critical Patch Update
  2433. MySQL 5.1 < 5.1.71 Server Optimizer Denial of Service
  2434. MySQL 5.5 < 5.5.33 Multiple Vulnerabilities
  2435. MySQL 5.6.x < 5.6.13 Multiple Vulnerabilities
  2436. VMSA-2013-0012 : VMware vSphere updates address multiple vulnerabilities
  2437. Siemens SCALANCE X-200 Authentication Bypass
  2438. Siemens SCALANCE X-200 Web Session Hijacking
  2439. Opera < 17 Multiple Vulnerabilities
  2440. Window Process Information
  2441. Window Process Unique Process Name
  2442. Window Process Module Information
  2443. MS13-080: Cumulative Security Update for Internet Explorer (2879017)
  2444. MS13-081: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2870008)
  2445. MS13-082: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890)
  2446. MS13-083: Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2864058)
  2447. MS13-084: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2885089)
  2448. MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080)
  2449. MS13-086: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)
  2450. MS13-087: Vulnerability in Silverlight Could Allow Information Disclosure (2890788)
  2451. MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080) (Mac OS X)
  2452. MS13-087: Vulnerability in Silverlight Could Allow Information Disclosure (2890788) (Mac OS X)
  2453. Adobe Acrobat 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)
  2454. Adobe Reader 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)
  2455. AD Zone Transfers as a user
  2456. FAA panel: Wi-Fi is safe on planes even during takeoff and landing
  2457. 5 Wi-Fi security myths you must abandon now
  2458. Symantec takes on one of largest botnets in history
  2459. Iran's cyberwarfare czar is allegedly assassinated
  2460. IAVM Executive Summary Report
  2461. Snapchat Mobile App Usage Detected
  2462. Google Safebrowsing Client Detection
  2463. Google Chrome < 30.0.1599.66 Multiple Vulnerabilities
  2464. Business RadioX's Results Matter Radio Features Atlanta Businesses and Organizations Serving the Local Community
  2465. SAI Global Deploys Tenable Network Security to Combat Security Vulnerabilities and Compliance
  2466. Tenable Network Security Names Attley Ng as Asia-Pacific Vice President
  2467. IAVM Executive Summary Dashboard
  2468. Google Chrome < 30.0.1599.66 Multiple Vulnerabilities
  2469. RES Workspace Manager Agent Detection
  2470. RES Workspace Manager Relay Server Detection
  2471. WellinTech KingView ActiveX Multiple Arbitrary File Overwrite Vulnerabilities
  2472. MediaWiki < 1.19.8 / 1.20.7 / 1.21.2 Multiple Vulnerabilities
  2473. DotNetNuke < 6.2.9 / 7.1.1 Multiple Vulnerabilities
  2474. FireEye Web MPS GUI Detection
  2475. Mac OS X 10.8 < 10.8.5 Supplemental Update
  2476. Blue Coat ProxySG Remote DoS
  2477. Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability (cisco-sa-20130925-rsvp)
  2478. Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability (cisco-sa-20130925-rsvp)
  2479. Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability (cisco-sa-20130925-cce)
  2480. Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service Vulnerability (cisco-sa-20130925-ipv6vfr)
  2481. Cisco IOS Software Network Address Translation Vulnerabilities (cisco-sa-20130925-nat)
  2482. Cisco IOS Software Queue Wedge Denial of Service Vulnerability (cisco-sa-20130925-wedge)
  2483. Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
  2484. Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability (cisco-sa-20130925-ike)
  2485. Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
  2486. Derbycon 3.0 Videos Tracks 1 & 2
  2487. Barclays Bank Branch Bugged In 1.3m Breach
  2488. Exploit Disclosure
  2489. Facebook Pushes Passwords One Step Closer to Death
  2490. Yahoo abandons T-shirt rewards for vulnerability information
  2491. iPhone Fingerprint Scanner Hacked; Should You Care? - Forbes
  2492. Students Find Ways To Hack School-Issued iPads Within A Week : All Tech Considered : NPR
  2493. 10 Ways to Keep Your WordPress Site Secure
  2494. Researchers Unite To #ScanAllTheThings
  2495. 5 Reasons Every Company Should Have A Honeypot
  2496. Thirteen-Year-Olds Hack Their Way Into Space
  2497. Shutdown could test IT security at federal agencies
  2498. Linux/Unix Software Summary
  2499. iTunes < 11.1 ActiveX Memory Corruption
  2500. MDM Discovered Dashboard
  2501. Mobile Device Vulnerability
  2502. Tenable Network Security Receives Highest Rating Possible in 2013 Gartner Marketscope Report
  2503. Hackers Everywhere: A Conversation With Security Thinker Ron Gula
  2504. Apple TV < 6.0 Multiple Vulnerabilities
  2505. Cisco Prime LAN Management Solution Cross-Frame Scripting
  2506. Mac OS X : Cisco AnyConnect Secure Mobility Client 3.0.x / 3.1.x Local Privilege Escalation
  2507. IBM Lotus Sametime Connect Client Password Disclosure
  2508. Cigar Sickness
  2509. Top 7 Alcoholic Drinks to Accompany Cigars
  2510. Tenable Network Security Executives Win Prestigious Ernst and Young Entrepreneur of the Year 2013 Maryland Award.
  2511. Security Spending On The Rise As Threats Proliferate
  2512. Look at risk before leaping into BYOD, report cautions
  2513. Experts praise Pentagon's march to security standards
  2514. Historic Patch Mitigation Status
  2515. Tracking Device Types by Network
  2516. Windows Remediation Report
  2517. Linux/Unix Remediation Report
  2518. Windows Software Summary
  2519. Asterisk SIP Channel Driver ACK with SDP Denial of Service (AST-2013-004)
  2520. Asterisk SIP Channel Driver Invalid SDP Denial of Service (AST-2013-005)
  2521. Oracle GlassFish Server <= 3.1.1 Multiple Denial-of-Service Vulnerabilities
  2522. Mac OS X 10.8 < 10.8.5 Multiple Vulnerabilities (Security Update 2013-004)
  2523. Opera < 15.0 Cross-site Scripting Vulnerability
  2524. Mozilla Thunderbird < 24.0 / ESR 17.0.9 Multiple Vulnerabilities
  2525. Mozilla Firefox < 24.0 Multiple Vulnerabilities
  2526. Mozilla SeaMonkey < 2.21 Multiple Vulnerabilities
  2527. Apple iOS < 7 Multiple Vulnerabilities
  2528. HTTP Cookie 'secure' Property Transport Mismatch
  2529. MS13-072: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537)
  2530. MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300))
  2531. MS13-074: Vulnerabilities in Microsoft Access Could Allow Remote Code Execution (2848637)
  2532. MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation of Privilege (2876315)
  2533. MS13-077: Vulnerability in Windows Service Control Manager Could Allow Elevation of Privilege (2872339)
  2534. MS13-078: Vulnerability in FrontPage Could Allow Information Disclosure (2825621)
  2535. MS13-079: Vulnerability in Active Directory Could Allow Denial of Service (2853587))
  2536. MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300) (Mac OS X)
  2537. MS KB2880289: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  2538. Shockwave Player <= 12.0.3.133 Memory Corruption Vulnerabilities (APSB13-23)
  2539. Adobe Acrobat < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
  2540. Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
  2541. Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22) (Mac OS X)
  2542. LeagueManager Plugin for WordPress wp-admin/admin.php league_id Parameter SQL Injection
  2543. Cisco Secure Access Control System (ACS) Multiple Vulnerabilities
  2544. Cisco Video Surveillance Manager Web Detection
  2545. Cisco Video Surveillance Manager Default Administrator Credentials
  2546. Cisco Video Surveillance Manager Multiple Vulnerabilities (cisco-sa-20130724-vsm)
  2547. AIX PowerHA Cluster Management Unspecified Remote Configuration Manipulation
  2548. VxWorks 5.5 through 6.9 Multiple Vulnerabilities
  2549. Adobe AIR <= 3.8.0.870 Memory Corruptions (APSB13-21)
  2550. Flash Player <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
  2551. Adobe AIR for Mac <= 3.8.0.910 Memory Corruptions (APSB13-21)
  2552. Flash Player for Mac <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
  2553. EMC NetWorker nsrpush Process Local Privilege Escalation
  2554. HP SiteScope SOAP Call runOMAgentCommand SOAP Request Arbitrary Remote Code Execution
  2555. Polycom SIP Detection
  2556. Polycom HDX < 3.1.1.2 Multiple Vulnerabilities
  2557. IBM WebSphere Service Registry and Repository Installed
  2558. IBM WebSphere Service Registry and Repository 7.0 < 7.0.0 FP1 Authentication Bypass
  2559. IBM Lotus Sametime Connect Client Installed
  2560. IBM Lotus Sametime Connect Client Mouseover XSS
  2561. Cisco IronPort PostX < 6.2.9.1 Multiple Vulnerabilities
  2562. IBM DB2 Content Manager eClient Detection
  2563. IBM DB2 Content Manager eClient < 8.4.1.1 Unspecified Security Vulnerability
  2564. Cisco ASA Next-Generation Firewall Fragmented Traffic DoS (cisco-sa-20130626-ngfw)
  2565. Cisco Unified MeetingPlace Detection
  2566. Cisco Unified MeetingPlace Multiple Session Weaknesses
  2567. Cisco TelePresence DSP Card Crafted RTP Packet H.264 Bit Stream Handling DoS
  2568. Defending against web-based malware: Spot the smoke, dont wait for fire
  2569. After Ten Years, Cracks In Microsofts Patch Program
  2570. iOS 7 patches 80 vulnerabilities
  2571. Linus Torvalds Admits He's Been Asked To Insert Backdoor Into Linux
  2572. Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
  2573. How I hacked SIM cards with a single text - and the networks DON'T CARE
  2574. Flaw In iOS 7 Lets Attackers Take Control Of Users' iPhones
  2575. 5 Tips to Protect Networks Against Shodan Searches - eSecurity Planet
  2576. Installing Dropbox? Prepare to lose ASLR. | codeinsecurity
  2577. Volvent Security R&D: Cloning an Infrared Disarming Remote of a Consumer Grade Home Security System
  2578. How did I get a root shell in my NAS, 0day inside
  2579. Would you believe it? Women more in favour of porn filters than men
  2580. Apple DDOS? Nope, just the update coming down!, (Wed, Sep 18th)
  2581. NSA Contract With VUPEN Revealed
  2582. Skimming made easier with hacked portable card payment machines
  2583. Security researchers create undetectable hardware trojans
  2584. Marissa Mayer does not lock her iPhone with a passcode- The Inquirer
  2585. Seagate to produce 5TB hard drive next year, 20TB by 2020
  2586. Apple's Fingerprint ID May Mean You Can't 'Take the Fifth'
  2587. Black Hat Announces First Ever West Coast Trainings Event
  2588. IT Pros Lack Security Management Support, Budget & Training
  2589. Flying in the US? Remember to leave your hand grenades at home
  2590. Tenable Network Security: Google Chrome v24 Windows STIG Audit
  2591. Tenable Network Security: CIS Red Hat Enterprise Linux 6 - Level...
  2592. Howto crawl web.xml with ruby to discover servlet urls for a pentest
  2593. Delete any Photo from Facebook by Exploiting Support Dashboard Arul Kumar.V
  2594. Researchers: Oracles Java Security Fails
  2595. NSA cracks HTTPS, SSL, 4G smartphone encryption | Digital Trends
  2596. The Router Review: From nmap to firmware | codeinsecurity
  2597. Russia's Cybercrime Market Reaches $1.9 Billion
  2598. 'Don't Travel Abroad' Russia warns Hackers
  2599. Red Hat CIO Takes an Open-Source Approach to Security and BYOD
  2600. People the weakest link in security
  2601. 5 Signs Of Trouble In Your Network
  2602. Android malware spotted hitching a ride on mobile botnet
  2603. Cacti < 0.8.8b Command and SQL Injections
  2604. Mitigated Patch Rates
  2605. Cisco Network Admission Control (NAC) Version
  2606. Cisco Network Admission Control Manager SQL Injection (cisco-sa-20130417-nac)
  2607. iLO 3 < 1.50 / iLO 4 < 1.13 Unspecified Information Disclosure
  2608. Apple AirPort Base Station (802.11n) Firmware < 7.6.4 Remote DoS (APPLE-SA-2013-09-06-1)
  2609. Stuxnet Expert Proposes New Framework For ICS/SCADA Security
  2610. NSA Laughs At PCs, Prefers Hacking Routers And Switches
  2611. 22 Years Later, The Linux And Open Source "Cancer" Is Wonderfully Benign
  2612. Stop treating your datacentre as if it were a laptop: Symantec
  2613. Tenable Network Security: CIS Microsoft Windows 8 - Level 1 -...
  2614. GroundWork Monitor Enterprise Detection
  2615. Amazon Linux AMI : puppet Arbitrary Code Execution (ALAS-2013-213)
  2616. Source: New York Times Website Hit by Cyber Attack
  2617. 10 Years Later: Could an Epic Blackout Happen Again?
