Hacker attacks occur for many reasons: #1 Highest reason for an attack is to make money from the attack 8/19 Hackers hack Medical company – 4.5…
BloombergBusinessweek article 7/17/2014 a. Discusses how Russian hackers infiltrated the NASDAQ network, b. Placed malware on one of the NASDAQ webservers. c. Thus creating a classic…
Patch Tuesday is the day Microsoft has deemed to give us their vulnerability fixes. It has to be done some time and so it is…
RealclearTechnology has an interesting article (the 4 headings below is my synthesis of the article) It is based out of the Cisco projections (linked in article).…
Since we advocate testing your IT services and devices, what if your organization has cloud services? How about Amazon EC2? AWS compliance keep this in mind.…
KrebsonSecurity has the story (a good security blog) a 24 year old Viet-Nam (Ngo) national helped create a situation where data from Experian was sold…
As noted by us-cert.gov there are many methods of taking advantage of SQL injection opening in a website. The real problem is when companies don’t admit…
NVD or at the http://nvd.nist.gov/home.cfm NIST is the National Institute of Standards and Technology. NVD contains: 62145 CVE Vulnerabilities 231 Checklists 248 US-CERT Alerts…
Yes Drupal version 7.x – 3.5 now has a remote command injection vulnerability. Packetstormsecurity has a page on it. patch to the latest software (May 3rd…
Here are the CVE vulnerablities for April 2014 so far. CVE (Common Vulnerabilities and Exposure) vulnerability data are taken from National Vulnerability Database (NVD) xml feeds provided…