Researcher creates proof-of-concept malware that infects BIOS, network cards |
Researcher releases exploit code that can allegedly crash pcAnywhere |
Researcher to demonstrate feature-rich malware that works as a browser extension |
Researcher: 200,000 Windows PCs vulnerable to pcAnywhere hijacking |
Researchers Build Objects With 3D Printing Using Simulated Moon Rocks |
Researchers Create Short-term Memories In Rat Brains |
Researchers Create Vomiting Robot To Analyze Contagions |
Researchers Demonstrate 3D Spy Trojan for Mobile Phones |
Researchers Devise New Attack Techniques Against SSL |
Researchers Lift Lid on Government-Distributed Cyber-Spy Trojans |
Researchers Mine Old News To Predict Future Events |
Researchers Use Lasers For Cooling |
Researchers warn of cyber flaws in Honeywell control systems |
Researching Information Security Issues |
Resistance against US cyber security act is growing |
Resolution(s) For The New Year |
Resolving erratic behavior of an Oversized PST using advanced PST File Splitter tool |
Resources: Windows Auditing & Monitoring, Linux 2FA |
Results vs. Relationships - Finding Your Balance on the Seesaw |
Reuters staffer accused of aiding hackers maintains innocence -lawyer |
Reuters staffer accused of aiding hackers maintains innocence: lawyer |
Reuters suffers double hack |
Reuters suffers second hack this month |
Revealed: Chrome Really Was Exploited At Pwnium 2013 |
Reverse Cross-Site Request (RCSR) vulnerability |
Review: Google Compute Engine |
RFC 6598 - Carrier Grade NAT |
RFC2142 is a two-way street |
RFP criteria for how to build an agile data infrastructure |
Rhombus Tech A10 EOMA-68 CPU Card Schematics Completed |
RIAA says Google piracy policies are lacking |
Rick Kelly: Value focus |
Rig Exploit Kit from the Afraidgate Campaign |
Richard III Suffered an Ignominious Burial, Researchers Find |
Risk... in the most obscure places |
Risks of boomerangs a reality in world of cyberwar |
Risks on the Rise: Making a Case for IT Disaster Recovery |
Riverbed, 6connect, Ixia Unveil New Products, Services at Interop |
Robot Learning To Recognize Itself In Mirror |
Robot Serves Up 360 Hamburgers Per Hour |
Robot Snake Could Aid Search and Rescue Operations |
Robot Snakes To Fight Cancer Via Natural Orifice Surgery |
Robotic Bartender Assembles Your Drink, Monitors Alcohol Consumption |
RockBox + Refurbished MP3 Players = Crowdsourced Audio Capture |
Rocket boffinry in pictures: Gulp the Devil's venom and light a match |
Rogue US Airways-themed emails distribute ZeuS-based malware |
Romanian authorities dismantle hacker group targeting government websites |
Romney Campaign Accidentally Launches Transition Web Site |
Rootkit Findings |
Rootkit infects Linux web servers |
Root-Level Exploit for OSX LaunchD Service |
Rough Roving: Curiosity's Wheels Show Damage |
Rover Finds Ancient Streambed On Martian Surface |
Rover Fuel Came From Russian Nuke Factory, But Supplies Running Low |
Royal Canadian Air Force Sees More Sims In the Future of Fighter Pilot Training |
RPC DCOM Update |
RPC DCOM Update: sdbot variant |
RPC DCOM WORM (MSBLASTER) |
RSA Conference 2012 sneak peek: cloud, big data, and mobile |
RSA Conference 2012: Former NSA director says secure clouds can't come fast enough |
RSA Conference 2012: Stress and burnout in infosec careers |
RSA teams to bolster security for Apple, Google, RIM devices |
rtfdump |
RuggedCom fails key management 101 on Rugged Operating System (ROS), (Tue, Aug 21st) |
Rumors about IIS 6.0 issues |
Running InfoSphere Software in a Virtual Environment without ILMT May Cost you Millions |
Russian botnet operators infected 6 million computers |
Russian Cyber Criminal Unmasked As Creator of "Most Successful" Apple Malware |
Russian EBookseller LitRes Gets Competing EBook Apps Booted From Google Play |
Russian charged with hacking into brokerage accounts |
Russian malware spies on US ATMs |
Russian start-up claims BitTorrent-killer |
Russian Univ. Launches Course Based On ReactOS Led By Alex Bragin |