  2618. PHP 5.5.x < 5.5.1 xml.c Buffer Overflow
  2619. RealPlayer for Windows < 16.0.3.51 Remote Buffer Overflow and Memory Corruption Vulnerabilities
  2620. Opera < 16.0 Multiple Vulnerabilities
  2621. TortoiseSVN Client Version Detection
  2622. RealPlayer for Windows < 16.0.3.51 Multiple Vulnerabilities
  2623. FileZilla Client Installed
  2624. Microsoft SQL Server STARTTLS Support
  2625. Cisco Nexus 1000V VEM DoS (CSCtj17451)
  2626. FileZilla Client < 3.7.2 SFTP Integer Overflow
  2627. HP LaserJet PJL Interface Directory Traversal (HPSBPI02575)
  2628. CiscoWorks Common Services Home Page Component Unspecified Shell Command Execution
  2629. FileZilla Client < 3.7.3 Multiple Vulnerabilities
  2630. Computer Associates ARCserve Backup LDBserver Remote Code Execution Vulnerability
  2631. RSA SecurID Software Token Converter Buffer Overflow
  2632. RSA SecurID Software Token Converter Buffer Overflow
  2633. Websense Email Security Installed
  2634. Websense Email Security SMTP Component Weak SSL/TLS Ciphers
  2635. WP Online Store Plugin for WordPress Multiple Parameter File Disclosure
  2636. Opera < 16 Multiple Vulnerabilities
  2637. SSL Certificate Chain Contains RSA Keys Less Than 2048 bits
  2638. Oracle TNS Listener Remote Poisoning
  2639. NSA: NOBODY could stop Snowden he was A SYSADMIN
  2640. The Body Worn "IMSI Catcher" For All Your Phone Snooping Needs
  2641. Getting To The Root Of Application Security Problems
  2642. Java 6 0-Day Exploit in the Wild Updated
  2643. Webantix: Webshot: Screenshot every web server during your pen test
  2644. BYOD How much do you love your corporate laptop?
  2645. Want to break some Android apps?
  2646. ISPs scramble to explain mouse-sniffing tool
  2647. Tesla Model S REST API Authentication Flaws
  2648. Poison Ivy RAT Becoming The AK-47 Of Cyber-Espionage Attacks
  2649. Cisco cracks down on security vulnerability
  2650. Talking Threats with Senior Management
  2651. Getting over the fear of measuring what matters
  2652. Installing Printers with PowerShell
  2653. Security Researcher Hacks Mark Zuckerbergs Wall To Prove His Exploit Works | TechCrunch
  2654. ISC Diary | Fibre Channel Reconnaissance - Reloaded
  2655. LinEnum - Scripted Linux Enumeration & Privilege Escalation Checks
  2656. levle/rdesktop-fuzzer GitHub
  2657. Nearly One-Fifth Of Enterprise Operating Systems Not Fully Patched
  2658. Hackers may cash in when XP is retired
  2659. PHP 5.4.x < 5.4.1 Multiple Vulnerabilities
  2660. PHP < 5.3.12 / 5.4.2 CGI Query String Code Execution
  2661. PHP < 5.3.11 Multiple Vulnerabilities
  2662. PHP 5.4.x < 5.4.18 Multiple Vulnerabilities
  2663. PHP 5.5.x < 5.5.2 Multiple Vulnerabilities
  2664. Google Chrome < 29.0.1547.57 Multiple Vulnerabilities
  2665. HP LoadRunner lrLRIServices ActiveX Control Code Execution Vulnerability
  2666. DotNetNuke __dnnVariable Parameter XSS
  2667. PHP 5.4.x < 5.4.18 Multiple Vulnerabilities
  2668. PHP 5.5.x < 5.5.2 Multiple Vulnerabilities
  2669. Sun SPARC Enterprise T5120 and T5220 Default Configuration Root Command Execution Vulnerability
  2670. HP LoadRunner < 11.52 Code Execution
  2671. RSA Authentication Agent Installed
  2672. Apple QuickTime MPEG-2 Playback Component Vulnerability
  2673. Cisco Unified Presence Server DoS (cisco-sa-20120912-cupxcp)
  2674. Cisco Unified Presence Server DoS (cisco-sa-20130227-cups)
  2675. DotNetNuke DNNArticle Module categoryid Parameter SQL Injection
  2676. Google Chrome < 29.0.1547.57 Multiple Vulnerabilities
  2677. PowerDNS Recursor 3.3.x / 3.4.x / 3.5 RC1 Domain Name Resolving Vulnerability
  2678. RSA Authentication Agent 7.1.x < 7.1.2 Authentication Bypass
  2679. Tumbleweed SecureTransport vcst_eu.dll ActiveX Control Buffer Overflows
  2680. CiscoWorks Common Services Installed
  2681. CiscoWorks Common Services Arbitrary Code Execution (cisco-sa-20101027-cs)
  2682. How Not to DDoS Your Former Employer
  2683. Bradley Manning sentenced to 35 years in prison The Register
  2684. US intelligence services go 'on the record' with new Tumblr blog | World news | theguardian.com
  2685. If You Send To Gmail, You Should Have 'No Legitimate Expectation Of Privacy' - Business Insider
  2686. Researchers release tool to pickup the SLAAC in Man-In-The-Middle attacks using IPv6 - Network World
  2687. Putty Security Update (SSH Tool)
  2688. Poison Ivy: Assessing Damage and Extracting Intelligence
  2689. Hackers use new tactic to attack U.S. media sites | Reuters
  2690. Attention, parents: Baby monitor hacked; default password to blame?
  2691. Zuckerberg Facebook hacker gets $10k fundraiser bug bounty
  2692. CSOs: Stop flogging the threats and start providing solutions
  2693. Bloke leaks '1000s' of Twitter login tokens, says he can hack ANY twit
  2694. Open Security Research: Remote Code Execution on Wired-side Servers over Unauthenticated Wireless
  2695. ZMap The Internet Scanner
  2696. Tenable Network Security: Tenable CIS Oracle 9i/10g v2.01 Audits
  2697. PuTTY < 0.63 Multiple Vulnerabilities
  2698. ModSecurity < 2.1.1 POST Data Null Byte Filter Bypass
  2699. ModSecurity < 2.5.9 Multipart Request Header Name DoS
  2700. ModSecurity < 2.7.0 Multipart Request Parsing Filter Bypass
  2701. ModSecurity < 2.7.3 XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
  2702. CA ARCserve Backup for Laptops and Desktops Server, CA Protection Suite, and CA Desktop Management Suite Integer Underflow
  2703. PuTTY 0.52 to 0.62 Multiple Vulnerabilities
  2704. Mac OS X Directory Service Buffer Overflow
  2705. Poison Ivy Detection
  2706. TrustPort WebFilter help.php hf Parameter Directory Traversal
  2707. HP ProCurve Identification
  2708. HP ProCurve 5400 zl Switches Compact Flash Card Security Issue
  2709. MS13-059: Cumulative Security Update for Internet Explorer (2862772)
  2710. MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2850869)
  2711. MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2876063)
  2712. MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege (2849470)
  2713. MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)
  2714. MS13-064: Vulnerability in Windows NAT Driver Could Allow Denial of Service (2849568)
  2715. MS13-065: Vulnerability in ICMPv6 Could Allow Denial of Service (2868623)
  2716. MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure (2873872)
  2717. MS KB2862966 : Updates to Improve Cryptography and Digital Certificate Handling in Windows
  2718. MS KB2861855: Updates to Improve Remote Desktop Protocol Network-Level Authentication
  2719. MS KB2862973: Update for Deprecation of MD5 Hashing Algorithm for Microsoft Root Certificate Program
  2720. Cisco Intrusion Prevention System Jumbo Frame Denial of Service (cisco-sa-20080618-ips)
  2721. HP ProCurve Switches Remote Unauthorized Information Disclosure
  2722. Adobe Camera Raw Plugin Multiple Vulnerabilities (Mac OS X)
  2723. PHP 5.5.x < 5.5.1 xml.c Buffer Overflow
  2724. BigTree CMS Detection
  2725. BigTree CMS index.php SQL Injection
  2726. Western Digital My Net Router main_internet.php Admin Credential Disclosure
  2727. OpenX flowplayer-3.1.1.min.js Backdoor Remote Code Execution
  2728. OSPF LSA Manipulation Vulnerability in Cisco ASA (cisco-sa-20130801-lsaospf)
  2729. OSPF LSA Manipulation Vulnerability in Cisco IOS (cisco-sa-20130801-lsaospf)
  2730. OSPF LSA Manipulation Vulnerability in Cisco IOS-XE (cisco-sa-20130801-lsaospf)
  2731. OSPF LSA Manipulation Vulnerability in Cisco NX-OS (cisco-sa-20130801-lsaospf)
  2732. HP Integrated Lights-Out authentication bypass
  2733. 10 years of Blaster: a retrospective
  2734. Buying Battles in the War on Twitter Spam
  2735. Schneier on Security: Stories from MI5
  2736. Can We End CSRF With Header-Based Browser Policies?
  2737. The More Things Change
  2738. Hacker 'Shouts Abuse' Via Foscam Baby Monitoring Camera
  2739. Leap Motion Controller exploit demoed by Malwarebytes
  2740. Every employee is now an IT employee, to some degree
  2741. Continuous Security Monitoring: Compliance
  2742. Cisco Security Switches
  2743. NetAppVoice: CxO Beware: Hacker-Snipers Aiming At You Right Now - Forbes
  2744. Why is notepad.exe connecting to the internet? | Strategic Cyber LLC
  2745. Wall Of Sheep Hacker Group Exposes NFC's Risks
  2746. GPS Jammer Accidentally Jams Up Newark Airport
  2747. Mainframes Hackable, But Do You Care?
  2748. London Bans Smartphone Snooping Garbage Bins
  2749. Raritan remote administration server detection
  2750. IPMI Server Detection
  2751. ClearSCADA server detection
  2752. Mozilla Thunderbird < 17.0.8 Multiple Vulnerabilities
  2753. Mozilla SeaMonkey < 2.20 Multiple Vulnerabilities
  2754. Mozilla Firefox < 23.0 Multiple Vulnerabilities
  2755. Symantec Web Gateway < 5.1.1 Multiple Vulnerabilities (SYM13-008)
  2756. Samba 3.0.x < 4.0.7 Denial of Service Vulnerability
  2757. Junos Pulse Secure Access Service (SSL VPN) Multiple XSS (JSA10554)
  2758. HP LaserJet Pro /dev/save_restore.xml Administrative Password Disclosure
  2759. Splunk < 5.0.4 X-FRAME-OPTIONS Clickjacking Weakness
  2760. Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities
  2761. Incomplete Thought: The Psychology Of Red Teaming Failure Do Not Pass Go
  2762. Windows Phone shows little market share growth
  2763. Black Hat hacker claims he can make $15k to $20k an hour
  2764. Hackers demonstrate Toyota Prius hijacking on video
  2765. Windows phones can be burned by rogue hotspots
  2766. HP plugs password-leaking printer flaw The Register
  2767. Hackers to NSA chief: Read the Constitution | Security & Privacy - CNET News
  2768. Car hacking code released at Defcon
  2769. Wi-Fi routers: More security risks than ever
  2770. #BlackHat Briefings USA 2013: Day Two Notes
  2771. #BlackHat Briefings USA 2013: Day One Notes
  2772. admin to SYSTEM win7 with remote.exe
  2773. Firefox Zero-Day Used in Child Porn Hunt?
  2774. Chinese hackers take over fake water utility
  2775. FBI allowed informants to break law more than 5,600 times in year
  2776. Android Apps Can Access All Of Your Google Account
  2777. Posh potty owners flushed by dodgy Bluetooth password
  2778. iOS Weaknesses Allow Attacks Via Trojan Chargers
  2779. Water-Utility Honeynet Illuminates Real-World SCADA Threats
  2780. Windows Phones open to hackers when connecting to rogue Wi-Fi
  2781. DNS Vulnerability Dashboard
  2782. Event Indicator Alert Dashboard
  2783. Web Services Indicator Dashboard
  2784. Event Indicator Alert Report
  2785. EAServer <= 6.3.1 / 6.2 Multiple Vulnerabilities
  2786. MySQL 5.6.x < 5.6.12 Multiple Vulnerabilities
  2787. Line Client Detection
  2788. Oracle VirtualBox Detection
  2789. Oracle VM VirtualBox 4.2 < 4.2.14 tracepath Local Denial of Service
  2790. WhatsApp Client Detection
  2791. Kakao Client Detection
  2792. Kakao Client Detection
  2793. Apache 2.4 < 2.4.5 Multiple Vulnerabilities
  2794. DRAC server detection
  2795. Intel Active Management Server Detection
  2796. Megarac server detection
  2797. QNX Server Detection
  2798. QNX Server Detection
  2799. ServerView server detection
  2800. Atvise Server Detection
  2801. Google Chrome < 28.0.1500.95 Multiple Vulnerabilities
  2802. Kingfisher Debug Terminal Detection
  2803. Apache Subversion < 1.8.1 / 1.7.11 Remote Denial of Service Vulnerability
  2804. Cisco IOS Extensible Authentication Protocol Vulnerability (cisco-sr-20071019-eap)
  2805. Blue Coat ProxySG SGOS Version
  2806. Blue Coat ProxySG Core File Information Disclosure
  2807. Blue Coat ProxySG Unspecified XSS
  2808. MyBB < 1.6.10 Multiple Vulnerabilities
  2809. RT 3.8.x < 3.8.17 / 4.x < 4.0.13 Multiple Vulnerabilities
  2810. Check Point ZoneAlarm Detection
  2811. Apache 2.4 < 2.4.5 Multiple Vulnerabilities
  2812. Ibrahim Balic takes credit for Apple Dev Centre attack, but will he shoulder the blame?
  2813. WordPress flaw could cause data leaks - IT News from V3.co.uk
  2814. Adam Gowdiak uncovers new vulnerability in Java 7 which opens door to 10-year-old attack
  2815. Integrating Vulnerability Management Into The Application Devleopment Process
  2816. True tales of (mostly) white-hat hacking
  2817. Hardware Hacking Trends
  2818. Nations Buying as Hackers Sell Flaws in Computer Code - NYTimes.com
  2819. SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones - Forbes
  2820. SSH Brute Force The 10 Year Old Attack That Still Persists | Sucuri Blog
  2821. Web Plugin Family Indicator Dashboard
  2822. HUAWEI network device detection
  2823. Google Chrome < 28.0.1500.71 Multiple Security Vulnerabilities
  2824. phpMyAdmin 4.0.x < 4.0.3 'view_create.php' Cross Site Scripting Vulnerability
  2825. Flash Player <= 10.3.183.90 / 11.7.700.225 Multiple Vulnerabilities (APSB13-17)
  2826. WeChat chat client detection
  2827. LINE chat client detection
  2828. KakaoTalk Client Detection
  2829. PHP Backdoor Script Detection
  2830. PHP Code Obfuscation
  2831. Apache 2.2.x < 2.2.25 Remote Denial of Service Vulnerability
  2832. PHP 5.3.x < 5.3.27 Information Disclosure
  2833. PHP 5.4.x < 5.4.17 Buffer Overflow
  2834. Samba 3.6.x < 3.6.6 Remote Security Bypass
  2835. phpMyAdmin 3.5.x < 3.5.8.1 / 4.x < 4.0.0-rc3 Multiple Vulnerabilities
  2836. Squid 3.2.x < 3.2.13 / 3.3.x < 3.3.8 Port Handling Denial of Service
  2837. Squid 3.x < 3.2.12 / 3.3.x < 3.3.7 idnsALookup HTTP Request Denial of Service
  2838. IBM Blade Center Advanced Management Console Detection
  2839. Dell iDRAC6 Multiple Vulnerabilities
  2840. Juniper Junos on SRX Series PIM DoS (JSA10573)
  2841. Juniper Junos SRX Series UAC Enforcer HTTP Remote Code Execution (JSA10574)
  2842. Juniper Junos OpenSSL Multiple Vulnerabilities (JSA10575)
  2843. Juniper Junos proxy-arp/arp-resp DoS (JSA10576)
  2844. Juniper Junos SRX Series TCP ALG DoS (JSA10577)
  2845. Juniper Junos SRX Series MSRPC DoS (JSA10578)
  2846. Juniper Junos SRX1400/3400/3600 Etherleak Information Disclosure (JSA10579)
  2847. Juniper Junos SSL/TLS Renegotiation DoS (JSA10580)
  2848. Apache 2.0 < 2.0.65 Multiple Vulnerabilities
  2849. Apache 2.2 < 2.2.25 Multiple Vulnerabilities
  2850. Oracle Linux 6 : kernel (ELSA-2013-1051)
  2851. Blue Coat Authentication and Authorization Agent (BCAAA) Installed
  2852. Blue Coat Authentication and Authorization Agent Remote Overflow
  2853. Adobe ColdFusion 9/9.0.1/9.0.2 On JRun DoS (APSB13-19) (credentialed check)
  2854. Apache Subversion < 1.6.23 / 1.7.x < 1.7.10 Multiple Remote DoS
  2855. IPMI Cipher Suite Zero Authentication Bypass
  2856. IPMI Cipher Suites Supported
  2857. McAfee ePolicy Orchestrator < 4.6.7 Multiple XSS
  2858. Oracle Database July 2013 Critical Patch Update
  2859. Symantec Mail Security for Exchange / Domino Autonomy KeyView Module Multiple Buffer Overflows
  2860. Symantec Mail Security for SMTP Autonomy KeyView Module Multiple Buffer Overflows
  2861. MySQL 5.1 < 5.1.70 Multiple Vulnerabilities
  2862. MySQL 5.5 < 5.5.32 Multiple Vulnerabilities
  2863. MySQL 5.6.x < 5.6.12 Multiple Vulnerabilities
  2864. Sun Java System Application Server Information Disclosure
  2865. Default password (dasdec1) for 'root' account
  2866. Apache Struts2 action: Parameter Arbitrary Remote Command Execution
  2867. IBM WebSphere Application Server 7.0 < Fix Pack 29 Multiple Vulnerabilities
  2868. IceWarp /rpc/gw.html XML External Entity Arbitrary File Disclosure
  2869. Oracle VM VirtualBox 4.2 < 4.2.14 tracepath Local Denial of Service
  2870. How Easily Can a Moving Car Be Hacked? | Motherboard
  2871. Why help desk employees are a social engineer's favorite target
  2872. Researchers To Highlight Weaknesses In Secure Mobile Data Stores --
  2873. Researchers hack Verizon device, turn it into mobile spy station | Reuters
  2874. Most enterprise networks riddled with vulnerable Java installations, report says
  2875. How the Glass hack works
  2876. Man arrested for having sex with pool raft | Norwalk Reflector
  2877. The Five Most Common Security Pitfalls In Software Development
  2878. Feds asked to sit out Defcon hacking conference this year
  2879. HP admits to backdoors in storage products
  2880. D-Link routers multiple security vulnerabilities
  2881. A Bad Talk Aint The End of the World
  2882. Six Tips: How To Protect Yourself From Mobile Attacks
  2883. Web Shells Collection Page Updated
  2884. 4 Things You Should Know Before Your Team Writes Another Line of Code
  2885. Asleep at the Wheel
  2886. Open Security Research: Potential attack vectors against Z-Wave
  2887. Microsoft gives Windows app developers 180 days to patch -- or else
  2888. US gov SMASHES UP TVs and MICE to nuke tiny malware outbreak
  2889. Siemens Sinema server detection
  2890. Honeywell server detection
  2891. Honeywell Building Network Adapter (BNA) server detection
  2892. HAProxy Multiple Denial of Service Vulnerabilities
  2893. GE Industrial server detection
  2894. Cooper Power Systems HMI/SCADA device detection
  2895. Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20120926-cucm)
  2896. Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability (cisco-sa-20120926-ecc)
  2897. Plone spamProtect mailaddress Parameter XSS
  2898. Cryptocat 'encrypted' group chats may have been crackable for 7 months
  2899. Hacker Holes in Server Management System Allow 'Almost-Physical' Access | Threat Level | Wired.com
  2900. introducing zarp | forelsket & security
  2901. Top 10 Proactive Web Application Security Measures | WhiteHat Security Blog
  2902. INVASION of the UNDEAD ANDROIDS: Hackers can pwn 'nearly all' devices
  2903. Microsoft Offloads Heap Of Critical Fixes
  2904. Auditing NetApp Data ONTAP with Nessus
  2905. NetApp Data ONTAP Best Practices Audit
  2906. cURL/libcURL 'curl_easy_unescape()' Heap Memory Corruption Vulnerability
  2907. FileMaker Pro Software Sharing Detection
  2908. cURL/libcURL 'Curl_sasl_create_digest_md5_message()' Stack Buffer Overflow Vulnerability
  2909. HAProxy Trash Buffer Overflow Vulnerability
  2910. Multiple Avira Products PDF Handling Remote Denial-of-Service Vulnerability
  2911. cURL/libcURL GSS/Negotiate Feature Spoofing Security Vulnerability
  2912. cURL/libcURL Remote Input Validation Vulnerability
  2913. EAServer <= 6.3.1 Information Disclosure
  2914. cURL/libcURL 'tailmatch()' Function Information Disclosure Vulnerability
  2915. HAProxy 'tcp-request content' Buffer Overflow Vulnerability
  2916. Winamp < 5.63 Multiple Vulnerabilities
  2917. Winamp < 5.64 Multiple Vulnerabilities
  2918. Samba 3.6.x < 3.6.6 Remote Security Bypass
  2919. McAfee ePolicy Orchestrator Installed (credentialed check)
  2920. McAfee ePO Extension for McAfee Agent Blind SQL Injection
  2921. HP Data Protector Components Version Detection
  2922. Nuance PDF Reader pdfcore8.dll Heap Buffer Overflow
  2923. ModSecurity Version
  2924. ModSecurity < 2.1.1 POST Data Null Byte Filter Bypass
  2925. ModSecurity < 2.5.9 Multipart Request Header Name DoS
  2926. ModSecurity < 2.7.0 Multipart Request Parsing Filter Bypass
  2927. ModSecurity < 2.7.3 XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
  2928. ModSecurity < 2.7.4 forceRequestBodyVariable Action Handling DoS
  2929. IBM Lotus Domino 8.5.x < 8.5.3 FP 4 Multiple Vulnerabilities
  2930. Citrix Web Interface 5.x < 5.4 Unspecified XSS
  2931. Citrix AGEE Logon Portal Unspecified XSS
  2932. SCTP Reverse Shell
  2933. NSA hacking Chinese: it's self defense
  2934. Incomplete Thought: In-Line Security Devices & the Fallacies Of Block Mode
  2935. Is your modem secure? | Security Spread
  2936. Blind SQL Injection What is it Good For? | WhiteHat Security Blog
  2937. ISC Diary | HP iLO3/iLO4 Remote Unauthorized Access with Single-Sign-On
  2938. BeEF - The Browser Exploitation Framework Blog: Cross-domain communication with a JSP shell from a browser hooked with BeEF
