CVEdetails has a list of all CVE’s This is a vulnerability that is part of the infrastructure of the Internet webservers (Apache specifically) But specifically this…
Session Hijacking is where an attacker Steals a network session by guessing (or other ways) the session ID (identification number). Each packet has a…
Malwarebytes has a good FAQ about the Heartbleed problems we have posted in our own Blog on Oversitesentry as well. Essentially there are online tools (LastPass) to…
First of all, there are many ways a system can become vulnerable, we will not look at the malicious or badly configured machines. We will…
Wired had an article a while ago (January 6th 2014) To understand the problem, you need to understand the embedded systems market. The problem is the…
By “casing” can also be called enumeration, where the hacker reviews what type of systems that you have on the Internet. It is the first…
On today’s Internet Storm Center Diary : Johannes noticed an odd attack coming from what turned out to be a DVR in China. This is a shape…
Unfortunately in this day, it is not enough to have a person on staff to handle your IT work, or even be in charge of…
When trying to login to WordPress I got this message instead: (output started at public_html/wp-content/plugins/twitter/widget_twitter_vjck.php:171) in public_html/wp-includes/pluggable.php on line 896) Which is interesting to say…
It is a good idea to get in the habit of patching your systems consistently. Not wanting to reboot is sometimes a wish of all…