Russian upstart claims BitTorrent-killer |
Russia's Former KGB Invests In Political Propaganda Spambots |
Russia-speaking cybercriminals earned $4.5 billion in 2011, researchers estimate |
s_ta_ts.js, anyone? |
Sacre Bleu! US fingered for Flame attack on Élysée Palace |
Safari 5.1.7 - an interesting feature, (Thu, May 10th) |
Safemode rootkit & DRM |
Safer Online Shopping Guide |
Samba - Buffer Overrun, HP Remote Command Execution, Top 15 Worms, Hosts File, Sasser/Dabber Activity |
Samba security patch fixes critical remote code execution hole |
Samba vulnerability, Veritas BackupExec vulnerability, PowerPoint attachments, and some light reading. |
Sample needed - of Spybot.ZIF, which scans for vulnerable Cisco Routers |
Samsung Claims iPad Mini, iPad 4, New iPod Touch Also Infringe Patents |
Samsung May Start Making ARM Server Chips |
Samsung network printer vulnerability discovered |
Samsung Opens New Apple Store In Australia |
Samsung opens new R&D facility in Nokia's backyard |
Samsung printers have secret admin account |
Samsung Unveils the Galaxy S4 |
Samsung will issue fix for security hole in printers |
Samsung: Android's Multitouch Not As Good As Apple's |
Samsung? BlackBerry? Who Will Win the Containerization Wars? |
San Diego Zoo Creates Biomimicry Incubator |
Sandia Lab Fires Up 300,000 Virtual Android Devices To Test Out Security |
SANS 2006 |
SANS Boston 2008 |
SANS Industrial Control Systems (ICS) Security Training is coming to Houston! |
SANS Institute Announces Annual Security East Training Event in New Orleans featuring SANS Technology Institute's ... |
SANS Institute to Offer World-Class Information Security and Computer Forensics Training at SANS Secure Singapore 2013 |
SANS Institute to Offer World-Class Virtualization and Private Cloud Security Training at SANS October Singapore 2012 |
SANS ISC (once again) and Microsoft - Flatten Compromised Systems |
SANS ISC presentation in Brazil |
SANS ISC Receives Award |
SANS Network Security 2007 -- Vegas |
SANS offering TREATS too. |
SANS Survey Results Announced: Mobility Policy in the Enterprise |
Sans Top 20 - 2004 - How does it compare to 2003 Top 20; Microsoft ASP.NET ValidatePath Module; IRC Botnet Servers |
SANS Top 20 Spring Update |
SANS Top 20 Update |
SANS/ISC Webcast; MS05-017 Exploit; They're Baaaaaack...; Follow the Bouncing Malware : A Fresh Bounce (Updated: 22:30 GMT) |
SANSFIRE 2006 |
SANSFIRE: Internet Storm Center Training Event |
SANS's Alan Paller discusses the threat of cyberterrorism on CNN, (Sun, Apr 28th) |
Santa IM Worm (bot) update |
Santa IM Worm |
Santy Variant?; Year End Poll |
SAP GUI DLL Loading Arbitrary Code Execution Vulnerability |
SAP NetWeaver Portal as SAP GRC 10.0 Front-End |
Saudi Arabia Blocks Viber Messaging Service |
Saudi Aramco Reveals Cyber Attack Hit 30,000 Workstations |
SAV botnet revival ? |
sav worm and its cc |
SAV Worm Update |
Save the Web From Software Patents |
SC gov. admits hacking errors; revenue chief quits |
SCADA kit has hidden factory account, password |
SCADA security is better and worse than we think |
Scammer tying in on disasters |
Scanner Identifies Malware Strains, Could Be Future of AV |
Scanning for Fortinet ssh backdoor |
Scanning tricks with scapy |
Scans for CA LM Vulnerability; MSFT Update #1: MS05-002; MSFT Update #2: MS05-015; MSFT Update #3: Malicious Software Removal Tool |
SCANS, Babel (not Bagel/Bagle/Beagle) & Halloween |
Scapy vs. CozyDuke |
Scientific American's Fred Guterl Explores the Threats Posed By Technology |
Scientists Create New Gasoline Substitute Out of Plants |
Scientists Develop Sixty Day Bread |
Scientists Growing New Crystals To Make LED Lights Better |
Scientists Inducted Into Chemistry "Hall of Fame" |
Scientists Invent Electronics That Dissolve In the Body |
Scientists Match Dream Images To Photos |
Scientists May Have Detected Neutrinos From Another Galaxy |
Scientists Set Bold Plan For Future Exploration of the Sun |
Scientists Take Most Accurate Reading Yet of Universe's Cooling |