  2939. The Problem With Networks ..... - SpiderLabs Anterior
  2940. Two malware programs help each other stay on computers
  2941. MIT researchers can see through walls using 'Wi-Vi'
  2942. Hackers in Africa are building their own aircraft
  2943. Microsoft pulls security update over software conflicts
  2944. With BlackBerry reportedly hacked, is anything secure?
  2945. Opera network cracked
  2946. 3 Stupid Corporation Tricks
  2947. Surrendering The Endpoint
  2948. PCI DSS Indicators Report
  2949. IT-Grundschutz BSI-100-2 Report Template
  2950. Vulnerabilities Over 30 Days Report
  2951. Vulnerabilities Over 30 Days Dashboard
  2952. IT-Grundschutz BSI-100-2 Dashboard
  2953. HP Data Protector Detection
  2954. VxWorks Detection
  2955. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU Update)
  2956. Google Chrome < 27.0.1453.116 Flash Click-Jacking
  2957. Symantec Endpoint Protection Manager < 12.1 RU3 (SYM13-005)
  2958. Cisco Security Device Manager Detection
  2959. ComOS network equipment detection
  2960. Emerson telnet server detection
  2961. Lantronix SCADA device detection
  2962. Mozilla Thunderbird < 17.0.7 Multiple Vulnerabilities
  2963. RuggedCom Server Version Detection
  2964. SIEMENS telnet server detection
  2965. Dropbox Software Detection
  2966. Sybase EAServer 6.3.1 < 6.3.1.07 Build 63107 / 6.2 < 6.2.0.12 Build 62012 Multiple Vulnerabilities
  2967. Novell ZENworks Configuration Management < 11.2.3a Monthly Update 1 Multiple Vulnerabilities (credentialed check)
  2968. Novell ZENworks Control Center File Upload Remote Code Execution (intrusive check)
  2969. Novell ZENworks Configuration Console Login.jsp language Parameter XSS
  2970. Google SketchUp < 8.0.11752 MAC Pict Buffer Overflow
  2971. Google SketchUp < 13.0.3689 SKP Multiple Vulnerabilities
  2972. Symantec Endpoint Protection Manager < 12.1 RU3 (SYM13-005) (credentialed check)
  2973. Mac OS X : Java for Mac OS X 10.6 Update 16
  2974. Mac OS X : Java for OS X 2013-004
  2975. Google Chrome < 27.0.1453.116 Flash Click-Jacking
  2976. Apache Struts2 OGNL Expression Handling Double Evaluation Error Remote Command Execution
  2977. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU)
  2978. Gallery 3.0.x < 3.0.8 Multiple XSS
  2979. Apache Struts2 Crafted Parameter Arbitrary OGNL Expression Remote Command Execution
  2980. IBM Notes 8.x < 8.5.3 IF4 HF2 / 9.x < 9.0 IF2 Code Execution
  2981. IBM Notes 8.5 < 8.5.3 IF4 HF2 / 9.0 < 9.0 IF2 Password Disclosure
  2982. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU) (Unix)
  2983. Post-Scan Rules Application
  2984. FreeBSD : phpMyAdmin -- Global variable scope injection (1b93f6fe-e1c1-11e2-948d-6805ca0b3d42)
  2985. San Cristbal La Fuerza: Off-The-Radar Cigar
  2986. Smoked Up No.24
  2987. Arturo Fuente Don Carlos Lancero
  2988. Monte Pascoal Robusto
  2989. Cigar Tip: The Stogie Guys Guide to Summer
  2990. Whisky Review: Caol Ila 18 Year Old
  2991. Tastes and Flavors of Cigars
  2992. Top 10 Cigars Tips - Do's and Don'ts For Cigar...
  2993. Best Cigars For Weddings
  2994. Top 5 Cigars for Beginners - Buying Beginner...
  2995. Cigar Review: Leccia Tobacco Black
  2996. Cigar Review: Ditka Throwback by Camacho Cigars
  2997. Do you cover up your webcam?
  2998. Security issue in iOS Personal Hotspot
  2999. Sometimes, The PenTest Gods Shine On You - SpiderLabs Anterior
  3000. Critical Update Plugs 40 Security Holes in Java
  3001. Texas becomes first US state to ban warrantless email snooping
  3002. Beware Of HTML5 Development Risks
  3003. Security Needs More Designers, Not Architects
  3004. Wi-Fi Alliance launches 802.11ac certification program
  3005. EMET 4.0 is now available for download, (Tue, Jun 18th)
  3006. Wall Street To Host A Simulated Cyber War
  3007. DHS warns of vulns in hospital medical equipment
  3008. Compliance Is Bad for Security
  3009. The Value of a Hacked Email Account Krebs on Security
  3010. OpenSSL < 0.9.8y / 1.0.1d / 1.0.0k Multiple Vulnerabilities
  3011. Adobe AIR <= 3.7.0.1860 Memory Corruption (APSB13-16)
  3012. Flash Player <= 10.3.183.86 / 11.7.700.202 Memory Corruption (APSB13-16)
  3013. OID parsing
  3014. OID parsing
  3015. SIEMENS telnet server detection
  3016. Google Chrome for iOS < 26.0.1410.53 Multiple Vulnerabilities
  3017. Desktop Application Vulnerability Report
  3018. Cisco Software Vulnerabilities
  3019. Enterprise Application Vulnerability Report
  3020. EMC Software Vulnerabilities
  3021. Oracle Software Vulnerabilities
  3022. IBM Software Vulnerabilities
  3023. HP Software Vulnerabilities
  3024. Desktop Application Vulnerability Dashboard
  3025. Cisco Software Vulnerabilities
  3026. Enterprise Application Vulnerability Dashboard
  3027. EMC Software Vulnerabilities
  3028. Oracle Software Vulnerabilities
  3029. IBM Software Vulnerabilities
  3030. HP Software Vulnerabilities
  3031. XnView 2.x < 2.03 Multiple Buffer Overflow Vulnerabilities
  3032. Cisco Prime Network Control System Version
  3033. Cisco Prime Network Control System Default Credentials (cisco-sa-20130410-ncs)
  3034. Plone PloneFormGen Unspecified Arbitrary Code Execution
  3035. MS13-047: Cumulative Security Update for Internet Explorer (2838727)
  3036. MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229)
  3037. MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (2845690)
  3038. MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894)
  3039. MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571)
  3040. MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571) (Mac OS X)
  3041. MS KB2813430 : Update to Improve Cryptography and Digital Certificate Handling in Windows
  3042. MS KB2847928: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3043. Adobe AIR <= 3.7.0.1860 Memory Corruption (APSB13-16)
  3044. Flash Player <= 10.3.183.86 / 11.7.700.202 Memory Corruption (APSB13-16)
  3045. Adobe AIR for Mac <= 3.7.0.1860 Memory Corruption (APSB13-16)
  3046. Flash Player for Mac <= 10.3.183.86 / 11.7.700.203 Memory Corruption (APSB13-16)
  3047. Microsoft Windows Kernel Win32k.sys PATHRECORD chain Multiple Vulnerabilities
  3048. JBoss Enterprise Portal Platform 5.2.2 Security Update (RHSA-2013-0141)
  3049. JBoss Enterprise Portal Platform GateIn Portal Security Update (RHSA-2013-0613)
  3050. Wireshark 1.6.x < 1.6.16 Multiple DoS Vulnerabilities
  3051. Wireshark 1.8.x < 1.8.8 Multiple Vulnerabilities
  3052. VMware vCenter Chargeback Manager Installed
  3053. VMware vCenter Chargeback Manager Remote Code Execution (VMSA-2013-0008)
  3054. Jenkins < 1.514 / 1.509.1 and Jenkins Enterprise 1.466.x / 1.480.x < 1.466.14.1 / 1.480.4.1 Multiple Vulnerabilities
  3055. VMware vCenter Update Manager Detection (credentialed)
  3056. VMware vCenter Update Manager Multiple Vulnerabilities (VMSA-2012-0013)
  3057. IPv6 Under Attack?
  3058. Guy Hacked His House To Have Its Own Twitter Feed
  3059. Microsoft Borks Botnet Takedown In Citadel Snafu
  3060. Android Trojans spread by Bluetooth, hijack bank codes
  3061. 12 Endpoint Security Myths Dispelled
  3062. Print Services Vulnerabilities
  3063. Operating System Vulnerabilities
  3064. Vulnerability Trending with Scanning, Sniffing and Logging
  3065. Enterprise Management Software Vulnerabilities
  3066. Network Service Vulnerabilities
  3067. Application Development Vulnerabilities
  3068. Media Player Vulnerability Dashboard
  3069. Database Software Vulnerabilities
  3070. Adobe Software Vulnerabilities
  3071. Print Services Vulnerability Report
  3072. Operating System Vulnerability Report
  3073. Enterprise Management Software Vulnerabilities
  3074. Network Service Vulnerabilities
  3075. Vulnerability Trending with Scanning, Sniffing and Logging
  3076. Application Development Vulnerabilities
  3077. Media Player Vulnerabilty Report
  3078. Database Software Vulnerabilities
  3079. Adobe Software Vulnerabilities
  3080. Apache Subversion < 1.8.0 / 1.7.10 / 1.6.23 Multiple Vulnerabilities
  3081. Eclipse IDE Software Detection
  3082. Mac OS X : Safari < 6.0.5 Multiple Security Vulnerabilities
  3083. Google Chrome < 27.0.1453.110 Multiple Vulnerabilities
  3084. Mac OS X 10.8 < 10.8.4 Multiple Vulnerabilities (Security Update 2013-002)
  3085. CAPWAP Protocol Client Detection
  3086. CAPWAP Protocol Detection
  3087. CAPWAP Protocol Server Detection
  3088. LWAPP Protocol Detection
  3089. PROMOTIC SCADA Server Detection
  3090. ISC BIND 9.6-ESV-R9 / 9.8.5 / 9.9.3 Remote Denial of Service Vulnerability
  3091. PHP < 5.4.16 / 5.3.26 Heap Based Buffer Overflow Vulnerability
  3092. IBM Websphere DataPower server detection
  3093. IrfanView FlashPix Plugin < 4.36 Summary Information Property Set Handling Integer Overflow
  3094. Oracle GlassFish Server 3.0.1 < 3.0.1.7 / 3.1.2 < 3.1.2.5 Multiple Vulnerabilities (April 2013 CPU)
  3095. CoDeSys Gateway Service < 2.3.9.28 Use-After-Free
  3096. VMware vCenter Multiple Vulnerabilities (VMSA-2012-0013)
  3097. SAP Control SOAP Web Service Remote Code Execution (SAP Note 1414444)
  3098. Mac OS X 10.8 < 10.8.4 Multiple Vulnerabilities
  3099. Mac OS X Multiple Vulnerabilities (Security Update 2013-002)
  3100. Mac OS X : Safari < 6.0.5 Multiple Vulnerabilities
  3101. Trend Micro DirectPass < 1.6.0.1015 Multiple Vulnerabilities
  3102. VMware vCenter Server Multiple Vulnerabilities (VMSA-2012-0005)
  3103. Google Chrome < 27.0.1453.110 Multiple Vulnerabilities
  3104. Splunk 5.0.x < 5.0.3 Multiple Vulnerabilities
  3105. Mac OS X 10.7 / 10.8 Unauthorized File Access (remote check)
  3106. ISC BIND 9 Recursive Resolver Malformed Zone DoS
  3107. Siemens Solid Edge SEListCtrlX ActiveX Control SetItemReadOnly Method Memory Address Write Arbitrary Code Execution
  3108. Siemens Solid Edge WPHelper ActiveX Control OpenInEditor Method Arbitrary Command Execution
  3109. MediaWiki 1.19.x < 1.19.7 / 1.20.x < 1.20.6 Arbitrary File Upload
  3110. PHP 5.3.x < 5.3.26 Multiple Vulnerabilities
  3111. PHP 5.4.x < 5.4.16 Multiple Vulnerabilities
  3112. Plesk Panel Apache Arbitrary PHP Code Injection
  3113. SSL Null Cipher Suites Supported
  3114. HP Data Protector Multiple Vulnerabilities
  3115. Belarus Becomes World's Top Spammer
  3116. You Can Now Eat Your Passwords
  3117. Hackers Spawn Distributed Supercomputer On Way To Chess Record
  3118. IT departments won't exist in five years
  3119. How to see if your antivirus is actually working
  3120. GDS Blog - GDS Blog - Using Nessus to Audit VMware vSphereConfigurations
  3121. There is no Onion The Painful Reality of Defense in Depth
  3122. Bypassing internet filtering with Lahana
  3123. Counter-Strike? | CSO Blogs
  3124. De-ICE 1.40 LiveCD Hacking Challenge Released
  3125. 2012 Browser Security Comparative Analysis: Socially Engineered Malware | NSS Labs
