Exploit published for SMB2 vulnerability in Windows

Tuesday, September 29th, 2009

A fully functional exploit for the security vulnerability in the SMB2 protocol implementation has been published. It can be used to discover and attack vulnerable Windows machines remotely. By integrating the exploit into the Metasploit exploit toolkit, attackers have access to a wide range of attack options, ranging from issuing ...

Facebook Privacy & Security Guide

Monday, September 28th, 2009

Created by Tom Eston. This is version 1.1 of the guide, last updated September 2009. It is updated when Facebook changes any privacy settings or configuration. Source: http://socialmediasecurity.com/security-guides/facebook/facebook_privacy_and_security_guide/

Use ants to fight worms

Monday, September 28th, 2009

To combat worms, Trojans and other malware, a team of security researchers wants to use ants. Not the actual live insects, of course, but computer programs modelled to act like ants in the way they roam a network and search for anomalies. "Ants aren't intelligent," says Glenn Fink, a senior research ...

Unauthentication

Monday, September 28th, 2009

In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated—and hopefully more secure—ways for you to prove you are who you say you are over the Internet. This ...

Metasploit Unleashed – Mastering the Framework

Monday, September 28th, 2009

This free information security training is brought to you in a community effort to promote awareness and raise funds for underprivileged children in East Africa. Through a heart-warming effort by several security professionals, we are proud to present the most complete and in-depth open course about the Metasploit Framework. http://www.offensive-security.com/metasploit-unleashed/