Scottish Scientists Create World's Smallest Smart Antenna |
ScreenOS vulnerability affects Juniper firewalls |
Script kiddie scavenging with Shellbot.S, (Wed, Sep 19th) |
Scripting the Unofficial .wmf Patch |
Scripting Web Categorization |
Scrum/Agile Now Used To Manage Non-Tech Projects |
SDBot sniffs, blings |
SDN Is Business, OpenFlow Is Technology |
SDN Vendor Comparison Launches |
SDN: From Slideware to Software in 2013? |
SDN's Potential in the Data Center and On the WAN |
Sea Chair Project Harvests Plastic From the Oceans To Create Furniture |
Seafood Raised on Animal Feces Approved for Consumers |
Sealed-Box Macs: Should Computers Be Disposable? |
Searching money, finding exploit |
Searching Through the VirusTotal Database |
Seasonal Malwares and other trends |
Seattle Police Want More Drones, Even While Two Sit Unused |
SEC staffers used government computers for personal use: report |
SEC505 DFIR capture script: snapshot.ps1 |
Secunia Advisory for IE; meeneemee.exe |
Secunia PSI 3.0 Beta: plugging security vulnerabilities made easy |
Secure Boot complaint filed against Microsoft |
Secure Remote Services / MyDoom and IFRAME / MS04-039 revision / ISC Webcast |
Security Audit Finds Company's Top Dev Outsourced His Work To China |
Security audit finds dev OUTSOURCED his JOB to China |
Security audit finds developer OUTSOURCED his JOB to China |
Security Awareness (from students point of view) |
Security Awareness and Collaboration |
Security Awareness for Security Professionals |
Security boffins say music could trigger mobile malware |
Security concerns over Firefox's "new tab" thumbnail feature |
Security damn well IS a dirty word, actually |
Security Features Nobody Implements |
Security Firm Mandiant Says China's Army Runs Hacking Group APT1 |
Security Firm Reveals Weaknesses in DDoS Attack Toolkits |
Security Fix for Apache |
Security History Poll Results |
Security History Poll |
Security hole in Sudo's debug option closed |
Security Challenges and Games |
Security improvements in Opera 12 beta |
Security in the Cloud Is All About Visibility and Control |
Security Information on Website |
Security Infrastructure Market to Top $86 Billion in 2016: Gartner |
Security Log Retention |
Security Mailing Lists for Academia |
Security Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos |
Security mess sends Kiwi auction site titsup in two days |
Security Onion 12.04 Beta Released at DerbyCon (plus informational video) |
Security patches for Mozilla Firefox/Thunderbird/SeaMonkey |
Security problem in VMware vSphere 5 |
Security Pros Love Python? and So Do Malware Authors! |
Security Researcher Finds Critical Flaws in Sophos Anti-Virus Engine |
Security Researchers Document Wiper Malware`s Disappearing Act |
Security Talks for portuguese community |
Security Tip of the day: Handling brute-force login attempts |
Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone, (Wed, Jan 9th) |
Security Updates from Microsoft; Multiple Vendors - ICMP Affecting TCP Sessions |
Security Vulnerability Found On US Federal Government Contractors Site |
Security vulnerability in NVIDIA's proprietary Linux drivers fixed |
Security Worker Shortfall is Putting Organizations at Risk |
Self-Assembling Robots Using Flying Drones |
Senate committee approves privacy protections for cloud, email |
Senator Asks FTC to Investigate Google and Apple Over Possible App Privacy Violations (March 5, 2012) |
Senators propose law to combat cyber theft |
Sendmail DoS Vulnerability |
Sendmail Multi-Part MIME Message Handling Denial of Service vulnarability |
Sendmail vuln |
September 2015 Microsoft Patch Tuesday |
Sequoia Supercomputer Sets Record With 'Time Warp' |
Serious flaw on OS X in Apple Safari |
Serious Problems With USB and Ethernet On the Raspberry Pi |
Set up of Risk Terminator in SAP GRC AC 10.0 |
SETI@Home site problems |
Setslice Killbit Apps (1 Comments) |
Seven Tips to Start Your Cloud Due Diligence |
SHA1 Phase Out Overview |
SHA-3 Winner Announced |
Shamrocks and March Madness; Perl bots; MS05-004 update |