  3126. Google researcher discloses zero-day exploit for Windows
  3127. LinkedIn aims to keep hackers out with two-factor login
  3128. How to Hack an iPhone With a USB Charger
  3129. Moving Safely From Detection To Automated Action
  3130. Nessus Website Screenshots Feature
  3131. Tenable Network Security: Tenable IT-Grundschutz BSI 100-2...
  3132. Tenable Network Security: DISA STIG AIX 6.1 Audit
  3133. HTTP 500 Detection (Client)
  3134. HTTP 4xx Detection (Client)
  3135. Squid 2.x / 3.x < 3.1.23 / 3.2.6 / 3.3.0.3 cachemgr.cgi DoS
  3136. MS Skydrive 'Cloud' Backup Service Detection
  3137. Tridium SCADA Server Version Detection
  3138. SAP Netweaver Version Detection
  3139. Rockwell Automation RSBizWare Detection
  3140. Mitsubishi Electric Device Version Detection
  3141. LabView Remote Management Interface Detection
  3142. HTTP 500 Detection
  3143. Web Development Software Vulnerabilities
  3144. Security Software Vulnerabilities
  3145. Remote Access Vulnerability Report
  3146. Storage and Backup Vulnerability Report
  3147. Office Suite Vulnerabilities
  3148. Update Services Vulnerabilities Report
  3149. Virtual Computing Vulnerabilities
  3150. Web Browser Vulnerability Report
  3151. Web Technology Vulnerability Report
  3152. Web Development Software Vulnerabilities
  3153. Security Software Vulnerabilities
  3154. Remote Access Vulnerabilities
  3155. Storage and Backup Vulnerabilities
  3156. Office Suite Vulnerabilities
  3157. Update Services Vulnerabilities
  3158. Virtual Computing Vulnerabilities
  3159. Web Browser Vulnerabilities
  3160. Web Technology Vulnerabilites
  3161. Default Password (openvpnas) for 'root' Account
  3162. Skype for Windows < 6.3.0.105 Multiple Vulnerabilities (uncredentialed check)
  3163. Skype < 6.3.0.105 Multiple Vulnerabilities (credentialed check)
  3164. DotNetNuke 7.0.x < 7.0.6 Unspecified Modal Window XSS
  3165. IBM HTTP Server for z/OS 5.3.0 Command Execution
  3166. Mitsubishi MX Component ActiveX Remote Code Execution
  3167. Cisco IOS ISM Module for ISR G2 Authentication Header DoS
  3168. Nitro Pro <= 7.5.0.29 Memory Corruption
  3169. Nitro Reader Installed
  3170. Nitro Reader <= 2.5.0.45 Memory Corruption
  3171. Interview With A Blackhat (Part 1) | WhiteHat Security Blog
  3172. Sunera Information Security Blog: Download Multiple Nessus Reports via the Nessus XML-RPC API
  3173. Improving the security of your SSH private key files Martin Kleppmanns blog
  3174. A closer look at a recent privilege escalation bug in Linux (CVE-2013-2094) at time to bleed by Joe Damato
  3175. Log file vulnerability in Apache server
  3176. Google cuts grace period for vendors of vulnerable software
  3177. Hacking Firmware And Detecting Backdoors -- Dark Reading
  3178. Alert-driven vs Exploration-driven Security Analysis
  3179. PayPal denies teenager reward for finding website bug
  3180. US weapons system designs were reportedly viewed by Chinese hackers
  3181. Aha, I see you switched on your mobile Wi-Fi. YOU FOOL!
  3182. Security boffins say music could trigger mobile malware
  3183. Saved-game bug dumped PlayStation 3 fans in hijackers' sights
  3184. US power grid the target of 'numerous and daily' cyber-attacks The Register
  3185. PayPal vulnerable to cross-site scripting again
  3186. Apache Tomcat 6.0.x < 6.0.37 Multiple Vulnerabilities
  3187. Apache Tomcat 7.0.x < 7.0.40 Information Disclosure
  3188. Mutiny < 5.0-1.11 Multiple Directory Traversals
  3189. Google Chrome < 27.0.1453.93 Multiple Vulnerabilities
  3190. Cisco Device Web Configuration Detection
  3191. Cisco Device Web Configuration Detection
  3192. Simple Comtools Remote Management Interface Detection
  3193. TalkSwitch VoIP Server Detection
  3194. QuickTime < 7.7.4 Multiple Vulnerabilities (Windows)
  3195. RT: Request Tracker < 3.8.17 / 4.0.13 Multiple Vulnerabilities
  3196. MediaWiki Arbitrary File Upload Vulnerability
  3197. Outstanding Remediations Tracking
  3198. Common Application Vendor Vulnerabilities
  3199. Web Service Vulnerabilities
  3200. Outstanding Remediations Tracking
  3201. Common Application Vendor Vulnerabilities
  3202. Web Service Vulnerabilities
  3203. Adobe Reader Enabled in Browser (Internet Explorer)
  3204. Adobe Reader Enabled in Browser (Google Chrome)
  3205. Adobe Reader Enabled in Browser (Mozilla Firefox)
  3206. Adobe Reader Enabled in Browser (Opera)
  3207. Adobe ColdFusion Multiple Vulnerabilities (APSB13-03) (credentialed check)
  3208. DotNetNuke Language Flag Selector Culture XSS
  3209. PCI-DSS Indicators Dashboard
  3210. ISC BIND 9 Assertion Error Resource Record RDATA Query Parsing Remote DoS
  3211. ISC BIND 9 DNS RDATA Handling DoS
  3212. ISC BIND 9 DNS64 Handling DoS
  3213. ISC BIND 9 libdns Regular Expressions Handling DoS
  3214. Clorius Controls SCADA Information Disclosure
  3215. JouleTemp environmental server detection
  3216. PostgreSQL < 8.3.20 / 8.4.13 / 9.0.9 / 9.1.5 Multiple Vulnerabilities
  3217. Proficy Portal SCADA server detection
  3218. Microsoft Security Essentials < v4.2 Local Privilege Escalation Vulnerability
  3219. PostgreSQL < 8.3.19 / 8.4.12 / 9.0.8 / 9.1.4 Multiple Vulnerabilities
  3220. PostgreSQL < 8.4.11 / 9.0.7 / 9.1.3 Multiple Vulnerabilities
  3221. Digi Rabbit FTP Server Detection
  3222. Digi Rabbit HTTP Server Detection
  3223. Flash Player <= 10.3.183.75 / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3224. Mozilla Thunderbird 17.x < 17.0.6 Multiple Vulnerabilities
  3225. Heatmiser server detection
  3226. iBoot Bar server detection
  3227. Mozilla Firefox 20.x <= 20 Multiple Vulnerabilities
  3228. OSMA Heating server detection
  3229. Sullair Econnect server detection
  3230. XControl Process Automation server detection
  3231. Adobe AIR <= 3.6.0.6090 Multiple Vulnerabilities (APSB13-11)
  3232. Adobe AIR <= 3.7.0.1530 Multiple Vulnerabilities (APSB13-14)
  3233. iTunes < 11.0.3 Multiple Vulnerabilities
  3234. Default Password (nsroot) for 'nsroot' Account
  3235. Citrix NetScaler Web Management Interface Default Administrator Credentials
  3236. e107 content_preset.php URI XSS
  3237. Clorius Controls ISC SCADA Detection
  3238. Clorius Controls ISC SCADA Information Disclosure
  3239. Adobe ColdFusion Authentication Bypass (APSB13-13)
  3240. Adobe ColdFusion Authentication Bypass (APSB13-13) (intrusive check)
  3241. Adobe ColdFusion Multiple Vulnerabilities (APSA13-03)
  3242. Adobe Acrobat < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15)
  3243. Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15)
  3244. Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15) (Mac OS X)
  3245. MS13-037: Cumulative Security Update for Internet Explorer (2829530)
  3246. MS13-038: Security Update for Internet Explorer (2847204)
  3247. MS13-039: Vulnerability in HTTP.sys Could Allow Denial of Service (2829254)
  3248. MS13-040: Vulnerabilities in .NET Framework Could Allow Spoofing (2836440)
  3249. MS13-041: Vulnerability in Lync Could Allow Remote Code Execution (2834695)
  3250. MS13-042: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2830397)
  3251. MS13-043: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2830399)
  3252. MS13-044: Vulnerability in Microsoft Visio Could Allow Information Disclosure (2834692)
  3253. Microsoft Windows Essentials Installed
  3254. MS13-045: Vulnerability in Windows Essentials Could Allow Information Disclosure (2813707)
  3255. MS13-046: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2840221)
  3256. MS KB2820197: Update Rollup for ActiveX Kill Bits
  3257. Microsoft Malicious Software Removal Tool Installed
  3258. MS Security Advisory 2846338: Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution
  3259. Adobe AIR <= 3.7.0.1530 Multiple Vulnerabilities (APSB13-14)
  3260. Flash Player <= 10.3.183.75 / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3261. Adobe AIR for Mac <= 3.7.0.1530 Multiple Vulnerabilities (APSB13-14)
  3262. Flash Player for Mac <= 10.3.183.75 / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3263. Mutiny < 5.0-1.11 Multiple Directory Traversals
  3264. iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)
  3265. iTunes < 11.0.3 Multiple Vulnerabilities (uncredentialed check)
  3266. iTunes < 11.0.3 Certificate Validation Vulnerability (Mac OS X)
  3267. HP-UX PHNE_42470 : s700_800 11.31 cumulative ARPA Transport patch
  3268. Juniper Junos SIP DoS (PSN-2013-04-911)
  3269. Juniper Junos Firewall Bypass DoS (PSN-2013-04-912)
  3270. Juniper Junos Proxy ARP DoS (PSN-2013-04-913)
  3271. Juniper Junos J-Web Remote Code Execution (PSN-2013-04-914)
  3272. Juniper Junos IPv6 Egress Filter DoS (PSN-2013-04-915)
  3273. Juniper Junos Invalid Ether-type DoS (PSN-2013-04-916)
  3274. Juniper Junos GRE DoS (PSN-2013-04-917)
  3275. Juniper Junos DNSSEC Validation DoS (PSN-2013-04-918)
  3276. CMS Hacking, A Look Into The ECCouncil Hack - Imperva Data Security Blog
  3277. Marco Ramilli's Blog: Firmware Hacking: The Samsung smart TV turn
  3278. The Difference Between a Vulnerability Assessment and a Penetration Test
  3279. How to hack an electric car-charging station
  3280. Security Risks of Too Much Security
  3281. ownCloud fixes critical security vulnerabilities
  3282. Catching hackers with virtual industrial plants
  3283. PentesterLab.com Excercises To Learn Penetration Testing
  3284. Bluetooth-Controlled Door Lock
  3285. Opinion: No, the LulzSec hackers werent noble
  3286. Which browser is safest? The answer may surprise you
  3287. Five Things Every Organization Should Know about Detecting And
  3288. Sony hacking suspect smashes computers to get out of prosecution
  3289. CCTV shows speed of theft outside a London restaurant on MSN Video
  3290. U.S. government becomes biggest buyer of malware
  3291. RTFM! NSA tome reveals THE TRUTH behind spooks on the web The Register
  3292. Are you obligated to point out security flaws if youre just hired for a small job? | Ars Technica
  3293. Building a low-end PC: Just say no | ZDNet
  3294. Microsoft Windows Wireless Network History
  3295. Microsoft Windows Wireless Network History
  3296. IBM solidDB Stored Procedure Call Remote Denial of Service
  3297. HP LaserJet Pro Printers Unauthorized Data Access (April 2013)
  3298. Exim with Dovecot use_shell Command Injection
  3299. IBM WebSphere Application Server 8.0 < Fix Pack 6 Multiple Vulnerabilities
  3300. IBM WebSphere Application Server 8.5 < Fix Pack 2 Multiple Vulnerabilities
  3301. Android Emulator Telnet Port on Remote Host
  3302. Android Emulator ADB Port on Remote Host
  3303. Joomla! 2.5.x < 2.5.10 / 3.0.x < 3.0.4 Multiple Vulnerabilities
  3304. MediaWiki 1.19.x < 1.19.6 / 1.20.x < 1.20.5 Multiple Vulnerabilities
  3305. nginx < 1.4.1 / 1.5.0 Stack Buffer Overflow Vulnerability
  3306. Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities
  3307. Apache CDorked backdoor detection
  3308. Citect SCADA client device detection
  3309. Citect SCADA device detection
  3310. National Instruments server detection
  3311. Flash Player <= 10.3.183.14 / 11.1.102.55 Multiple Vulnerabilities (APSB12-03)
  3312. Flash Player <= 10.3.183.15 / 11.1.102.62 Multiple Vulnerabilities (APSB12-05)
  3313. Flash Player <= 10.3.183.16 / 11.1.102.63 Multiple Memory Corruption Vulnerabilities (APSB12-07)
  3314. Flash Player <= 10.3.183.18 / 11.2.202.233 Object Confusion Vulnerability (APSB12-09)
  3315. ISC BIND 9 Cache Update Policy Deleted Domain Name Resolving Weakness
  3316. ISC BIND 9 Multiple Denial of Service Vulnerabilities
  3317. ISC BIND 9 Zero-Length RDATA Section Denial of Service / Information Disclosure
  3318. Introducing the Cigar Flavors Wheel
  3319. Review: Pinar Del Rio Reserva Superior Salomon | halfwheel
  3320. Commentary: Gold Star Smokes (Part VII)
  3321. Unique Cigars - List of Top Unique or Unusual Cigars
  3322. Oliva Atlantic Cigar Company 15th Anniversary Diadema
  3323. Cigar Review: Asylum 13 6 x 80
  3324. 5 Ways to Use Your Cigar Bands
  3325. The Economist on Guantanamo
  3326. Security Lessons From Star Wars: Breach Response
  3327. The Onion and Breach Disclosure
  3328. Use These Secret NSA Google Search Tips to Become Your Own Spy Agency | Threat Level | Wired.com
  3329. Panic Now
  3330. Bang With Friends on iPhone, Android
  3331. Quantifying Risk Tolerance
  3332. Hackers gain access to all .edu domains
  3333. BBC News - Working gun made with 3D printer
  3334. Twitter hack on the Onion makes for comedy gold - The Frontline - a blog from V3.co.uk
  3335. National Republican Congressional Committee Website Hacked With Viagra Ads
  3336. Traffic From Syria Disappears From Internet
  3337. Use of 'honeywords' can expose password crackers
  3338. Software Summary
  3339. SANS Top 20 Report Template
  3340. Consolidation Report for Missing Patches
  3341. VLC Media Player < 2.0.6 ASF Demuxer Buffer Overflow
  3342. HP Intelligent Management Center < 5.2 E0401 Multiple Vulnerabilities
  3343. Webmin <= 1.580 Multiple Input-Validation Vulnerabilities
  3344. Lantronix SCADA device detection
  3345. Mozilla Firefox 7.0 Multiple Vulnerabilities
  3346. Mozilla Thunderbird 7.0 Multiple Vulnerabilities
  3347. Opto 22 SCADA device detection
  3348. Mozilla Firefox <= 11 Multiple Vulnerabilities
  3349. Mozilla SeaMonkey 2.x < 2.9.0 Multiple Vulnerabilities
  3350. Mozilla Thunderbird < 12 Multiple Vulnerabilities
  3351. Apache 2.2 < 2.2.17 Multiple Vulnerabilities
  3352. Clorius Controls SCADA device detection
  3353. Novell GroupWise Internet Agent Unsupported
  3354. op5 Monitor < 5.7.3 Multiple Vulnerabilities
  3355. IBM Tivoli Endpoint Manager Web Server Detection
  3356. IBM Tivoli Endpoint Manager Server < 8.2.1372 Multiple Vulnerabilities
  3357. Google Apps Directory Sync Detection (Windows)
  3358. Google Apps Directory Sync < 3.1.6 Weak Stored Credential Local Disclosure
  3359. HP Managed Printing Administration < 2.7.0 XSS
  3360. VMware Security Updates for vCenter Server (VMSA-2013-0006)
  3361. Unix Operating System on Extended Support
  3362. Patch Report
  3363. Novell iPrint Client < 5.90 Stack-Based Buffer Overflow
  3364. Juniper Junos Unspecified DoS (PSN-2013-01-818)
  3365. X Server Unauthenticated Access: Screenshot
  3366. Open IP ports let anyone track ships on Internet
  3367. Printers, routers used as bots in DDoS attacks
  3368. The 7 elements of a successful security awareness program
  3369. Smart-Meter Blackouts Risk To UK
  3370. Ultra-Hackable Google Glass Could Be A Security Nightmare
  3371. Warnings Of Poor Security In Surveillance Cams
  3372. Practical HTTP Host Header Attacks
  3373. Websites Harbor Fewer Flaws, But Most Have At Least One Serious Vulnerability
  3374. Another Hack, Another 50M Passwords Time for SecureAuth IdP for the Enterprise
  3375. XSS Vulnerability in Cisco sub domain found by 14 Years Old security researcher
  3376. absorptions: Eavesdropping on a wireless keyboard
  3377. First BYOD, now BYON poses security challenge
  3378. Man accused of placing GPS device on victim's car before burglarizing her home
  3379. Serial Killer Hack Threat To Gas Pipes, Traffic Lights, Power Plants
  3380. MySQL Server 5.1.x < 5.1.68 Multiple Vulnerabilities
  3381. MySQL Server 5.1.x < 5.1.69 Multiple Vulnerabilities
  3382. MySQL Server 5.5.x < 5.5.30 yaSSL Buffer Overflow
  3383. MySQL Server 5.5.x < 5.5.31 Multiple Vulnerabilities
  3384. MySQL Server 5.6.x < 5.6.11 Multiple Vulnerabilities
  3385. Bing search string
  3386. Google search string
  3387. Siemens SCALANCE SCADA device detection
  3388. Siemens SCALANCE SCADA device detection
  3389. Siemens Simatic SCADA device detection
  3390. Vonage VoIP phone detection
  3391. Vonage VoIP phone detection
  3392. Yahoo search string
  3393. SANS Top 20 Dashboard
  3394. Plesk Horde Detection
  3395. Traffic Analyzer Plugin for WordPress ta_loaded.js.php aoid Parameter XSS
  3396. MySQL 5.1 < 5.1.69 Multiple Vulnerabilities
  3397. MySQL 5.5 < 5.5.31 Multiple Vulnerabilities
  3398. MySQL 5.6.x < 5.6.11 Multiple Vulnerabilities
  3399. JBoss Web Services Endpoint Enumeration
  3400. JBossWS Endpoint Uses Unsafe Encryption
  3401. MediaWiki 1.19 < 1.19.5 / 1.20 < 1.20.4 Multiple Vulnerabilities
  3402. Cisco IOS Generic Input/Output SNMP DoS
  3403. phpMyAdmin 3.5.x < 3.5.8 tbl_gis_visualization.php Multiple XSS
  3404. VLC < 2.0.6 ASF Demuxer Buffer Overflow
  3405. Puppet Unsafe YAML Unserialization
  3406. Puppet Multiple Vulnerabilities (2013/03/12)
  3407. D-Link DIR-645 getcfg.php Admin Password Disclosure
  3408. IBM Lotus Domino 8.5.x < 8.5.3 Multiple Vulnerabilities
  3409. IBM Lotus Domino 8.5.x Multiple Vulnerabilities
  3410. News: Internet Sales Tax Bill Poised to Hit Cigars Hard
  3411. Diamond Crown Julius Caeser Robusto
  3412. Cigar Review: Tatuaje Reserva J21
  3413. Cigar Review: Eddie Ortega Wild Bunch Dandy McCoy
  3414. Asylum 13 Fifty
  3415. Assessment Update: Tatuaje Anarchy
  3416. News: Leccia White Begins Shipping, Black Close Behind
  3417. Review: Viaje Friends and Family Le Joueur | halfwheel
  3418. Serial threat on the internet
  3419. Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys - Slashdot
  3420. Out of Your Password Minder - YouTube
  3421. Verizon Fingers China
  3422. TSA Tables Plan To Allow Knives On Planes
  3423. US Air Force beats off competition in NSA hacking fight The Register
  3424. Twitter may introduce two-step authentication after recent hacking incidents
  3425. Adobe's first CSO sets security of hosted services as top priority
  3426. Self-Proclaimed LulzSec Leader Arrested In Australia
  3427. Australian police arrest senior member of LulzSec hacking group
  3428. Self-Proclaimed LulzSec Leader Arrested In Australia
  3429. Australia hacking 'leader' charged
  3430. 'Self-Proclaimed' Leader Of LulzSec Arrested
  3431. Australia charges man claiming to be LulzSec leader
  3432. Australian police arrest alleged leader of LulzSec hacking group
  3433. Australia charges man claiming to be LulzSec leader
  3434. The Problem of Redaction | Restricted Data
  3435. 10 tips to secure funding for a security program
  3436. Sitecom routers backdoor account
  3437. Oracle critical patch plugs 128 security vulns
  3438. CCE to NIST 800-53 Reports
  3439. CCI to NIST 800-53 Reports
  3440. CCE Mapping to NIST 800-53 Chapters
  3441. CCI Mapping to NIST 800-53 Chapters
  3442. Windows Password and Account Audits by Asset
  3443. Google Chrome OS detection
  3444. Google Chrome OS < 26.0.1410.57 Multiple Security Vulnerabilities
  3445. ABB RTU560 Substation Automation detection
  3446. EnergyICT RTU device detection
  3447. Indas Web Scada device detection
  3448. Moxa Scada device detection
  3449. SoftPLC Scada device detection
  3450. Mac OS X : Safari < 6.0.4 SVG File Handling Arbitrary Code Execution
  3451. Oracle Java JDK / JRE / SE Multiple Vulnerabilities (April 2013 CPU)
  3452. Windows 7/8 metadata download
  3453. Cerb Detection
  3454. Lenovo ThinkPad Bluetooth with Enhanced Data Rate Detection
  3455. Cerb Multiple Vulnerabilities
  3456. Lenovo ThinkPad Bluetooth with Enhanced Data Rate Arbitrary DLL Injection Code Execution Vulnerability
  3457. MantisBT 1.2.x < 1.2.14 adm_config_report.php Multiple Parameter XSS
  3458. Cisco AnyConnect Secure Mobility Client 2.x / 3.x < 3.1(3103) Host Scan Multiple Vulnerabilities
  3459. IBM Rational ClearQuest 7.1.x < 7.1.2.10 Web Client XSS (credentialed check)
  3460. What is the Real Cost of Security?
  3461. Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail ReadWrite
  3462. top-5-mistakes.jpg 8004,068 pixels
  3463. When Offense and Defense Become One
  3464. Kali Linux review and a brief history of the BackTrack pentesting distro
  3465. iPhone Pen Testing Tools without Jailbreaking
  3466. Time To Dump Antivirus As Endpoint Protection?
  3467. Popular home routers contain critical security vulnerabilities
  3468. Twitter's recipe for security awareness
  3469. Microsoft Pulls Back Patch After Crashing PCs
  3470. Thousands Of WordPress Accounts Hit In Dictionary Attack
  3471. Air Force reclassification of cyber tools as weapons sparks speculation
  3472. Introduction to SecurityCenter Continuous View
  3473. CIS Linux and Unix Dashboard
  3474. CIS SUSE Summary
  3475. CIS RHEL Summary
  3476. CIS Linux and Unix Summary
  3477. Opera < 12.15 Multiple Vulnerabilities
  3478. Flash Player <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3479. Flash Player <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3480. Asterisk Multiple Vulnerabilities (AST-2013-001 / AST-2013-002 / AST-2013-003)
  3481. GE Cimplicity HMI/SCADA server detection
  3482. Squid 3.x < 3.2.9 / 3.3.3 strHdrAcptLangGetItem Malformed Accept-Language Denial of Service
  3483. Sophos Web Protection Detection
  3484. Sophos Web Protection Appliance patience.cgi id Parameter Directory Traversal
  3485. MS13-028: Security Update for Internet Explorer (2817183)
  3486. MS13-029: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)
  3487. MS13-030: Vulnerability in SharePoint Could Allow Information Disclosure (2827663)
  3488. MS13-031: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2813170)
  3489. MS13-032: Vulnerability in Active Directory Could Lead to Denial of Service (2830914)
  3490. MS13-033: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2820917)
  3491. MS13-034: Vulnerability in Microsoft Antimalware Client Could Allow Elevation of Privilege (2823482)
  3492. MS13-035: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2821818)
  3493. MS13-036: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2829996)
  3494. MS KB2833510: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3495. Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection Denial of Service Vulnerability (cisco-sa-20130327-cce)
  3496. Cisco IOS Software Internet Key Exchange Vulnerability (cisco-sa-20130327-ike)
  3497. Cisco IOS Software IP Service Level Agreement Vulnerability (cisco-sa-20130327-ipsla)
  3498. Cisco IOS Software Network Address Translation Vulnerability (cisco-sa-20130327-nat)
  3499. Cisco IOS Software Protocol Translation Vulnerability (cisco-sa-20130327-pt)
  3500. Cisco IOS Software Resource Reservation Protocol Denial of Service Vulnerability (cisco-sa-20130327-rsvp)
  3501. Cisco IOS Software Smart Install Denial of Service Vulnerability (cisco-sa-20130327-smartinstall)
  3502. IBM InfoSphere Data Replication Dashboard Detection
  3503. IBM InfoSphere Data Replication Dashboard Default Credentials
  3504. IBM InfoSphere Data Replication Dashboard User Enumeration
  3505. IBM InfoSphere Data Replication Dashboard Unpassworded User Enumeration
  3506. Asterisk SIP SDP Buffer Overflow (AST-2013-001)
  3507. Asterisk HTTP Content-Length Header DoS (AST-2013-002)
  3508. Asterisk SIP Channel Driver Username Disclosure (AST-2013-003)
  3509. MediaWiki 1.19 < 1.19.4 / 1.20 < 1.20.3 Multiple Vulnerabilities
  3510. MediaWiki mwdoc-filter.php Arbitrary File Access
  3511. mnoGoSearch Detection
  3512. mnoGoSearch search.cgi QUERY_STRING Parameter Parsing Arbitrary File Access
  3513. Adobe AIR 3.x <= 3.6.0.6090 Multiple Vulnerabilities (APSB13-11)
  3514. Flash Player <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3515. Adobe AIR for Mac 3.x <= 3.6.0.6090 Multiple Vulnerabilities (APSB13-11)
  3516. Flash Player for Mac <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3517. Shockwave Player <= 12.0.0.112 Multiple Vulnerabilities (APSB13-12)
