Secure SCTP
Abstract This document explains the reason for the integration of security functionality into SCTP, and gives a short description of S-SCTP and its services. S-SCTP is fully compatible with SCTP...
View ArticleHypertext Transport Protocol (HTTP) Session Continuation: Problem Statement
Abstract One of the most often talked about problems in web security is "cookies". Web cookies are a method of associating requests with "sessions" that may have been authenticated somehow....
View ArticleHypertext Transport Protocol (HTTP) Session Continuation Protocol
Abstract One of the most often talked about problems in web security is "cookies". Web cookies are a method of associating requests with "sessions" that may have been authenticated somehow....
View ArticleAST-2012-014: Crashes due to large stack allocations when using TCP
Asterisk Project Security Advisory - AST-2012-014 Product Asterisk Summary Crashes due to large stack allocations when using TCP Nature of Advisory Stack Overflow Susceptibility Remote Unauthenticated...
View Article‘Page Security Team’ Phishing Scam Targets Facebook Page Admins
Another socially engineered phishing attack is active on Facebook and targeting Facebook Page administrators. These types of scam are ridiculously popular on Facebook. This is definitely a new twist on...
View Article3% Unemployment Among Infosec Pros?
After seven straight quarters of recording no joblessness among IT security professionals, an unpublished U.S. Bureau of Labor Statistics report suggests a small number of information security experts...
View ArticleNetwork Investigation and Analysis at the Center of Attention for Regional...
Network Investigation and Analysis has been a hot topic in Cyber Investigation, with the latest APAC cyber investigations training conference including Network Forensics as part of their training...
View ArticleThe Association of Leaders Local Civics Group Polish Site (http://sllgo.pl)...
We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to take the appropriate countermeasures to safeguard your...
View ArticleToday's NIST CVE Issuance's For Vulns In JBoss Enterprise Application...
Click on the underlined CVE for additional vuln specific infoCVE-2012-4550Summary: JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, when using role-based authorization for...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== Nessus plugins (2) ==63381...
View ArticleHalf the govt websites in India are prone to cyber attacks
Data says 774 government websites have reportedly been hacked in the last five yearsPiyali Mandal / New Delhi Jan 06, 2013, 00:23 ISTEven as the number of internet users continues to rise and the...
View ArticleVIDEO: OWASP HTTP POST DOS APACHE WEBSERVER ATTACK
Description: This Tutorials shows, how you can easily take out an Apache Webserver with one HTTP POST Tool using a std. slow DSL Connection.This is NO Slowloris Attack!Limitations of HTTP GET DDOS...
View ArticleIndian Government Wiretapping and started BlackBerry interception
According to a report, All major Indian telecom companies, including Bharti Airtel, Vodafone India and Tata Tele services, have agreed to share real-time interception of BlackBerry calls and data...
View ArticleThe HeartBeat APT Campaign
Compared to most advanced persistent threat (APT) campaigns with diverse targeted industries, the HeartBeat campaign is an isolated APT case that targets organizations within South Korea only. They...
View ArticleAirWatch Ranked as a Leader in the 2013 Aragon Research Globe for Enterprise...
ATLANTA--(BUSINESS WIRE)--AirWatch®, the global leader and innovator in mobile security and the largest Mobile Device Management (MDM) provider announces that market research firm, Aragon Research,...
View ArticleRecommended: StealthSEEK
Want control of your data?…The first step is finding itAcross large distributed file systems, it’s nearly impossible to keeptrack of the high-risk or sensitive data that is undoubtedly hiding inevery...
View ArticleHP patches printer firmware flaw, but leaves customers guessing
There's a serious security vulnerability on some HP LaserJet printers.The good news is that it's been patched. The bad news is that you don't know if your HP LaserJet printer needs the fix - because HP...
View Articlefreehackingtools24 dot com Vuln Scan
root@bt:/pentest/web/wpscan# ruby wpscan.rb -u freehackingtools24.com -e up____________________________________________________ __ _______ _____ \ \ / / __ \ / ____|...
View ArticleOPSWAT SECURITY SCORE FREE SIMPLE TOOL TO AUDIT OS SECURITY LEVEL
Tools and programs for protecting your operating system are important in a way to make you sure that you have no gap can be used by malicious software to breach your system.Today we are talking often...
View ArticleAnonymous hacks New York City water department: Changes chloride level &...
he New York City water department that deals with the health of the environmental protection of the city has been hacked in the latest attack of Anonymous. The attack was carried out on 5/1/2013.The...
View Article