Sharing HBO Go Accounts Could Result In Prison |
Sharp Warns That It Might Collapse |
Shellbot |
Shelley Stewart: Business view |
Sheryl Sandberg: Facebook's Home App Needs Some Work |
Should Developers Be Sued For Security Holes? |
Should Inventions Be Automatically Owned By Your Employer? |
Should the Start of Chinese New Year Be a Federal Holiday? |
Should the US Really Limit Chinese-Government Influenced IT Systems? |
Should TV Networks Put Pilots Online For Judgement Like Amazon Is Doing? |
SHOUTCAST <= 1.9.4 Vulnerability, Exploit Available |
Shuttle Endeavour Embarking to Los Angeles Museum |
Schmidt slams China as world's most prolific hacker |
Schmidt, Daughter Talk About North Korea Trip |
Schneier: We Don't Need SHA-3 |
School Board Considers Copyright Ownership of Student and Teacher Works |
Sidewalk: Certifications in Business Analysis: CCBA & CBAP from IIBA |
Sidewalk: Do we really need Business Analysts? |
Sidewalk: Tablet Wars |
SIEM is not a product, its a process... |
Sigcheck and VirusTotal |
Sigcheck and VirusTotal for Offline Machine |
Sigcheck and virustotal-search |
Significant increase on 38566 |
Silent Drop vs Reject Firewall rules |
Silent Traitors - Embedded Devices in your Datacenter, (Mon, Feb 25th) |
Silicon Valley's Dirty Little Secret: Age Bias |
Silly PuTTY; crime pays; if it quacks like a duck get the orange sauce. |
Simple Way to Recover Password of MS Outlook or Outlook PST File |
Simulation Using LRO Data Shows More Locations With Ice on the Moon |
sinFP-2.03 release |
Singapore allows pre-crime strikes against online crooks |
Singapore inquiry into U.S. engineer's death to start in May |
Singapore police to share evidence with FBI on engineer's death |
Singaporeans get hard token baked into credit card |
Singer Reportedly Outbids NASA for Space Tourist's Seat |
Single NFC bonk subjugated Samsung Galaxy SIII and slurped it out |
Siri's Creator Challenges Texting-While-Driving Study |
Site Updates: ISC/DShield API and ipinfo_ascii.html Page |
SKorea misidentifies China as cyberattack origin |
SKorea ready for more cyberattacks; banks recover |
Sky News Google Play page defaced |
Skype Disables Password Reset Function After Security Scare |
Skype for Linux hotfix plugs security hole |
Skype hits back at angry wiretap reports: Rat finks? Not us |
Skype investigates tool that reveals users' IP addresses |
Skype Worm Spreads Ransomware, Botnet Links |
Skype 'worm' whinnies... |
Skype worm |
Skype; Grepping Weblogs; COAST; ISTS News |
Slackware 14.0 Arrives |
Slashdot Asks: SATA DVD Drives That Don't Suck for CD Ripping? |
Slate's Mini-Biography of Aaron Swartz |
SLOTH, attack on TLS using MD5 |
Slow day |
Slow Sunday; CA Message Queuing Vulns; Process Explorer Vuln; Infocon: Green Redux |
Small Results With Big Indexes |
Smart meter hack framework goes open-source |
Smart TVs riddled with DUMB security holes |
Smartest Light Bulbs Ever, Dumbest Idea Ever? |
Smart-Grid Control Software Maker Hacked |
Smartphone 4Q sales rise 36 pct led by Samsung |
Smartphones overtake 'dumb' phones worldwide |
Smoothing MODEL, K? |
Smooth-Talking Hacker Remote-Wipes Reporter's iPad, MacBook |
Sniffer tool displays other people's WhatsApp messages |
Sniffers in Perl?!? |
SNMP Issues in Cisco Routers; Vulnerability Issues in TCP; SANS Top-20 Call for Experts |
SNMP Pwn3ge |
Snort 2.4.2 Released |
Snort BO pre-processor Vulnerability |
Snort BO status update |
Snort bypass vulnerability |
Snort Denial of Service Vulnerability |
Snort Rule released on BleedingSnort for the Windows Javascript vulnerability |
Snort rule update |
Snort rulez management |
Snort Sig for MS06-040 |
Snort signature and standalone detection tool |
Snort Sigs for MS06-042 and ICMP tunnel mentioned in Diary |
Snort URL evasion vulnerability patched and version 2.6.0 available |
Snow Leopard users most prone to Flashback infection |
So many devices, so little policy |
So what passwords are those ssh scanners trying?, (Tue, May 14th) |
So you broke our encrypted files? Ha! They were DOUBLY encrypted |