  3518. MongoDB Detection
  3519. MongoDB Web Interface Detection
  3520. Novell Identity Manager Role Based Provisioning Module Detection
  3521. Novell Identity Manager Role Based Provisioning Module Unspecified Vulnerability
  3522. Citrix Access Gateway Administrative Web Interface Default Credentials
  3523. Citrix Access Gateway User Web Interface Detection
  3524. Citrix Access Gateway 5.x < 5.0.4.223524 Unspecified Security Bypass
  3525. A Sweet Script to Dump Keys from Wlan Profiles - Post Exploitation (or Regular Use)
  3526. Hackers Guide to Stay out of Jail 2: Dos and Donts
  3527. Anatomy of an exploit - Linksys router remote password change hole
  3528. Is Education Key to Closing the Door on Hackers?
  3529. U.S. Air Force designates six cyber tools as weapons
  3530. Porn Sites Pose Growing Malware Risk
  3531. Hackers could start abusing electric car chargers to cripple the grid, researcher says
  3532. Vulnerabilities in aircraft systems allow remote airplane hijacking, researcher says
  3533. SSH an ill-managed mess says SSH author Tatu Ylonen
  3534. Exploits By Platform
  3535. FIX client LOGON detection
  3536. FIX client PGP LOGON detection
  3537. FIX Server Detection
  3538. FIX Server LOGON detection
  3539. Varnish Cache Detection
  3540. PostgreSQL < 8.3.23 / 8.4.16 / 9.0.12 / 9.1.8 / 9.2.3 Denial of Service
  3541. PostgreSQL < 8.3.23 Multiple Vulnerabilities
  3542. PostgreSQL < 8.4.17 Multiple Vulnerabilities
  3543. PostgreSQL < 9.0.13 Multiple Vulnerabilities
  3544. PostgreSQL < 9.1.9 / 9.2.4 Multiple Vulnerabilities
  3545. Gallery Detection
  3546. Gallery < 3.0.5 Multiple Vulnerabilities
  3547. Piwigo Detection
  3548. Piwigo install.php dl Parameter Traversal Arbitrary File Access
  3549. Core FTP < 2.2 build 1769 Multiple Buffer Overflows
  3550. Microsoft Windows Portable Devices
  3551. VNC Server Unencrypted Communication Detection
  3552. Default Password (facepunch) for 'chronos' Account
  3553. Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3554. Firefox 19.x Multiple Vulnerabilities (Mac OS X)
  3555. Thunderbird 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3556. Thunderbird ESR 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3557. Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities
  3558. Firefox 19.x Multiple Vulnerabilities
  3559. Mozilla Thunderbird 17.x < 17.0.5 Multiple Vulnerabilities
  3560. Mozilla Thunderbird ESR 17.x < 17.0.5 Multiple Vulnerabilities
  3561. SeaMonkey 2.16.x Multiple Vulnerabilities
  3562. AMI Firmware Source Code, Private Key Leaked | threatpost
  3563. Command Injection Tips: Leveraging Command-line Kung Fu with nslookup
  3564. Bitcoin-mining malware enslaves computers
  3565. Veracode Predicts Rise of "Everyday Hacker"
  3566. Parking Ticket Firm Exposes Private Information
  3567. Fake Twitter Followers Becomes Multimillion Dollar Business
  3568. Upgrading a router with impeccable soldering skills
  3569. How to Dress Like a Cyber Warrior OR Looking Like a Tier-Zero Hero
  3570. How Attackers Choose Which Vulnerabilities To Exploit
  3571. 'Arrested Development' to debut on Netflix on May 26
  3572. Advanced Persistent Threats get more advanced, persistent and threatening
  3573. Report: Nearly 94% Of Endpoints Running Java Are Vulnerable To Exploit | Security Bistro
  3574. Cisco IOS Patching: Defense and Offense | Didier Stevens
  3575. RaiderSec: Introducing dumpmon: A Twitter-bot that Monitors Paste-Sites for Account/Database Dumps and Other Interesting Content
  3576. Passpat - DigiNinja
  3577. Cybersh** just got real
  3578. Many Amazon S3 cloud storage users are exposing sensitive company secrets, claims report |
  3579. 0xdabbad00.com Blog Archive Windows Hardening Guide
  3580. Digital cameras easily turned into spying devices, researchers prove
  3581. Three reasons you shouldn't neglect your application security
  3582. Got Attitude?
  3583. Thousands of paroled CA sex offenders, felons easily disable GPS monitors
  3584. Brace for more mega-DDoS attacks, security experts warn
  3585. Samba 4.x < 4.0.4 AD DC File Permissions
  3586. RealPlayer for Mac < 12.0.1.1738 Heap Buffer Overflow Vulnerability
  3587. RealPlayer for Windows < 16.0.1.18 Heap Buffer Overflow Vulnerability
  3588. GLBA Malicious Code Prevention Compliance
  3589. Novell Messenger Client Detection (Mac OS X)
  3590. Novell Messenger Client Detection
  3591. Novell Messenger Client Import Command Remote Code Execution
  3592. Apple OS X Profile Manager Device Management Private Interface Managed Device Enumeration
  3593. Eye-Fi Helper Detection
  3594. Eye-Fi Helper < 3.4.23 Directory Traversal
  3595. Stunnel Detection
  3596. Stunnel 4.21 - 4.54 Multiple Vulnerabilities
  3597. Google Chrome < 26.0.1410.43 Multiple Vulnerabilities
  3598. MS KB2819682: Security Updates for Microsoft Windows Store Applications
  3599. Viscosity VPN Client Detection (Mac OS X)
  3600. Viscosity ViscosityHelper Symlink Attack Local Privilege Escalation
  3601. Viscosity VPN Client Detection
  3602. Git Repository Served by Web Server
  3603. Patch Management: Tivoli Endpoint Manager Get Installed Packages
  3604. GD Star Rating Plugin for WordPress export.php Authentication Bypass Information Disclosure
  3605. MariaDB 5.5 < 5.5.28 Multiple Vulnerabilities
  3606. MariaDB 5.5 < 5.5.30 Multiple Vulnerabilities
  3607. MySQL 5.1 < 5.1.68 Multiple Vulnerabilities
  3608. MySQL 5.5 < 5.5.30 yaSSL Buffer Overflow
  3609. VMSA-2013-0004 : VMware ESXi security update for third party library
  3610. ISC BIND 9 libdns Regular Expression Handling DoS
  3611. McAfee Vulnerability Manager Detect
  3612. McAfee Vulnerability Manager cert_cn Parameter XSS
  3613. Oracle Java JRE Universally Enabled
  3614. Oracle Java JRE Enabled (Google Chrome)
  3615. Oracle Java JRE Enabled (Mozilla Firefox)
  3616. Oracle Java JRE Enabled (Opera)
  3617. Oracle Java JRE Enabled (Internet Explorer)
  3618. Ubuntu low-mem install for VMs
  3619. Passcode lock can be bypassed in iOS 6.1.3 as well
  3620. Remember Your Helmet
  3621. Critical Flaw Threatens Millions of BIND Servers
  3622. Too Scared To Scan
  3623. Oz states count cars using Bluetooth
  3624. Network security study reveals 26,000 undetected malware samples
  3625. Whoops! Tiny Bug In NetBSD 6.0 Code Ruins SSH Crypto Keys
  3626. Security-Bug Rating System Gets A Makeover
  3627. Securosis Blog | Identifying vs. Understanding Your Adversaries
  3628. The World Has No Room For Cowards Krebs on Security
  3629. A Penetration Tester's Pledge
  3630. T-Mobile Wi-Fi Calling Security Analysis
  3631. Cisco switches to weaker hashing scheme, passwords cracked wide open | Ars Technica
  3632. Spy-Pi: Do you trust your laptop docking stations?
  3633. Detection of FTP client over non-standard port
  3634. Apple iOS < 6.1.3 Multiple Vulnerabilities
  3635. GLBA Section 501 (b) Host Configuration Auditing Compliance
  3636. Windows Wireless SSID Detection
  3637. GLBA Malicious Code Prevention
  3638. Samsung Kies < 2.5.0.12094_27_11 Multiple ActiveX Control Vulnerabilities
  3639. Foxit Advanced PDF Editor Installed
  3640. Foxit Advanced PDF Editor 3.x < 3.0.4.0 Security Cookie Stack-based Buffer Overflow
  3641. PHP-Fusion Authenticate.class.php Multiple Cookie SQL Injection
  3642. PHP-Fusion forum/viewthread.php highlight Parameter XSS
  3643. HP LaserJet Pro Printers Unauthorized Data Access
  3644. RealPlayer for Windows < 16.0.1.18 MP4 Heap-Based Buffer Overflow
  3645. Unsupported Novell NetWare Operating System
  3646. Apple iOS < 6.1.3 Multiple Vulnerabilities
  3647. Honeywell Multiple Products HscRemoteDepoy.dll ActiveX Control Arbitrary Code Execution
  3648. ClamAV < 0.97.7 Multiple Vulnerabilities
  3649. Foscam Detection
  3650. Foscam 11.37.2.x < 11.37.2.49 Directory Traversal
  3651. Were All Weev Now!
  3652. Botnet Business Booming - Dark Reading
  3653. 300 UK domains pilfered, massive security lapse blamed
  3654. US military boffins seek bulletproof Wi-Fi network - IT News from V3.co.uk
  3655. Would a 3D-printed gun really be legal?
  3656. Researcher sets up illegal 420,000 node botnet for IPv4 internet map
  3657. Cisco slip puts hardware at risk
  3658. HIPAA 45 CFR 164.308 and 312 Summary
  3659. HIPAA Monitoring Report
  3660. Microsoft Windows Unquoted Service Path Enumeration
  3661. Indicators
  3662. HIPAA Monitoring Summary
  3663. HIPAA Monitoring
  3664. Wipe the drive! Stealthy Malware Persistence - Part 2, (Thu, Mar 14th)
  3665. Security Appliances Are Riddled with Serious Vulnerabilities, Researcher Says - CIO.com
  3666. Schneier on Security: Security Theater on the Wells Fargo Website
  3667. Virtual Patching Cheat Sheet - OWASP
  3668. North Korea's Internet returns after 36-hour outage
  3669. Honeypot for phony waterworks gets hammered on Internet
  3670. CCTV hack takes casino for $33 MILLION in poker losses
  3671. Google, Mozilla, and Apple made the most vulnerable software of 2012
  3672. Reuters staffer accused of aiding hackers
  3673. Huawei 3G/4G USB sticks put users' security at risk
  3674. Skype can be intercepted by intelligence agencies
  3675. U.S. National Vulnerability Database Hacked
  3676. Apple not ready to kill OS X Snow Leopard yet
  3677. Tenable Network Security: MSCM Microsoft Server 2012 Domain...
  3678. Tenable Network Security: Tenable CIS Microsoft Internet Explorer...
  3679. Tenable Network Security: CIS Microsoft Windows Server 2012...
  3680. Tenable CSO praises APT1 report as a standard for information sharing
  3681. PHP 5.4.x < 5.4.12 Multiple Vulnerabilities
  3682. Flash Player <= 10.3.183.67 / 11.6.602.171 Multiple Vulnerabilities (APSB13-09)
  3683. Google Chrome < 25.0.1364.160 WebKit Type Confusion Code Execution
  3684. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3685. Mac OS X : Safari < 6.0.3 Multiple Vulnerabilities
  3686. Apt Updater Detection
  3687. CoDeSys Gateway Service Detection (SCADA)
  3688. CoDeSys Gateway Service Failed Login Detection (SCADA)
  3689. CoDeSys Gateway Service Unprotected (SCADA)
  3690. Mac OS X 10.8 < 10.8.3 Multiple Vulnerabilities (Security Update 2013-001)
  3691. PHP 5.3.x < 5.3.22 Multiple Vulnerabilities
  3692. PHP 5.4.x < 5.4.12 Multiple Vulnerabilities
  3693. airVision NVR path Parameter Traversal Arbitrary File Access
  3694. LogAnalyzer asktheoracle.php query Parameter XSS
  3695. Scrutinizer < 10.1.2 Multiple Vulnerabilities
  3696. KSplice : Installed Patches
  3697. Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution
  3698. Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution
  3699. Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution
  3700. Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution
  3701. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3702. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3703. Jenkins Detection
  3704. Jenkins < 1.498 / 1.480.2 Unspecified Master Cryptographic Key Information Disclosure
  3705. Jenkins < 1.502 / 1.480.3 Multiple Vulnerabilities
  3706. Insecure Windows Service Permissions
  3707. Foswiki Detection
  3708. Foswiki < 1.1.8 MAKETEXT Macro Arbitrary Code Injection
  3709. Ruby ftpd Gem filename Parameter Remote Command Execution
  3710. Malicious Process Detection: User Defined Malware Running
  3711. PDF-XChange Viewer < 2.5 Build 208 JPEG Processing Buffer Overflow
  3712. Novell ZENworks Mobile Management Detection
  3713. Novell ZENworks Mobile Management MDM.php Local File Inclusion
  3714. IBM Data Studio Detection
  3715. IBM Data Studio 3.1 / 3.1.1 Help System Multiple Vulnerabilities
  3716. EXCLUSIVE: Hacked ABC website likely breached by crooks in 2011 | Risky Business
  3717. Secure Development: Must-Do Or Money Pit?
  3718. Hot security skills of 2013 - PC Advisor
  3719. Yahoo Mail Users Still Getting Hacked Despite Vulnerability Fixes : The Droid Guy
  3720. Security cameras continue to pose snooping risk - IT News from V3.co.uk
  3721. Al Qaeda Document on Avoiding Drone Strikes
  3722. D-Link fixes router vulnerabilities very quietly
  3723. Tenable Network Security Named as SC Magazine's 2013 Excellence Award Winner for Best Enterprise Security Solution
  3724. Tenable Network Security Selects Ingram Micro as U.S. Distribution Partner
  3725. Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow (SCADA)
  3726. Ecava IntegraXor Server Login Attempt (SCADA)
  3727. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1)
  3728. Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilites
  3729. Apache 2.4 < 2.4.4 Multiple Cross-Site Scripting Vulnerabilites
  3730. Windows Update Detection
  3731. Detection of User Login
  3732. Flash Player <= 10.3.183.63 / 11.6.602.168 Multiple Vulnerabilities (APSB13-08)
  3733. TWiki < 5.1.4 MAKETEXT Variable Tilde Character Command Injection
  3734. Bugzilla < 3.6.13 / 4.0.10 / 4.2.5 / 4.4rc2 Multiple Vulnerabilities
  3735. Bugzilla show_bug.cgi id Parameter XSS
  3736. Apache 2.4 < 2.4.4 Multiple Cross-Site Scripting Vulnerabilities
  3737. WordPress Poll Plugin poll_id Parameter SQL Injection
  3738. WP Symposium Plugin for WordPress symposium_groups_functions.php gid Parameter SQL Injection
  3739. Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities
  3740. Buffalo LinkStation Detection
  3741. Buffalo LinkStation Direct Request Remote File Disclosure
  3742. Flash Player <= 10.3.183.63 / 11.6.602.168 Multiple Vulnerabilities (APSB13-08)
  3743. Flash Player for Mac <= 10.3.183.61 / 11.6.602.167 Multiple Vulnerabilities (APSB13-08)
  3744. MS KB2819372: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3745. VMware Fusion 4.1 < 4.1.4 / 5.0 < 5.0.2 VMCI Privilege Escalation (VMSA-2013-0002)
  3746. VMware View 4.x < 4.6.2 / 5.x < 5.1.2 VMCI Privilege Escalation (VMSA-2013-0002)
  3747. VMware Workstation 8.x < 8.0.5 / 9.x < 9.0.1 VMCI Privilege Escalation (VMSA-2013-0002)
  3748. SSHD libkeyutils Backdoor
  3749. MoinMoin < 1.9.6 Multiple Vulnerabilities
  3750. MoinMoin rsslink() Function page_name Parameter XSS
  3751. MariaDB 5.1 < 5.1.67 Multiple Vulnerabilities
  3752. MariaDB 5.2 < 5.2.14 Multiple Vulnerabilities
  3753. MariaDB 5.3 < 5.3.12 Multiple Vulnerabilities
  3754. MariaDB 5.5 < 5.5.29 Multiple Vulnerabilities
  3755. MyBB < 1.6.9 Multiple Vulnerabilities
  3756. Nuance PDF Reader Installed
  3757. Nuance PDF Viewer Plus Installed
  3758. Drupal 7.x < 7.20 On-Demand Image Derivative Generation Handling Resource Exhaustion DoS
  3759. W3 Total Cache Plugin for WordPress Cache File Direct Request Information Disclosure
  3760. A Vulnerability Disclosure Game Changer - Dark Reading
  3761. Banged-up Brit hacker hacks into his OWN PRISON'S MAINFRAME
  3762. Sinkholes reveal more Chinese-hacked biz - and piggybacking crims The Register
  3763. Latest Java Zero-Day Shares Connections with Bit9 Security Incident | Symantec Connect Community
  3764. HTML5 Web Storage loophole can be abused to fill hard disks with junk data
  3765. How I Hacked Facebook OAuth To Get Full Permission On Any Facebook Account (Without App "Allow" Interaction) | Nir Goldshlager Web Application Security Blog
  3766. ISC Diary | SSHD rootkit in the wild
  3767. 2 More Java Zero-Day Vulnerabilities Emerge
  3768. RSA: Lawyers eschew "self-defence" hacking - IT News from V3.co.uk
  3769. Black hat greed reducing software vulnerability report rate
  3770. Vint Cerf: 'The internet of things needs to be locked down'
  3771. Why Patching Your Software Matters!
  3772. Anonymous leaks 'Bank of America secrets' in spy revenge hack The Register
  3773. PostgreSQL 8.3 < 8.3.23 / 8.4 < 8.4.16 / 9.0 < 9.0.12 / 9.1 < 9.1.8 / 9.2 < 9.2.3 Denial of Service
  3774. Pidgin < 2.10.7 Multiple Vulnerabilities
  3775. Siemens SIMATIC RF-MANAGER Detection
  3776. Siemens SIMATIC RF-MANAGER KeyHelp.ocx Buffer Overflow
  3777. Prizm Content Connect default.aspx document Parameter Remote File Inclusion
  3778. ImpressPages cm_group Parameter Remote PHP Code Execution
  3779. Malicious Process Detection: APT1 Software Running
  3780. APT1-Related SSL Certificate Detected
  3781. Adobe ColdFusion Authentication Bypass (APSB13-03)
  3782. Nagios XI 2011R1.9 Multiple SQL Injection Vulnerabilities
  3783. Mac OS X : Java for Mac OS X 10.6 Update 13
  3784. Mac OS X : Java for OS X 2013-001
  3785. EMC Data Protection Advisor CXML Service Detection
  3786. EMC Data Protection Advisor Web UI Detection
  3787. EMC Data Protection Advisor Web UI Directory Traversal
  3788. Oracle Application Express (Apex) Detection
  3789. Oracle Application Express (Apex) Version Detection
  3790. Oracle Application Express (Apex) Administration Interface is Accessible
  3791. Oracle Application Express (Apex) CVE-2008-4005
  3792. Oracle Application Express (Apex) CVE-2009-0981
  3793. Oracle Application Express (Apex) CVE-2009-1993
  3794. Oracle Application Express (Apex) CVE-2010-0892
  3795. Oracle Application Express (Apex) CVE-2010-0076
  3796. Oracle Application Express (Apex) CVE-2011-3525
  3797. Oracle Application Express (Apex) CVE-2012-1708
  3798. Oracle Application Express (Apex) Unspecified Issues (pre 2.2.1)
  3799. Oracle Application Express (Apex) Unspecified Issues (pre 3.0.1)
  3800. Oracle Application Express (Apex) Unspecified Issues (pre 3.1)
  3801. Asterisk Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)
  3802. Firefox ESR 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3803. Firefox 18.x Multiple Vulnerabilities (Mac OS X)
  3804. Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3805. Thunderbird ESR 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3806. Firefox ESR 17.x < 17.0.3 Multiple Vulnerabilities
  3807. Firefox 18.x Multiple Vulnerabilities
  3808. Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities
  3809. Mozilla Thunderbird ESR 17.x < 17.0.3 Multiple Vulnerabilities
  3810. SeaMonkey 2.15.x Multiple Vulnerabilities
  3811. Microsoft SQL Server Unsupported Version Detection
  3812. Adobe Acrobat < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07)
  3813. Adobe Reader < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07)
  3814. Adobe Reader < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07) (Mac OS X)
  3815. Malicious Process Detection: Malware Signed By Stolen Bit9 Certificate
  3816. Cisco Prime LAN Management Solution Web Detection
  3817. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1)
  3818. VMSA-2013-0003 : VMware vCenter Server, ESXi and ESX address an NFC Protocol memory corruption and third party library security issues.
