Tuesday, September 29th, 2009
A fully functional exploit for the security vulnerability in the SMB2 protocol implementation has been published. It can be used to discover and attack vulnerable Windows machines remotely. By integrating the exploit into the Metasploit exploit toolkit, attackers have access to a wide range of attack options, ranging from issuing ...
Posted in Internet, Networking, Security, Windows | No Comments
Monday, September 28th, 2009
Created by Tom Eston. This is version 1.1 of the guide, last updated September 2009. It is updated when Facebook changes any privacy settings or configuration.
Source:
http://socialmediasecurity.com/security-guides/facebook/facebook_privacy_and_security_guide/
Posted in Internet, Privacy, Security | No Comments
Monday, September 28th, 2009
To combat worms, Trojans and other malware, a team of security researchers wants to use ants.
Not the actual live insects, of course, but computer programs modelled to act like ants in the way they roam a network and search for anomalies. "Ants aren't intelligent," says Glenn Fink, a senior research ...
Posted in Internet, Networking, Security | No Comments
Monday, September 28th, 2009
In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated—and hopefully more secure—ways for you to prove you are who you say you are over the Internet.
This ...
Posted in Hardware, Internet, Linux, Security, Windows | No Comments
Monday, September 28th, 2009
This free information security training is brought to you in a community effort to promote awareness and raise funds for underprivileged children in East Africa. Through a heart-warming effort by several security professionals, we are proud to present the most complete and in-depth open course about the Metasploit Framework.
http://www.offensive-security.com/metasploit-unleashed/
Posted in Coding, Internet, Linux, Privacy, Security, Software, Windows | No Comments