So, what causes recession? |
So, when is a security advisory, not a security advisory? |
Soap Boxing |
Sober Virus (CME-151) |
Sober, Bagles, and Mytobs ad nauseum... |
Sober.I is on the go; Quiet day on the net |
SoberD@MM from spoofed Microsoft email addresses, new version of Netsky |
SoBig Virus Update |
SOBIG.F |
Sobig-F and Nachia update |
Sobig-F hybernation |
SOC Resources for System Management |
Social Commerce Is Future of Electronic Commerce |
Social Media, Companies and Data Volumes |
Social Networking Security in the Workplace |
Social Networking Sites- An Educational Tool |
Socialite's climb halted by unfolding scandal |
SoftBank would appoint "security director" to Sprint board |
Software DEP Classified Script 2.5 SQL Injection Vulnerability |
Software exploits dropped to new low in 2011, says IBM X-Force |
Software Patches, Nortel, User Privacy Top Week's Security News |
Solaris 9 in.ftpd security flaw |
Solaris telnet/rlogin cont.; Timezones; DNS queries |
SolusOS Forks Gnome 3 Fallback Mode |
Solution to the TCP 1433 Traffic |
Some Android phones can be reset to factory default by clicking on links, (Wed, Sep 26th) |
Some more 0-days from ZDI |
Some password advice |
Some Smart Meters Broadcast Readings in the Clear |
Some tools updates |
Some useful volatility plugins |
Somebody, Probably Anonymous, Hacked the Fed During the Superbowl |
Something new on Telnet? |
Sony Announces 'Superslim' PS3 |
Sony Announces the PS4 |
Sony cuts sales target for cameras, smartphones for 2014-15 |
Sony DRM Rootkit to be removed automatically by Microsoft |
Sony Fined $390K in U.K. for 2011 PlayStation Network Data Breach |
Sony mobile customers emails, names hacked in China |
Sony PS Vita exploit opens the door for unauthorized apps, piracy |
Sony redo of PlayStation Store links games, movies |
Sony to assess spin-off plan; cuts targets for cameras, smartphones |
Sony To Make Its Last MiniDisc System Next Month |
Sony Touts 25 Hour Battery Life For Haswell-Equipped Vaio Pro |
SOPA, PIPA, Anonymous: Can I have a little hope? |
Sophos buys mobile device management vendor Dialogs |
Sophos dangles free Android antivirus to tempt BYOD-friendly biz |
Sophos false positives on Mac OS X |
Sophos Reveals the "Dirty Dozen" |
Sourcefire VRT MS-WORD 0DAY recommendations, Rules and tool Advisory |
South Carolina tax chief resigns after taxpayers hit in cyber attack |
South Korea Backtracks On China As Source of Cyberattack |
South Korea cyberattacks hold lessons for U.S. |
South Korean crackers arrested |
SP2 breaks nmap, others - *Anti*phishing - Application exploits |
Space Diving: Iron Man Meets Star Trek Suit In Development |
Space Shuttle Endeavour's Final Journey |
Space Station Saved By a Toothbrush? |
Space Station Spacewalkers Stymied By Stubborn Bolt |
SpaceX Dragon Set To Launch |
SpaceX: Lessons Learned Developing Software For Space Vehicles |
Spaf on reexamining |
Spain's Extremadura Starts Move To GNU/Linux, Open Source |
Spam - spam - spam |
Spam ahoy! |
Spam Backscatter |
Spam blocking by RBL, when is a good thing too much? |
Spam Delivered via .ICS Files |
SPAM in German is Still SPAM |
Spam Increase |
Spam reporting addresses |
Spam with Obfuscated Javascript |
Spam, Recon or ??: You make the call!! |
Spamassassin - upgrade |
Spamhaus DDoS Attack Investigation Results in Arrest of Dutch Man |
SPAM-Let the time fit the crime; |
Spammers attempt to defeat Bayesian filters; Malaysia terrorism warning; MSN Messenger worm |
Spammers dodge junk filters with Google Translate |
Spammers unleash DIY phone number slurping web tool |
Spammers, phishers escape proper punishment |
Spamming as 'terror' tactic |
Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot |
Spanish police arrest suspected developer of BKA trojan |
Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack |
Speaking of Predictions |
Speaking of Said Upgrades… Firefox 1.0.7 |
Special Microsoft Bulletin Patching Remote Code Execution Flaw in OpenType Font Drivers |
