Quarterly VoIP Vulnerabilities

Tuesday, April 15th, 2008

While most VoIP-related vulnerabilities are posted to the VOIPSA mailing list or blog, I thought it might be useful to have a informal quarterly summary of sorts among VoIP devices per searches from NIST.  I hope folks find it helpful, and of course post comments if I’ve overlooked anything from ...

11 Critical Security Apps

Tuesday, April 15th, 2008

If you don't have security software, your PC is an Internet mugging waiting to happen. We show you the eleven best pieces of software for defending yourself against online thugs. The PC security landscape is constantly changing. Well paid, malicious programmers keep cranking out new and different attacks, and the security ...

Advice for securing your site and your reputation

Tuesday, April 15th, 2008

Is your company's Web site hacked? Today, it can be hard to tell. Online crooks who successfully break into a site often sneak in small bits of code that leave no visible trace but can attack visitors who simply view the page. In fact, according to a Websense Security Labs report, online thugs who want ...

sqlninja 0.2.2 Released – SQL Injection Tool

Tuesday, April 15th, 2008

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.  Its main goal is to provide a remote shell on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to ...

CEOs targetted by sneaky phishing scam

Tuesday, April 15th, 2008

Panos Anastassiadis didn't click on the fake subpoena that popped into his inbox on Monday morning, but he runs a computer security company. Others were not so lucky. In fact, security researchers say that thousands have fallen victim to an email scam in which senior managers such as Anastassiadis are told ...