  3819. Google Chrome < 25.0.1364.97 Multiple Vulnerabilities
  3820. Terminal Services Use SSL/TLS
  3821. Oracle Java SE Multiple Vulnerabilities (Feb 2012 CPU) (Unix)
  3822. Oracle Java SE Multiple Vulnerabilities (June 2012 CPU) (Unix)
  3823. Oracle Java SE Multiple Vulnerabilities (October 2012 CPU) (Unix)
  3824. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU) (Unix)
  3825. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1) (Unix)
  3826. Symantec Encryption Desktop Detection
  3827. Symantec Encryption Desktop Local Access Elevation of Privilege Vulnerabilities
  3828. Siemens SIMATIC RF-MANAGER Detection (SCADA)
  3829. Asterisk Peer Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)
  3830. Mozilla Firefox 18.x <= 18 Multiple Vulnerabilities
  3831. Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities
  3832. Google Chrome < 25.0.1364.97 Multiple Vulnerabilities
  3833. SeaMonkey < 2.16 Multiple Vulnerabilities
  3834. mDNS Client Queries
  3835. MAC change detection (SNMP)
  3836. Nessus Configuration & Compliance Auditing
  3837. Tenable Network Security Receives 5-Star Rating from SC Magazine
  3838. More Wi-Fi devices with security holes
  3839. Attribution Delivers Questionable Security Value
  3840. VMware promises better security, considers scheduled patches
  3841. Rid yourself of Adobe: New Firefox 19.0 gets JAVASCRIPT PDF viewer
  3842. Twitter's Response To The Burger King Hacking: Do A Better Job At Protecting Your Password
  3843. BlackBerry warns of TIFF vulnerability that could allow malware to run on enterprise servers
  3844. Frosty attack on Android encryption
  3845. Security experts say zombie TV warning exposes flaws
  3846. Linux, Windows, and security FUD
  3847. MantisBT 1.2.x < 1.2.13 Multiple Vulnerabilities
  3848. MantisBT < 1.2.12 Multiple Vulnerabilities
  3849. Cisco ASA 5500 Series SSH Timeout DoS
  3850. Gallery Plugin for WordPress load Parameter Remote File Inclusion
  3851. php-Charts url.php Remote PHP Code Execution
  3852. VMware vSphere Client Memory Corruption (VMSA-2013-0001)
  3853. IBM Tivoli Storage Manager Client 6.3 < 6.3.1.0 / 6.4 < 6.4.0.1 Unauthorized Access
  3854. IBM Tivoli Storage Manager Client Denial of Service
  3855. MS13-009: Security Update for Internet Explorer (2792100)
  3856. MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2797052)
  3857. MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution (2780091)
  3858. MS13-013: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution (2784242)
  3859. MS13-014: Vulnerability in NFS Server Could Allow Denial of Service (2790978)
  3860. MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege (2800277)
  3861. MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778344)
  3862. MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2799494)
  3863. MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service (2790655)
  3864. MS13-019: Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege (2790113)
  3865. MS13-020: Vulnerability in OLE Automation Could Allow Remote Code Execution (2802968)
  3866. Netstat Connection Information
  3867. Adobe AIR 3.x <= 3.5.0.1060 Buffer Overflow (APSB13-05)
  3868. Flash Player <= 10.3.183.51 / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3869. Flash Player <= 10.3.183.51 / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3870. Adobe AIR for Mac 3.x <= 3.5.0.1060 Multiple Vulnerabilities (APSB13-05)
  3871. MS KB2805940: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3872. MS13-012: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2809279)
  3873. OpenSSL 1.0.1 < 1.0.1e Information Disclosure
  3874. Shockwave Player <= 12.0.0.112 Multiple Vulnerabilities (APSB13-06)
  3875. Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow
  3876. HP LeftHand Virtual SAN Appliance < 10.0 hydra Service Multiple Remote Code Execution Vulnerabilities (version check)
  3877. Joomla! 2.5.x < 2.5.9 / 3.0.x < 3.0.3 Multiple Information Disclosure Vulnerabilities
  3878. VMSA-2013-0001 : VMware vSphere security updates for the authentication service and third party libraries
  3879. VMSA-2013-0002 : VMware ESX, Workstation, Fusion, and View VMCI privilege escalation vulnerability
  3880. Adobe Acrobat <= 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSA13-02)
  3881. Adobe Reader <= 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSA13-02)
  3882. Consumers support a federal cybersecurity policy, survey says
  3883. Americans Willing to Spend More to Thwart Cyber Attacks: Survey
  3884. Flash Player <= 10.3.183.51 / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3885. Flash Player <= 10.3.183.50 / 11.5.502.146 Multiple Vulnerabilities (APSB13-04)
  3886. 10 ways to reduce security headaches in a BYOD world
  3887. Document Metadata Cleaner strips personally identifiable metadata from your files
  3888. Unlocking Ma Bell: How Phone Phreaks Came To Be
  3889. It's Now Illegal to Unlock Your Cellphone - ABC News
  3890. Bizarre Google search bug benefits porn websites | Naked Security
  3891. Hacked US TV Channels report zombie apocalypse has begun
  3892. Two Jokers Social Engineer their way into the Superbowl
  3893. IOActive Labs Research: The Anatomy of Unsecure Configuration: Reality Bites
  3894. One in three PCs are infected with malware
  3895. Bit9 hacked after it forgot to install ITS OWN security product
  3896. 'Let anyone be administrator' bug in VMware snapped shut
  3897. Tenable Network Security: Windows Server 2012 Best Practice Audit...
  3898. Patch management in a world of IPv6 IT resources
  3899. Windows OS Version Information
  3900. Email Attachment Detection (client)
  3901. Barracuda Networks device detection
  3902. Barracuda Spam Firewall version detection
  3903. Oracle Java SE 7 <= Update 11 Multiple Vulnerabilities (February 2013 CPU)
  3904. Samba 3.x < 3.5.21 / 3.6.12 and 4.x < 4.0.2 SWAT Multiple Vulnerabilities
  3905. Apple TV < 5.2 Multiple Vulnerabilities
  3906. Ekiga < 4.0.0 Invalid UTF-8 Character Connection Data Parsing DoS
  3907. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU)
  3908. Samba < 3.5.21 / 3.6.12 / 4.0.2 SWAT Multiple Vulnerabilities
  3909. WordPress < 3.5.1 Multiple Vulnerabilities
  3910. WordPress xmlrpc.php pingback.ping Server-Side Request Forgery
  3911. Collector Component for Joomla! index.php File Upload Arbitrary Code Execution
  3912. Novell GroupWise Client 8.x < 8.0.3 Hot Patch 2 / 2012.x < 2012 SP1 Hot Patch 1 Multiple Vulnerabilities
  3913. Mac OS X : Java for Mac OS X 10.6 Update 12
  3914. HP Diagnostics Server Default Credentials
  3915. HP Data Protector Unsupported
  3916. Mac OS X : OS X Server < 2.2.1 Multiple Vulnerabilities
  3917. Hunt CCTV DVR.cfg Direct Request Information Disclosure
  3918. LogAnalyzer userchange.php viewid Parameter XSS
  3919. RuggedOS < 3.12.1 Web UI Multiple Security Vulnerabilities
  3920. Incapsula Component for Joomla! token Parameter Multiple XSS
  3921. UnrealIRCd Unspecified DoS
  3922. Anatomy of a bug how Mac OS X chokes if you say FILE | Naked Security
  3923. 48th Largest Prime Number Discovered
  3924. Joy of Tech: Vine
  3925. A Gift For Hackers [Video]
  3926. Federal Reserve confirms its Web site was hacked
  3927. Improve your security in four easy but rarely implemented steps
  3928. China is world's most malware-ridden nation
  3929. Critical bug threatens hospital systems
  3930. Tenable Network Security: DISA STIG Microsoft Windows 8 Audit
  3931. U.S. Navy sees 110K cyber attacks every hour: Tenable Network Securitys take on White House EO on cybersecurity
  3932. Apple iOS < 6.1 Multiple Vulnerabilities
  3933. Opera < 12.13 Multiple Vulnerabilities
  3934. Barracuda Appliances Default Credentials
  3935. GRAND Flash Album Gallery Plugin for WordPress f Parameter Traversal Arbitrary Directory Enumeration
  3936. Default Password (raspberry) for 'pi' Account
  3937. Default Password (openelec) for 'root' Account
  3938. Default Password (raspi) for 'root' Account
  3939. MySQL Protocol Remote User Enumeration
  3940. Uploader Plugin for WordPress File Upload Arbitrary Code Execution
  3941. Apple iOS < 6.1 Multiple Vulnerabilities
  3942. ViArt Shop sips_response.php DATA Parameter Request Parsing Remote Shell Command Execution
  3943. Patch Management Windows Auditing Conflicts
  3944. Patch Management Auditing Satisfied
  3945. Schneider Electric Interactive Graphical SCADA System dc.exe Unspecified Buffer Overflow
  3946. Schneider Electric Interactive Graphical SCADA System (IGSS) Unsupported Version
  3947. Opera < 12.13 Multiple Vulnerabilities
  3948. Wireshark 1.6.x < 1.6.13 Multiple Vulnerabilities
  3949. Wireshark 1.8.x < 1.8.5 Multiple Vulnerabilities
  3950. Cisco VPN Client Unsupported
  3951. Joomla! 2.5.x < 2.5.7 Multiple XSS
  3952. HP Communities - Twitter attacked - Catches, stops attack-in-progre... - Enterprise Business Community
  3953. 86,800 network printers open to the whole internet is one of them yours? | Naked Security
  3954. The Physical Security Factor With Cloud Providers
  3955. Android malware uses your PC's own mic to record you
  3956. Oracle blocks security hole with quick, hot 'n' premature Java update
  3957. Suicidal Sensors: Darpa Wants Next-Gen Spy Hardware to Literally Dissolve | Danger Room | Wired.com
  3958. VMware Management Interface - A Little Story of XSS
  3959. Hackers Hijacking Security Cameras for Malware and Spying
  3960. Web smut sites are SAFER than search engines, declares Cisco The Register
  3961. Chinese hackers break into the New York Times, steal every employees password
  3962. Kali Linux A Teaser into the Future.
  3963. Hacker 'sextorted' 350 women into stripping off after stealing embarrassing pictures
  3964. UPnP scan shows 50 million network devices open to packet attack The Register
  3965. Great Firewall architects fingered for GitHub attack The Register
  3966. Tenable Network Security: Tivoli Enterprise Manager Server and...
  3967. PSA: Dont upload your important passwords to GitHub | Ars Technica
  3968. Scripts and Picks: Command Execution on Shoretel Mobility Router
  3969. RaiderSec: Wireless "Deauth" Attack using Aireplay-ng, Python, and Scapy
  3970. Hackers drop rogue Apache modules and SSH backdoors on web servers
  3971. Anons hack Asteroids into US DoJ website in Swartz death protest
  3972. 'Cyber 9/11' may be on horizon, Homeland Security chief warns
  3973. Oracle will continue to bundle 'crapware' with Java
  3974. Avoid the Landmine That is Hacking Back
  3975. Introduction to the Nessus Vulnerability Scanner
  3976. PHP 5.3.x < 5.3.21 cuRL X.509 Certificate Domain Name Matching MiTM Weakness
  3977. PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  3978. Google Chrome < 24.0.1312.56 Multiple Vulnerabilities
  3979. MySQL Server 5.1.x < 5.1.67 Multiple Vulnerabilities
  3980. MySQL Server 5.5.x < 5.5.29 Multiple Vulnerabilities
  3981. Windows 8 App Store Access
  3982. Windows 8 App Store Download Detected
  3983. Windows 8 Tile Services Detection
  3984. Horde IMP js/compose-dimp.js XSS
  3985. MoinMoin twikidraw.py Traversal File Upload Arbitrary File Overwrite
  3986. Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities
  3987. MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) (uncredentialed check)
  3988. Cisco ASA 1000V H.323 Inspection DoS
  3989. Google Chrome < 24.0.1312.56 Multiple Vulnerabilities
  3990. Oracle VM VirtualBox Core Subcomponent < 4.0.18 / 4.1.24 / 4.2.6 Local Issue
  3991. VMware View Agent Detection
  3992. VMware View Server Detection
  3993. VMware View Server Unsupported Version Detection
  3994. VMware View Multiple Vulnerabilities (VMSA-2012-0004)
  3995. VMware View Server Directory Traversal Vulnerability (VMSA-2012-0017)
  3996. Samsung Kies SyncService ActiveX PrepareSync() Buffer Overflow
  3997. Google Doc Embedder Plugin for WordPress File Parameter Traversal Arbitrary File Disclosure
  3998. NetIQ Privileged User Manager regclnt.dll Directory Traversal
  3999. Adobe ColdFusion Unspecified DoS (APSB12-21) (credentialed check)
  4000. Adobe ColdFusion Unspecified Sandbox Bypass (APSB12-26) (credentialed check)
  4001. Drupal 6.x < 6.28 / 7.x < 7.19 Multiple Vulnerabilities
  4002. Floating Social Media Links Plugin for WordPress wpp Parameter Remote File Inclusion
  4003. WebYaST Host Modification MiTM
  4004. Portable phpMyAdmin Plugin for WordPress wp-pma-mod Authentication Bypass
  4005. Adobe ColdFusion 10 on IIS Unspecified DoS (APSB12-25) (credentialed check)
  4006. Browser Rejector Plugin for WordPress wppath Parameter Remote File Inclusion
  4007. Forums Plugin for WordPress url Parameter Arbitrary File Disclosure
  4008. Incentives and Decision Making
  4009. Apple's Skimpy Software Update Descriptions
  4010. Backdoors Found in Barracuda Networks Gear
  4011. How LinkedIn's "Hacker-In-Residence" Transformed An Ordinary Job Into A "Dream Job"
  4012. Computer firm hires Montreal student accused of hacking them
  4013. Twitter Flaw Exposes Direct Messages To Third-Party Applications
  4014. Exploiting printers via Jetdirect vulnerabilities viaForensics
  4015. Is Dell looking to kill PCs with "Project Ophelia"?
  4016. Canadian Student Expelled After Finding Critical Flaw in Software Used by Colleges
  4017. What's lurking in your network? Find out by decrypting SSL
  4018. Bad parking job? Text the driver through the license plate
  4019. Linksys vuln: Cisco responds
  4020. 'End of passwords' predictions are premature - Cambridge boffin
  4021. Mozilla Firefox 17.x <= 17 Multiple Vulnerabilities
  4022. Mozilla SeaMonkey 2.x <= 2.14 Multiple Vulnerabilities
  4023. Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities
  4024. PCI Configuration Settings Report
  4025. 800-53 Configuration Auditing
  4026. DISA Control Correlation Identifier (CCI) Dashboard
  4027. PCI Configuration Settings
  4028. Firefox 10.x < 10.0.12 Multiple Vulnerabilities
  4029. Firefox 10.x < 10.0.12 Multiple Vulnerabilities (Mac OS X)
  4030. Firefox 17.x < 17.0.1 Multiple Vulnerabilities
  4031. Firefox 17.x < 17.0.1 Multiple Vulnerabilities (Mac OS X)
  4032. Firefox 17.x < 17.0.2 Multiple Vulnerabilities
  4033. Firefox 17.x < 17.0.2 Multiple Vulnerabilities (Mac OS X)
  4034. Firefox 17.x Multiple Vulnerabilities
  4035. Firefox 17.x Multiple Vulnerabilities (Mac OS X)
  4036. Mozilla Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities
  4037. Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities
  4038. SeaMonkey 2.14.x Multiple Vulnerabilities
  4039. Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities (Mac OS X)
  4040. Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities (Mac OS X)
  4041. Cerberus FTP Server < 5.0.4.0 SSH DES Cipher Weakness
  4042. Cerberus FTP Server < 5.0.5.0 Cross-Site Request Forgery
  4043. Cerberus FTP Server < 5.0.6.0 Multiple XSS
  4044. Samba 4.x < 4.0.1 AD DC LDAP Directory Objects Security Bypass
  4045. Nagios Core history.cgi Multiple Parameter Buffer Overflow
  4046. MySQL 5.5 < 5.5.29 Multiple Vulnerabilities
  4047. Windows OS Partial Product Key (WMI)
  4048. Windows Product Key Retrieval
  4049. PHP 5.3.x < 5.3.21 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  4050. PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  4051. Oracle Database, January 2013 Critical Patch Update
  4052. Disable Java in your browsers now | usability | security | freedom
  4053. Whistleblower sheds light on global zero day exploit market
  4054. Security Researchers Expose Bug In Medical System Used With X-ray Machines, Other Devices
  4055. Microsoft vows to improve security tools after failed evaluation
  4056. Verizon Business Security Blog Blog Archive Case Study: Pro-active Log Review Might Be A Good Idea
  4057. China Mobile Users Warned About Large Botnet Threat
  4058. US Plants Hit By USB Stick Malware Attack
  4059. Bug Bounty Packet Storm
  4060. Homeland Security still advises disabling Java, even after update
  4061. Remote zero-day hole found in Linksys routers - Networking - Technology - News - iTnews.com.au
  4062. Hackers claim new air traffic system can be hijacked RT
  4063. Juniper Junos J-Web URL Encoding Heap Buffer Overflow (PSN-2013-01-807)
  4064. Juniper Junos PIM Join Flood DoS (PSN-2013-01-808)
  4065. Oracle Java SE 7 < Update 11 Multiple Vulnerabilities
  4066. MS13-008: Security Update for Internet Explorer (2799329)
  4067. Happy Out of Cycle IE Patch Monday
  4068. AV Really dead now says security expert
  4069. All Your Base Are In an Indeterminate State - Dark Reading
  4070. Tenable Network Security: Windows and OS X SSID Reporting and...
  4071. Tracking Wireless SSIDs Using Nessus
  4072. VLC Media Player < 2.0.5 Multiple Vulnerabilities
  4073. Red Hat Satellite Server Communication Channel Detection - Server-Side
  4074. Google Chrome < 24.0.1312.52 Multiple Vulnerabilities
  4075. Oracle Java SE 7 <= Update 10 Remote Code Execution
  4076. Flash Player <= 10.3.183.48 / 11.5.502.135 Buffer Overflow (APSB13-01)
  4077. NVIDIA Display Driver Service Remote Stack Buffer Overflow (credentialed check)
  4078. MS KB2796096: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  4079. Adobe Acrobat < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02)
  4080. Adobe AIR 3.x <= 3.5.0.880 Buffer Overflow (APSB13-01)
  4081. Adobe AIR for Mac 3.x <= 3.5.0.890 Buffer Overflow (APSB13-01)
  4082. Adobe Reader < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02)
  4083. Adobe Reader < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02) (Mac OS X)
  4084. Flash Player <= 10.3.183.48 / 11.5.502.135 Buffer Overflow (APSB13-01)
  4085. Flash Player for Mac <= 10.3.183.48 / 11.5.502.136 Buffer Overflow (APSB13-01)
  4086. Fun with AIX Shellcode and Metasploit
  4087. Ipad Extra Screen
  4088. Carving Station RAR Files | M-unition
  4089. What Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!, (Thu, Jan 10th)
  4090. $17,000 Linux-powered rifle brings auto-aim to the real world | Ars Technica
  4091. Does Your Company Actually Need a Security Department?
  4092. WordPress Pingback Portscanner Metasploit Module
  4093. 2012: Over and Done With.