Special Ops Takes Its Manhunts Into Space |
Spectacular New Views of Saturn's Polar Vortex |
Speed traders eyed after Twitter hack attack: regulator |
Speech-to-text drives motorists to distraction |
SplitRXMode - Taking VMware Multicasting to the Next Level |
Sploits Du Jour: Veritas NetBackup & Ethereal. Watch Oracle and Snort! |
Sporadic Problems, Internet Health Monitors, IE Attacks, and HTTP GET |
Spy Gadgets: A Visit With the Real-Life Q |
Spyware Report Disected and Thanks For The Malware |
Spyware Tool Kit, OSPF Filtering & Authentication, Port 559 Traffic Spike |
SQL Injection Flaw in Ruby on Rails, (Wed, Jan 9th) |
SQL Injection Lilupophilupop style, Part 2, (Thu, Aug 9th) |
SQL Injection: Paper & Worm, WINS, Asking for Input. |
SQL Model Clause: References and Recommendations |
Square Kilometre Array Pathfinder Goes Live |
SquirrelMail 1.4.8 released |
SSD Prices Fall Dramatically In 2012 But Increase In Q4 |
SSH Honeypot Capture, Follow The Bouncing Malware (Part III) |
SSH Honeypots (Ab)used as Proxy |
SSH scanning continues, some simple advice; IPS comparison article |
SSH Scanning Resolved; First Things First Guide |
SSL 2.0 Rollback in OpenSSL |
SSL Phishing Scam / FreeBSD DoS Vulnerability / Acrobat Reader Flaw |
SSL Requests sent to port 80 (request for help/input), (Thu, Sep 6th) |
SSL, SSL - Where Art Thou SSL? |
Standard Kilogram Gains Weight |
Stanford Study Flawed: Organic Produce May Be More Nutritious After All |
Stanford Uses Million-Core Supercomputer To Model Supersonic Jet Noise |
Stanford's Flying Fish Glider |
Staples Starts Selling 3-D Printer |
Startup decloaks, rolls out cloudy security 'conductor' |
State of the Union: Full text of President Obama's address |
State social media privacy laws a mixed bag for businesses |
Statistical Tools For Detecting Electoral Fraud |
Statistics Key To Success In Run-and-Gun Basketball |
Staying Secure During ERP Implementation: What to Look Out For |
Stealing photos and spying: backdoors to networked cameras |
Stealthy Apache Exploit Redirects Victims to Blackhole Malware |
Stealthy Group Steals Data Using Zero-Day, 'Watering Hole' Attack |
Stealthy, malware-spewing server attack not limited to Apache |
Steam spawns vulnerabilities, say researchers |
Steelie Neelie admits laptop hack during IGF |
Stem Cell Treatment Found Effective For Rare Brain Disorder |
Steps to Mitigate Office Vulnerabilities |
Steve Jobs Movie Clip Historically Inaccurate, Says Woz |
Still a Microsoft Most Valuable Professional (6th year!) |
Still More MyDoom, a Few Twists on IDS, and a New Phishing Threat |
Stolen Laptops |
Stop calling it a ransomware "attack" |
Stopping Spam by Extrusion Detection |
Storage and expertise - the PureSystems box |
Storm Center in the News |
Storm Season |
Strange file names being requested from a web server |
Strange Http request... |
Strange phishing/spam e-mails |
Strange Spam; Update on Port 3001; New Discussion Forum; Small Website Change; Cisco Humor; SANS Washington DC |
Strange UDP Packets, Amazon.com and LATAM NIC Issues |
Stratfor Hacker Could Be Sentenced to Life, Says Judge |
Stress-Testing Software For Deep Space |
Student mules, More database holes, Microsoft spyware beta |
Student privacy activists due to meet with Facebook |
Student Refusing RFID Badge Now Fights Expulsion Order |
Students Calculate What Hyperspace Travel Would Actually Look Like |
Study Finds Universe Is 100 Million Years Older Than Previously Thought |
Study says malware attacks are on the rise, mobile threats becoming more serious |
Study Urges CIOs To Choose Open Source First |
Study: Geolocation apps draw users, despite privacy concerns |
Study: Limiting Bidding On Spectrum Could Cost Billions |
Study: Online Social Influence Has the Strongest Effect On Voting Behavior |
Study: the Universe Has Almost Stopped Making New Stars |
Stuxnet worm planted on Iranian PCs via USB stick, site claims |
Submitting Malware - Unpatched IE Hole Being Exploited - eJihad or iHysteria? |
Substantial Increase in Infected System Numbers (is it real?) |
