Monday, September 7th, 2009
Protecting the management account for cloud services can be one of the most critical security points of a cloud-based solution. Arguably, the account is more important than instance and operating system security for cloud workloads. Amazon web services (AWS) has recently introduced a new feature, Amazon web services multi-factor authentication ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Sunday, June 7th, 2009
The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
Fixes:
Fixed memory & register leaks in NASL
nessus-fetch ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, June 7th, 2009
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.
New functionalities in the v 0.88 release are:
Support for the Cisco ...
Posted in Internet, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, June 7th, 2009
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, May 21st, 2009
Security experts are warning Twitter users of a new phishing scam that could lead to their accounts being compromised.
The typo-squatting site, which was discovered by Rik Ferguson, senior security advisor at Trend Micro, has been set up by phishers to look like Twitter, although the URL uses only two 't's ...
Posted in Internet, Privacy, Security | No Comments
Page 6 of 14« First«...45678...»Last »