  4094. Airing Out Security's Dirty Laundry - Dark Reading
  4095. The merger of cellular and Wi-Fi: The wireless network's future
  4096. Your friendly Huawei at CES: Complete with uniformed security
  4097. 5 tough security questions (and tips on answering them)
  4098. Kill that Java plugin now! New 0-day exploit running wild online
  4099. SSL Certificate Chain Contains Illegitimate TURKTRUST Intermediate CA
  4100. Does Your Alarm Have a Default Duress Code?
  4101. Pointless observation on snow removal and InfoSec
  4102. Biggest Problem in Computer Security | ITauditSecurity
  4103. Top email terms used by corporate fraudsters published by FBI
  4104. Researcher sidesteps Microsoft fix for IE zero-day
  4105. Silent Skype calls can hide secret messages
  4106. Why Hackers Are So Much Funnier Than You Are
  4107. Flash Player <= 10.3.183.43 / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  4108. iPhone App Install Detected
  4109. Opera < 12.12 Multiple Vulnerabilities
  4110. Netsuite Client Detection
  4111. Instagram Upload Activity Detected
  4112. Real Networks RealPlayer < 16.0.0.282 Multiple Vulnerabilities
  4113. Flash Player <= 10.3.183.29 / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4114. MySQL Server 5.1 < 5.1.63 Multiple Vulnerabilities
  4115. Squid 2.x / 3.x < 3.1.22 / 3.2.4 / 3.3.0.2 cachemgr.cgi DoS
  4116. Advanced Custom Fields Plugin for WordPress acf_abspath Parameter Remote File Inclusion
  4117. Citrix XenDesktop Virtual Desktop Agent USB Redirection Propagation Handling Access Restriction Bypass (CTX135813)
  4118. Drupal 6.x < 6.27 / 7.x < 7.18 Multiple Vulnerabilities
  4119. IBM Rational ClearQuest 7.1.x < 7.1.2.9 Multiple Vulnerabilities (credentialed check)
  4120. VMSA-2012-0018 : VMware security updates for vCSA and ESXi
  4121. Snare Agent for Linux > 1.7.0 / 2.0.0 Multiple Vulnerabilities
  4122. Novell iPrint Client < 5.82 Remote Code Execution
  4123. Novell eDirectory 8.8.x Multiple Security Vulnerabilities
  4124. Citrix XenApp XML Service Interface Crafted Packet Parsing Remote Code Execution (CTX135066)
  4125. Mac OS X Wireless Networks List
  4126. PostgreSQL 8.3 < 8.3.18 Multiple Vulnerabilities
  4127. MS KB2794220: Vulnerability in Internet Explorer Could Allow Remote Code Execution
  4128. MS KB2798897: Unauthorized Digital Certificates Could Allow Spoofing
  4129. VLC < 2.0.5 Multiple Vulnerabilities
  4130. Zero day holes found in popular online games | HITBSecNews
  4131. Ban on demanding Facebook passwords among new 2013 state laws | Reuters
  4132. Security flaw found in app used for 'safe sexting'
  4133. NYC mayor pins crime rate spike on iPhone, iPad theft The Register
  4134. Hacker at Public Works went unnoticed for days, documents show | canada.com
  4135. Facebook Patches Webcam Vulnerability After Receiving Hacker Tip - Bloomberg
  4136. Best Book Bejtlich Read in 2012
  4137. Microsoft Rushes Out Fix It For Internet Explorer 0-day Exploit
  4138. Security Researcher Compromises Cisco VoIP Phones With Vulnerability - Dark Reading
  4139. c0decstuff: Defeating Windows 8 ROP Mitigation
  4140. Metasploit: 5 Tips to Ensure Safe Penetration T... | SecurityStreet
  4141. Celebrity hacker gets ten years
  4142. HTTPS Everywhere for Internet Explorer
  4143. Naked Scarlett Johansson pic snatch bloke gets 10 YEARS The Register
  4144. Apple addresses another Wi-Fi bug with iOS 6.0.2 update
  4145. Adobe to patch 2-year-old Shockwave vulnerability next year
  4146. Top 10 gadgets for Christmas 2012- The Inquirer
  4147. Making Database Security Your No. 1 2013 Resolution
  4148. VMware patches 'critical' vulnerability
  4149. Top 12 IT Security Stories of 2012
  4150. Abusing SAP Servers - SpiderLabs Anterior
  4151. Soldier of Fortran IBM Mainframe User Enumeration and Bruteforcing
  4152. Security and Networking - Blog - Should We Exploit Every Vulnerability to Prove itExist?
  4153. Shoulder Surfing The Friendly Skies | CSO Blogs
  4154. Tenable Network Security: New CIS MySQL 4.1/5.1 Audit Policies
  4155. Google Chrome < 23.0.1271.97 Multiple Vulnerabilities
  4156. MS12-077: Cumulative Security Update for Internet Explorer (2761465)
  4157. Google Chrome < 23.0.1271.97 Multiple Vulnerabilities
  4158. MS KB2785605: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  4159. MS12-078: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2783534)
  4160. MS12-079: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642)
  4161. MS12-080: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2784126)
  4162. MS12-081: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2758857)
  4163. MS12-082: Vulnerability in DirectPlay Could Allow Remote Code Execution (2770660)
  4164. MS12-083: Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)
  4165. Adobe AIR 3.x <= 3.5.0.600 Multiple Vulnerabilities (APSB12-27)
  4166. Flash Player <= 10.3.183.43 / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  4167. Adobe AIR for Mac 3.x <= 3.5.0.600 Multiple Vulnerabilities (APSB12-27)
  4168. Ektron CMS XslCompiledTransform Class Request Parsing Remote Code Execution
  4169. Flash Player for Mac <= 10.3.183.43 / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  4170. HP Intelligent Management Center User Access Manager Datagram Parsing Code Execution
  4171. IBM Lotus Symphony < 3.0.1 Fix Pack 2 Multiple Vulnerabilities
  4172. MarkAny Content SAFER ActiveX Arbitrary Download and Execution
  4173. MediaWiki < 1.18.6 / 1.19.3 / 1.20.1 Multiple Vulnerabilities
  4174. Cisco Wireless LAN Controller Flaw Permits Cross-Site Request Forgery Attacks
  4175. Hacker nabs Yahoo! site backups
  4176. Samsung devices vulnerable to dangerous Android exploit
  4177. WOW! Paypal Sends Me 5000$ For A Command Execution Vulnerability | Learn How To Hack - Ethical Hacking and security tips
  4178. No, Executing Offensive Actions Against Our Adversaries Really Does Have High Risk (Deal With It)
  4179. Lock maker starts to pay for hackable lock fixes
  4180. Botnet hidden in the Tor network
  4181. My 5 Top Ways to Escalate Privileges
  4182. Offensive security for dummies
  4183. Top Mobile Vulnerabilities And Exploits Of 2012
  4184. Samsung's Smart TVs Wide Open To Exploits
  4185. 10 Security Stories That Shaped 2012
  4186. Hacking bazaar ExploitHub gets hacked, database leaked
  4187. NetIQ Privileged User Manager ldapagnt_eval() Function Remote Code Execution
  4188. NetIQ Privileged User Manager Password Change Authentication Bypass
  4189. ISC BIND 9 DNS64 Handling DoS
  4190. Microsoft Windows Unquoted Service Path Enumeration
  4191. But did she STEAL the iPhone? App takes photo of woman trying to unlock it
  4192. Amazon.com: The Personal Internet Address & Password Log Book (9781441303257): Peter Pauper Press: Books
  4193. Rethinking the Computer at 80 - NYTimes.com
  4194. Proxmark 3, now with more Android - SpiderLabs Anterior
  4195. Ira Winkler: Stupid users, or stupid infosec?
  4196. No password is safe from this new 25-GPU computer cluster
  4197. GhostShell hackers release 1.6 million NASA, FBI, ESA accounts
  4198. freeFTPd / freeSSHd SFTP Authentication Bypass
  4199. iPhone Thief Photographs Herself Using Stolen Phone
  4200. Tenable Network Security: New CIS VMware ESX Audit Policy
  4201. Tenable Network Security: New CIS SQL Server 2008 R2 Audit...
  4202. Apache Tomcat 7.0.x < 7.0.32 CSRF Filter Bypass
  4203. RWCards Component for Joomla! mosConfig_absolute_path Parameter Remote File Inclusion
  4204. FreeSWITCH Route Header Value Handling DoS
  4205. ManageEngine Security Manager Plus 'f' Directory Traversal Arbitrary File Access
  4206. Carnal0wnage & Attack Research Blog: On Sophistication
  4207. Why is outcome based security monitoring so critical with Big Data?
  4208. Tectia SSH Server Authentication Bypass
  4209. DHCPv6 server detection
  4210. DHCPv6 client detection
  4211. Direct Attack Path Analysis
  4212. Email hacks router - The H Security: News and Features
  4213. US woman arrested for bank robbery brags on YouTube about robbing a bank
  4214. Forget Disclosure Hackers Should Keep Security Holes to Themselves | Wired Opinion | Wired.com
  4215. DARPA Looks For Backdoors, Malware In Tech Products
  4216. Rumble in the Tumblr: Troll-worm infected thousands of blogs
  4217. FreeSSHD Remote Authentication Bypass
  4218. Simple Nomad Locates John McAfee Through Smartphone Photo
  4219. Buffalo Linkstation Privilege Escalation
  4220. cPanel Unspecified Flaws Have Unspecified Impact - SecurityTracker
  4221. Microsoft Windows Mounted Devices
  4222. NEOHAPSIS - Peace of Mind Through Integrity and Insight
  4223. Belkin wireless routers weak key
  4224. The Hackback Debate | Steptoe Cyberblog
  4225. Prince William photos accidentally reveal RAF password | Naked Security
  4226. Backdoor found in Piwik analytics software - Update - The H Security: News and Features
  4227. Yahoo XSS exploits going for $700
  4228. ENISA promotes digital hacker traps
  4229. Mobile browser vulnerability lets hackers steal cloud computing time
  4230. Top 5 Security Predictions for 2013 from ISF
  4231. Geek Researcher Spends Three Years Living With Hackers
  4232. US software firm hacked for years after suing China
  4233. US-CERT: Samsung Printer Firmware Contains Backdoor
  4234. IBM Rational Developer for System z Discloses SSL Certificate Password to Local Users
  4235. Symantec Mail Security Autonomy Verity Keyview Filter Vulnerabilities (SYM12-018)
  4236. Symantec Messaging Gateway 9.5.x Multiple Vulnerabilities (SYM12-018)
  4237. RT < 3.8.15 / 4.0.8 Multiple Vulnerabilities
  4238. Wordfence Plugin for WordPress email Parameter XSS
  4239. Google Chrome < 23.0.1271.91 Multiple Vulnerabilities
  4240. VMware vCenter Data Collection
  4241. VMware vCenter SOAP API Settings
  4242. IrfanView < 4.35 Multiple Heap-Based Buffer Overflows
  4243. Samsung printers contain hidden, hard-coded management account
  4244. Antivirus software a waste of money for businesses, report suggests
  4245. The cybersecurity needs of the borderless enterprise
  4246. Thanksgiving SCADA Bug Hunt
  4247. What you don't know about passwords might hurt you
  4248. Hotel blames burglaries on hacked Onity card locks
  4249. Exploitable Systems Report
  4250. Opera < 12.11 Multiple Vulnerabilities
  4251. Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service
  4252. Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple Security Weaknesses
  4253. Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities
  4254. IOServer XML Server URI Directory Traversal Arbitrary File Access
  4255. Novell Sentinel Log Manager Web Detection
  4256. Novell Sentinel Log Manager Authentication Bypass
  4257. SSL Certificate Signed with the Compromised Fortigate Key
  4258. Bugzilla < 3.6.12 / 4.0.9 / 4.2.4 / 4.4rc1 Multiple Vulnerabilities
  4259. Dell OpenManage Server Administrator omalogin.html DOM-based XSS
  4260. IBM WebSphere Application Server 8.5 < Fix Pack 1 Multiple Vulnerabilities
  4261. Wing FTP Server Multiple ZIP Commands Parsing Remote DoS
  4262. Novell File Reporter Agent FSFUI UICMD 126 Arbitrary File Download
  4263. Opera < 12.11 Multiple Vulnerabilities
  4264. Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service
  4265. Apache Tomcat 5.5.x < 5.5.36 DIGEST Authentication Multiple Security Weaknesses
  4266. Apache Tomcat 6.0.x < 6.0.36 Multiple Vulnerabilities
  4267. Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple Security Weaknesses
  4268. NetIQ Privileged User Manager Default Admin Password
  4269. NetIQ Privileged User Manager Password Change Authentication Bypass
  4270. NetIQ Privileged User Manager ldapagnt_eval() Function Remote Code Execution
  4271. Firefox 10.x < 10.0.11 Multiple Vulnerabilities (Mac OS X)
  4272. Firefox 16.x Multiple Vulnerabilities (Mac OS X)
  4273. Thunderbird 10.x < 10.0.11 Multiple Vulnerabilities (Mac OS X)
  4274. Thunderbird 16.x Multiple Vulnerabilities (Mac OS X)
  4275. Firefox 10.x < 10.0.11 Multiple Vulnerabilities
  4276. Firefox 16.x Multiple Vulnerabilities
  4277. Mozilla Thunderbird 10.x < 10.0.11 Multiple Vulnerabilities
  4278. Mozilla Thunderbird 16.x Multiple Vulnerabilities
  4279. SeaMonkey 2.13.x Multiple Vulnerabilities
  4280. Proxying 3G iPhone Data
  4281. Report: Apple's AuthenTec sells embedded security division - The H Security: News and Features
  4282. New 64-bit Linux Rootkit Doing iFrame Injections
  4283. Children should be at least 13 years old to use Internet: Poll - Computer Business Review
  4284. Researchers warn of 'Cool' exploit platform - IT News from V3.co.uk
  4285. Malware Made Which Can Share A Smartcard Over The Internet
  4286. Facebook to roll out HTTPS by default to all users
  4287. Hackers break into FreeBSD with stolen SSH key
  4288. The convergence of biological and computer viruses | TechRepublic
  4289. HoneyDrive Honeypots In A Box
  4290. Hardcoded passwords leave Telstra routers wide open - Networks - SC Magazine Australia - Secure Business Intelligence
  4291. Obama signs secret directive to help thwart cyberattacks - The Washington Post
  4292. Technical Support - Welcome to Huawei.com
  4293. ircmaxell's blog: Anatomy of an Attack: How I Hacked StackOverflow
  4294. HTTP Pass the Hash with Python Neohapsis Labs
  4295. VMInjector - DLL Injection tool to unlock guest VMs | SECFORCE :: Blog
  4296. Owning Computers Without Shell Access | Accuvant
  4297. Rebootuser VulnVoIP (Vulnerable VoIP) The Fundamentals of VoIP Hacking
  4298. 6 Ways Big Data is Helping Reinvent Enterprise Security
  4299. QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)
  4300. Liferay Portal 6.1.0 / 6.1.10 Arbitrary File Deletion
  4301. MySQL 5.0.95 MyISAM Table Symbolic Link Local Restriction Bypass
  4302. Symantec Legacy Decomposer Code Execution (SYM12-017)
  4303. VMSA-2012-0016 : VMware security updates for vSphere API and ESX Service Console
  4304. CoSoSys Endpoint Protector 4 Predictable Password
  4305. Freestyle Support Portal Component for Joomla! prodid Parameter SQL Injection
  4306. Freestyle Testimonials Component for Joomla! Unspecified SQL Injection
  4307. MS12-073: Vulnerabilities in Microsoft IIS Could Allow Information Disclosure (2733829) (uncredentialed check)
  4308. WebSphere MQ 6.x < 6.0.2.9 / 7.x < 7.0.1.1 'userid' and 'password' Information Disclosure
  4309. EMC NetWorker Module for Microsoft Applications 2.2.x / 2.3.x < 2.3 build 122 / 2.4.x < 2.4 build 375 Multiple Vulnerabilities