Sudo For Windows |
Sugar Batteries Could Store 20% More Energy Than Li-Ions |
Summer/Winter Vacation Book Suggestions and Hacking Challenges |
Sun bulletins, MS04-040 discussion, anti-spam vigilante-ism dumb, did you know? |
Sun Java JRE sandbox bypass vulnerability |
Sun Java Runtime Environment XML Parsing Denial of Service Vulnerability |
Sun Java SDK and JRE Updates |
Sun JDK 5.0 Update 10 |
Sun JRE Privilege Escalation, Opera Vulnerability, Pocket PC Trojan in the wild |
Sun ONE Messaging Server Vulnerability; Weaknesses in Wireless LAN Session Containment; Credit Card Breach |
Sunday P & Q; Happy Birthday OpenSSH; RBOT Snort Sig; Bacula |
Sunday, little to report, and backups |
SunJava 1.5.0_09 Released |
Super Bacteria Create Gold |
Supercomputer Repossessed By State, May Be Sold In Pieces |
Supercomputers' Growing Resilience Problems |
Super-Earth Discovered In Stars' Habitable Zone |
Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA |
'Super-powerful' Flame worm actually boring BLOATWARE |
Superstition |
Support Forums Reveal SCADA Infections |
Supreme Court To Decide If Monsanto GMO Patents Are Valid |
Surface Pro Sold Out; Was It Just Understocked? |
Surface Pro: 'Virtually Unrepairable' |
Surfing Robot Tracks Great White Sharks |
Surge in Exploit Attempts for Netis Router Backdoor (UDP/53413) |
Surveillance software: Gamma Group's offshore companies uncovered |
Survey on Application Portfolio Management–What is your organization doing? |
Survey Reveals a Majority Believe "the Cloud" Is Affected by Weather |
Survey Suggests P2P Users Buy More Music |
SUS: deadline extended - XP SP1 not supported anymore |
Suspicious eFax Spear Phishing Messages, (Fri, Aug 17th) |
Swartz' death fuels debate over computer crime |
Swedish Data Center Saves $1M a Year Using Seawater For Cooling |
Swedish School Makes Minecraft Lessons Compulsory |
Sweet Treats from the Honeynet group. |
Swiss security day |
Switching Tasks Changes Worker Bee DNA |
Syfy Reality Show Will Feature Giant Boxing Robots |
Symantec Antivirus Scan Engine: Web Service Administrative Interface Buffer Overflow |
Symantec AV linked to Verisign certificate problem, DUGallery, False Weather Alerts, more phishing |
Symantec AV RAR library vulnerability |
Symantec AV Vulnerability Latest |
Symantec beats estimates on demand for security products |
Symantec CEO takes over global sales chief's job, shows him door |
Symantec detecting NSIS as trojan.zlob. |
Symantec DOS Exploit Code, Sasser Backdoor Exploit Capture, Reading Material |
Symantec finds Linux wiper malware used in S. Korean attacks |
Symantec forecasts weak results as yen depreciates |
Symantec Patch Posted |
Symantec Products Vulnerabilties / Worm Password List / Mailbag-Netsky |
Symantec retires low-end security software |
Symantec Scan Engine Multiple Vulnerabilities |
Symantec Sees Links Between 2011, 2013 Cyber-Attacks on South Korea |
Symantec update blocks access to AOL |
Symantec VERITAS Storage Exec DCOM Server BO's |
Symantec: don't blame us for New York Times hack |
Symantec: Flashback malware netted upwards of $10,000 a day |
Symbian operating system - Nokia series 60 mobile phones - 3 new Trojans |
Symbian Sells Millions, Despite Nokia Pushing Windows Phone |
SYN-ACK Packets With Data |
Syncing Between Devices |
Synthetic Materials Set New World Record For Greatest Amount of Surface Area |
Syria drops from Internet 7th May 2013, (Wed, May 8th) |
Syria Falls Off the Internet Again |
Sysadmin Appreciation Day |
Syslog'n with the best of 'em; |
System Architecture Test Plan (Expanded) |
System Documentation: Application Software |
System Documentation: Working System |
System Resource Utilization Monitor |
System Spec: External (Human) Interface |
System Store Trojan, Infection Persistence, Save the Pr0n |
TACC "Stampede" Supercomputer To Go Live In January |
Taiwan Earthquakes cut undersea cables |
Taiwan security official warns of crippling Chinese cyberattacks |
Taiwan to ramp up cyberwar efforts |
