Rapid7 has many tools like metasploit a software that runs many exploits against a target machine. “It is the world’s most used penetration testing software”. the hackers are…
Is there a weak link? Is your firewall all patched up? Does it have the latest firmware? Are all ports closed that should be closed?…
Malwarebytes has a good FAQ about the Heartbleed problems we have posted in our own Blog on Oversitesentry as well. Essentially there are online tools (LastPass) to…
First of all, there are many ways a system can become vulnerable, we will not look at the malicious or badly configured machines. We will…
Wired had an article a while ago (January 6th 2014) To understand the problem, you need to understand the embedded systems market. The problem is the…
By “casing” can also be called enumeration, where the hacker reviews what type of systems that you have on the Internet. It is the first…
PCISecurityStandards.org has a website and it’s response to the Target Data breach: “As part of this security effort, the Council maintains that adherence to and maintenance of…
Dark Reading has an interesting article about how Target was compliant with PCI(Payment Card Industry) standards and it was not enough. The Point of Sale terminals…
On today’s Internet Storm Center Diary : Johannes noticed an odd attack coming from what turned out to be a DVR in China. This is a shape…
Unfortunately in this day, it is not enough to have a person on staff to handle your IT work, or even be in charge of…