  4310. Sophos Anti-Virus < 10.0.9 / 10.2.1 Multiple Vulnerabilities
  4311. Sophos Anti-Virus for Mac Multiple Vulnerabilities
  4312. Security Debt and Vulnerability Supply Chains
  4313. Awareness: Top 10 Reasons Security Awareness Efforts Fail
  4314. Tech Insight: Better Defense Through Open Source Intelligence - Dark Reading
  4315. 5 ways to avoid pulling a Petraeus
  4316. Google app bug cancels Christmas, December
  4317. Hackers obtained access to FreeBSD servers
  4318. Infamous Hacker Heading Chinese Antivirus Firm?
  4319. Hakin 9 Cross Site Scripting
  4320. How tweets about your sick cat threaten our security health | ZDNet
  4321. Twitter unintentionally resets thousands of passwords
  4322. Adobe confirms customer data breach
  4323. Cybersecurity bill fails in U.S. Senate - Computerworld
  4324. For Sale: Cheap access to corporate computers
  4325. Skype fixes e-mail security flaw
  4326. Enterprises can obtain value from red teaming exercises, expert says
  4327. NASA to deploy whole-disk encryption following breach
  4328. Tenable Network Security: Auditing Check Point GAiA Configuration...
  4329. Tenable Network Security: Auditing Juniper Junos Configuration...
  4330. Tenable Network Security: New CIS Debian Linux Audit Policy
  4331. Google Chrome < 23.0.1271.64 Multiple Vulnerabilities
  4332. Apple iOS < 6.0.1 Multiple Vulnerabilities
  4333. Tech Check for 11-12-12 on WYPR's Maryland Morning
  4334. Tenable Network Security Awarded Common Criteria Certification for Emerging Security Threats
  4335. Opera < 12.10 Multiple Vulnerabilities
  4336. Oracle Forms Recognition Multiple ActiveX Control Arbitrary File Overwrite Vulnerabilities
  4337. Adobe AIR 3.x <= 3.4.0.2710 Multiple Vulnerabilities (APSB12-24)
  4338. Flash Player <= 10.3.183.29 / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4339. Adobe AIR for Mac 3.x <= 3.4.0.2710 Multiple Vulnerabilities (APSB12-24)
  4340. Flash Player for Mac <= 10.3.183.29 / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4341. Google Chrome < 23.0.1271.64 Multiple Vulnerabilities
  4342. QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)
  4343. SolarWinds Orion NPM < 9.5 Login.asp Blind SQL Injection
  4344. Traq admincp/common.php authenticate() Function Authentication Bypass Remote Code Execution
  4345. Hack.me Build, Host & Share Vulnerable Web Application Code
  4346. Side-Channel Attack Steals Crypto Key from Co-Located Virtual Machines | threatpost
  4347. Apple's iOS 6.0.1 still has Wi-Fi bugs | ZDNet
  4348. ISC Diary | Cisco TACACS+ Authentication Bypass
  4349. Should the AV Industry Accept Defeat?
  4350. One in four don't clean their stinky old browsers - especially Firefoxers
  4351. Antivirus Firm Founder John McAfee Accused of Murder, Says He's Innocent
  4352. A history of hacking: Documentary captures essence of Def Con
  4353. Microsoft Updates November 2012 - IE, Kernel+Shell, and .NET Critical Patches
  4354. Most U.S. Drones Openly Broadcast Secret Video Feeds | Danger Room | Wired.com
  4355. Carnal0wnage & Attack Research Blog: The Biggest Problem in Computer Security
  4356. Microsofts security team is killing it: Not one product on Kasperskys top 10 vulnerabilities list - The Next Web
  4357. VMWare ESX Source Code Leaked On The Internet
  4358. Sophos products and Tavis Ormandy | Naked Security
  4359. Coca-Cola Was Hacked But Didnt Tell Shareholders
  4360. 1.7M mobile apps analyzed: Users tracked and put at risk, and its unjustified
  4361. Security Headers on the Top 1,000,000 Websites
  4362. Users take their time over Java and Flash updates
  4363. Network Encryption Anomalies
  4364. BigFix Client Patch Update
  4365. Mozilla SeaMonkey 2.13.x < 2.13.2 Multiple Vulnerabilities
  4366. Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities
  4367. ZABBIX Web Interface popup_bitem.php itemid Parameter SQL Injection
  4368. Temenos T24 Detection
  4369. ManageEngine OpStor Default Administrator Credentials
  4370. ManageEngine OpStor availability730.do days Parameter XSS
  4371. ManageEngine SupportCenter Plus HomePage.do fromCustomer Parameter XSS
  4372. CoDeSys PLC Runtime Service Detection
  4373. CoDeSys Authentication Bypass Directory Traversal
  4374. CoDeSys Unauthenticated Command-line Access
  4375. Oracle VM VirtualBox 3.x / 4.0.x < 4.0.10 Local Integer Overflows
  4376. Kaspersky Password Manager 5.x < 5.0.0.169 HTML Injection
  4377. Mac OS X : OS X Server < 2.1.1 Multiple Vulnerabilities
  4378. Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities
  4379. Apple iOS < 6.0.1 Multiple Vulnerabilities
  4380. CA ARCserve Backup Multiple Vulnerabilities (CA20121018) (credentialed check)
  4381. Symphony CMS Password Retrieval Script XSS
  4382. Hacking an old radar gun to interface with a laptop
  4383. Burp proxy opens Android SSL connections
  4384. Angry White Guy
  4385. Five pieces of advice for those new to the infosec industry
  4386. Halloween Tech Monsters Core Security
  4387. The Script Kiddie 5-step program
  4388. Stealing Your Neighbors Keys with a Drinking Glass
  4389. Moving to a career in IT security | Computerworld Blogs
  4390. Companies Should Think About Hacking Back Legally, Attorney Says
  4391. Huawei reaches out to critical German hacker over router flaws
  4392. Windows 8 'penetrated' says firm which sells to world's spy agencies
  4393. Research Shows Serious Problems With Android App SSL Implementations | threatpost
  4394. Security Flaws in the TSA Pre-Check System and the Boarding Pass Check System. Puckinflight
  4395. Open Security Research: Hacking KeyLoggers
  4396. Windows 8 security overview Safest Windows ever? | Naked Security
  4397. Microsoft's picture-password ad: Intriguing or confusing? | Technically Incorrect - CNET News
  4398. Your mouse may actually be a RAT in disguise
  4399. Malware hides behind the mouse
  4400. Drupal 7.x < 7.16 Multiple Vulnerabilities
  4401. Adobe Software Signed By Revoked Certificate (APSA12-01)
  4402. IPSEC Internet Key Exchange (IKE) Version 2 Detection
  4403. Internet Key Exchange (IKE) Aggressive Mode with Pre-Shared Key
  4404. Novell ZENworks Asset Management rtrlet Component GetFile_Password Method Hardcoded Credentials Information Disclosure
  4405. Juniper Junos web-authentication Policy Not Enforced (PSN-2012-10-735)
  4406. Mutiny < 4.5-1.12 Unspecified Network Interface Menu Remote Command Injection
  4407. Symantec Ghost Solution Suite Backup File Handling Memory Corruption (SYM12-016)
  4408. Exim 4.70 - 4.80 DKIM DNS Record Parsing Remote Buffer Overflow
  4409. WANem index-advanced.php XSS
  4410. IBM Rational ClearQuest Multiple Script Information Disclosure
  4411. WANem result.php pc Parameter Remote Command Execution
  4412. Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities
  4413. Firefox 16.x < 16.0.2 Multiple Vulnerabilities
  4414. Hack3rcon 3 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)
  4415. Big security on a shoe-string budget
  4416. IP theft attacks can hide on networks for years, unspotted by corporate victims, report claims
  4417. 10 steps for writing a secure BYOD policy
  4418. 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions - SecurityTracker
  4419. Hackers Steal Customer Data From Barnes And Noble Keypads
  4420. Boeing zaps PCs using CHAMP missile microwave attacks
  4421. Five Habits of Companies That Catch Insiders
  4422. Apple banishes Java from Mac browsers
  4423. Android apps get SSL wrong, expose personal data
  4424. 5 to-dos to maintain reputation after cyberattack | ZDNet
  4425. Lack of skilled security pros challenges CISOs to fill specialties
  4426. Tenable Network Security: New DISA STIG MS Office 2010 Audit...
  4427. The key to campus network security: Better risk management
  4428. Mozilla Firefox 15.x <= 15 Multiple Vulnerabilities
  4429. Mozilla SeaMonkey 2.x < 2.13 Multiple Vulnerabilities
  4430. Mozilla Thunderbird 15.x <= 15 Multiple Vulnerabilities
  4431. BigFix Server Detection
  4432. MySQL Server 5.5.x <= 5.5.27 / 5.1.x <= 5.1.65 Multiple Unspecified Vulnerabilities
  4433. Patch Management: Tivoli Endpoint Manager Report
  4434. SSL Compression Methods Supported
  4435. TLS Next Protocols Supported
  4436. RuggedCom Known Hardcoded SSL RSA Private Key
  4437. ISC BIND 9 DNS RDATA Handling DoS
  4438. TLS CRIME Vulnerability
  4439. Firefox 16.x < 16.0.1 Multiple Vulnerabilities
  4440. Mozilla Thunderbird 16.x < 16.0.1 Multiple Vulnerabilities
  4441. SeaMonkey 2.13.x < 2.13.1 Multiple Vulnerabilities
  4442. Oracle Java SE Multiple Vulnerabilities (October 2012 CPU)
  4443. Mac OS X : Java for Mac OS X 10.6 Update 11
  4444. MySQL 5.5 < 5.5.28 Multiple Vulnerabilities
  4445. Pass the Hash w/o Metasploit - Part2 - Blog - Room362.com
  4446. Week 42 in Review 2012
  4447. Incident Response in 3.08 MB
  4448. National Weather Service Hacked
  4449. The Importance of Security Awareness
  4450. Zero-day attacks last much longer than most would believe
  4451. Pacemaker hacker says worm could possibly 'commit mass murder' | Computerworld Blogs
  4452. Infographic: Top password mistakes - Computerworld
  4453. Don't secure the internet, it needs crime: Diffie | ZDNet
  4454. Web app design at the core of coding weaknesses, attacks, says expert
  4455. Public Wi-Fi hotspots pose real threat to enterprises, survey finds
  4456. Tenable Network Security: New CIS Apache Web Server 2.2 Audit...
  4457. Tenable Network Security: New CIS Solaris 11 Audit Policy
  4458. Tenable Network Security: Tenable Audit Policies - CIS Unix and...
  4459. IEC 60870-5-104 server detection
  4460. Flash Player <= 11.4.402.278 Multiple Vulnerabilities (APSB12-22)
  4461. #1 Nessus is an Enterprise Tool - Top Ten Things You Didn't Know About Nessus
  4462. Analyzing Nessus Virus Detections with the Log Correlation Engine
  4463. Analyzing Nessus Detected Malicious Processes Activity with the Log Correlation Engine
  4464. MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319)
  4465. MS12-065: Vulnerability in Microsoft Works Could Allow Remote Code Execution (2754670)
  4466. MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517)
  4467. MS12-067: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution (2742321)
  4468. MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2724197)
  4469. MS12-069: Vulnerability in Kerberos Could Allow Denial of Service (2743555)
  4470. MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege (2754849)
  4471. MS KB2661254: Update For Minimum Certificate Key Length
  4472. Adobe AIR 3.x <= 3.4.0.2540 Multiple Vulnerabilities (APSB12-22)
  4473. Flash Player <= 10.3.183.23 / 11.4.402.278 Multiple Vulnerabilities (APSB12-22)
  4474. Wireshark 1.8.x < 1.8.3 Multiple Vulnerabilities
  4475. Windows Phone7 < 7.10.8107 Out-of-Date SSL Certificate Blacklist
  4476. Former LulzSec member pleads guilty to conspiracy in Sony Pictures hack
  4477. Rise In U.S. Hacker Attacks Against China
  4478. Security Monitoring An Elixir For Intrusion Costs? - Dark Reading
  4479. Master Keys
  4480. Never Attribute to Malice, but Always Verify
  4481. Majority of SMBs Have No Security Policies or Contingency Plans
  4482. Facebook Confirms Researcher Collected Countless Phone Numbers
  4483. Security Manager's Journal: I hired a hacker - Computerworld
  4484. Exploiting a MIPS Stack Overflow | /dev/ttyS0
  4485. Apple's Combined Patching
  4486. How Your #Naked Pictures Ended Up on the Internet
  4487. The Security-Conscious Uncle
  4488. No homecoming queen vote if you don't wear RFID tag?
  4489. Hacker wins $60,000 prize for breaking into Google Chrome
  4490. Firefox 16 pulled offline following security flaw find
  4491. Mobile Brings a New Dimension to the Enterprise Risk Equation
  4492. Reporting Mistakes
  4493. James Bond's Dry Erase Marker: The Hotel PenTest Pen - SpiderLabs Anterior
  4494. HP Communities - CISO Concerns - Security vs. Usability, Affordabil... - Enterprise Business Community
  4495. Foursquare app on an Apple iOS mobile device
  4496. Slacker application music streaming leaking information
  4497. Slacker application music streaming on an Android mobile device
  4498. Slacker application music streaming on an Apple iOS mobile device
  4499. Debate: Flame, Stuxnet and other APTs are hype, but still be wary
  4500. SumatraPDF < 2.1 Multiple Vulnerabilities
  4501. Flexera ISGrid ActiveX Control Remote Code Execution Vulnerabilities
  4502. IBM WebSphere Application Server 7.0 < Fix Pack 25 Multiple Vulnerabilities
  4503. Novell GroupWise WebAccess 8.x < 8.0.3 Multiple Cross-Site Scripting Vulnerabilities
  4504. WordPress A Page Flip Book Plugin for WordPress pageflipbook_language Parameter Local File Inclusion
  4505. RSA Authentication Client 3.5 < 3.5.6 Local Authentication Bypass
  4506. Magnum MNS-6K Hardcoded Admin Account
  4507. Symantec Enterprise Vault < 10.0.2 Multiple Vulnerabilities in Oracle Outside-In Libraries (SYM12-015)
  4508. Network Monitoring As A Security Tool - Dark Reading
  4509. Bing is the most heavily poisoned search engine, study says The Register
  4510. What is Scaring Businesses the Most? Spear-phishing.
  4511. In a Zero-Day World, Its Active Attacks that Matter
  4512. Could your phone's camera be secretly taking pictures right now? Hackers can use your lens to steal private data - and build up a 3D model of your home | Mail Online
  4513. How millions of DSL modems were hacked in Brazil, to pay for Rio prostitutes | Naked Security
  4514. Tiny Evil Maid CHKDSK Utility Can Steal Passwords | threatpost
  4515. JSON Hijacking Demystified - SpiderLabs Anterior
  4516. Email Address Harvesting
  4517. "Report: Counterfeit electronic parts multiplying at record rate from Sterling"
  4518. Scientific Linux Systems Summary
  4519. Scientific Linux Systems Summary
  4520. CVSS Scoring by Asset
  4521. Tenable enters partnership with In-Q-Tel
  4522. Sugarsync 'Cloud' Backup Service Detection
  4523. Accessing iTunes Store on an Apple iOS device
  4524. Apple iOS < 6.0 Multiple Vulnerabilities
  4525. Browsing Cydia software packages
  4526. Google Chrome < 22.0.1229.79 Multiple Vulnerabilities
  4527. ZEN Load Balancer global.conf Information Disclosure
  4528. MediaWiki index.php uselang Parameter XSS
  4529. DB2 10.1 < Fix Pack 1 Multiple Vulnerabilities
  4530. Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability (cisco-sa-20120926-dhcpv6)
  4531. Foxit Reader < 5.4.3 fxdecod1.dll Path Subversion Arbitrary DLL Injection Code Execution
  4532. Poweradmin index.php XSS
  4533. Pen testers should broaden scope, focus more on people, expert says
  4534. Students will be doing vulnerability tests on security products at Iowa State University's new lab
  4535. Researcher says 100,000 passwords exposed on IEEE site
  4536. Millions of DSL modems hacked in Brazil
  4537. Is antivirus dead? Startup launches first 'exploit blocking' program
  4538. Security Intelligence Starts With Detecting The Weird - Dark Reading
  4539. BBC News - Android phone 'wipeout' security flaw exposed
  4540. iOS 6 already on 60 percent of iPhones in North America
  4541. Hackers leak 120,000 student records in raid on world's top unis
  4542. Internet Explorer Users: Please Read This
  4543. Compliance Lessons from Lance The New School of Information Security
  4544. Tenable Network Security: Auditing Open Ports on Windows.
  4545. Your BMW can be stolen by any idiot with a $30 hacking kit | Naked Security
  4546. Technology News: Security: Hacker Claims Old-School Tactic Brought GoDaddy to Its Knees
  4547. Users told: Get rid of Internet Explorer (again)
  4548. Microsoft offers workarounds for IE bug
  4549. Romanians Plead Guilty To Credit Card Hack On US Subway Shops Packet Storm
  4550. Sneak Peek at SecurityCenter 4.6
  4551. Tenable Network Security: New PostgreSQL 9.1 Audit Policies
  4552. Remote Access
  4553. VMware ESXi / vSphere Analysis
  4554. JustCloud 'Cloud' Backup Service Detection
  4555. Apache 2.2 < 2.2.23 Multiple Vulnerabilities
  4556. iTunes < 10.7 Multiple Vulnerabilities
  4557. Real Networks RealPlayer < 15.0.6.14 Multiple Vulnerabilities
  4558. Sprint TV app on Android mobile devices
  4559. MS Skydrive 'Cloud' Backup Service Detection
  4560. Carbonite 'Cloud' Backup Service Detection
  4561. Foursquare app on an Android mobile device
  4562. Microsoft Visual Studio Team Foundation Server Detection (Credentialed Check)
  4563. MS12-061: Vulnerability in Visual Studio Team Foundation Server Could Allow Elevation of Privilege (2719584)
  4564. MS12-062: Vulnerability in System Center Configuration Manager Could Allow Elevation of Privilege (2741528)
  4565. MS 2736233: Update Rollup for ActiveX Kill Bits (2736233)
  4566. SolarWinds Orion NPM < 10.3.1 Multiple Vulnerabilities
  4567. ISC BIND Assertion Error Resource Record RDATA Query Parsing Remote DoS
  4568. WebSphere MQ 7.1 < 7.1.0.1 MQ SVRCONN Channels Security Configuration Bypass
  4569. XnView < 1.99.1 JPEG Compressed TIFF Image Multiple Header Value Handling Overflow
  4570. LogAnalyzer index.php highlight Parameter XSS
  4571. MDaemon WorldClient < 12.5.7 Multiple Cross-site Scripting Vulnerabilities
  4572. Cloud Security Alliance tackles big data security
  4573. A Guide To Network Vulnerability Management - Dark Reading
  4574. Old Operating Systems Die Harder - Dark Reading
  4575. Microsoft Disrupts Nitol Botnet in Piracy Sweep
  4576. Blackhole Exploit Kit updates to 2.0
  4577. Domino's Pizza says website hacked
  4578. More SSL trouble, (Thu, Sep 13th)
  4579. Apple unveils redesigned iPhone 5 with 4-inch display, 4G LTE
  4580. Google helps close 163 security vulnerabilities in iTunes
  4581. Antivirus programs often poorly configured, study