Taiwan's civil servants caught by sexy email trap |
Take a Free Networking Class From Stanford |
Take Back Wednesday? SQL Slammer... still alive but barely kicking |
Taking a Hard Look At SSD Write Endurance |
Taking a Look at the FreeVideo Player Trojan |
Taking Action For Free JavaScript |
Talented and Creative Group We Are |
Taliban official's email blunder leaks 400+ contacts |
Talking to Kids About Online Porn: How One Dad Handled it |
Tap Gigabit Networks on the Cheap |
Targeted attack: experience from the trenches |
Targeted attack: Word exploit - Update |
Targeted Attacks Increased, Became More Diverse in 2011 |
Targeted IPv6 Scans Using pool.ntp.org . |
Targeted Trojan attacks? |
Tata Intends To Sell Air-Powered Car In India |
Tax Day and associated risk |
Tax Day and recovering from San Diego; Oracle patches; IRC spam worm |
TCP 554 scanning; Linux mremap local root exploit posted |
tcp bindshell with password prompt in 162 bytes |
TCP Fuzzing with Scapy, (Thu, Sep 13th) |
TCP port 10000 cont. / Connecting mismatched protocols |
TCP port 1025 activity; continued DNS poisonings; 802.11 security primer |
TCP Port 8181 Puzzle |
tcp/135 and ICMP Continue to Decline; Solaris 8 Hacks |
TCP/1433 spike: Call for Packets. |
Teenager Makes Discovery About Galaxy Distribution |
Teens arrested in connection with attack on UK Police Agency |
Teens Drug Parents To Get Web Access |
Teens, Social Media, and Privacy |
Tech tip follow-up: Using the data Invoked with R's system command |
Tech tip: Invoke a system command in R |
TechCrunch:Expanded DMCA Still Has Limits |
Technical document on WMF vulnerability and Guilfanov's patch available |
Technical Mujahid Magazine |
Television Network Embeds Android Device In Magazine Ads |
Telnet client vulnerability; DNS posioning re-appearing |
Telstra Bigpond To Use Outlook.com As Email Handler |
Temporary Patches for createTextRange Vulnerability |
Tens of millions of hackers target Israel government websites |
Tesla CTO Talks Model S, Batteries and In-car Linux |
TeslaCrypt ransomware sent using malicious spam |
Test File: PDF With Embedded DOC Dropping EICAR |
Test Gallery - VMware |
Testing for DNS recursion and avoiding being part of DNS amplification attacks |
TestLink v1.9.3 Arbitrary File Upload Vulnerability |
Tests Show That Deadly New Flu Could Spread Among People |
Texan schoolgirl expelled for refusing to wear RFID tag |
Texas Attorney General Warns International Election Observers |
Texas Company's Antique Computers Are For Production, Not Display |
Texas School Board Searching For Alternatives To Evolutionary Theory |
Texas State Rep. Files 2 Bills To Ban RFID In Schools |
Thai PM's site defaced with smutty abuse |
Thanks for info on chat monitoring; PanadaLabs report; Hyper-Threading vulnerability |
Thanx to our readers |
That Peculiar Genetics of Mathematics |
The "Yes, but..." syndrome |
The 1 Train Hackers Stole $2.4 Million from 2,904 ATMs in Just 10 Hours |
The 3D Un-Printer |
The 7 Craziest Intelligence Leaks in US History |
The 80's called - They Want Their Mainframe Back!, (Wed, Jan 9th) |
The 866-PC-SAFETY poll |
The Agony And Ecstasy Of The Oracle 11gR2 Upgrade |
The Algorithmic Copyright Cops: Streaming Video's Robotic Overlords |
The AP Twitter hack: Wall Street's tweet-scraping technology that sparked a 145-point nosedive |
The Arcati Mainframe Yearbook 2013 |
The asymmetry implicit in Internet data retention |
The ATF Not Concerned About 3D Printed Guns... Yet |
The Beast |
The best anti-Obama book I've read |
The biggest cyberattack in Internet history |
The Biggest Financial Fraud of All Time |
The British Have All The Fun |
The Bronies Get Their Own Charity |
The Case For Targeted Ads |
The Case for UC Interoperability |
The CIA and Jeff Bezos Bet $30 Million On Quantum Computing Company |
The Cloud Ecosystem - Just Getting Started |
The Cloud Wars |
The Coming Internet Video Crash |
The Computer Science Behind Facebook's 1 Billion Users |
The Current Cloud Landscape |
The cyber debate goes public |
The Cyber Threat To the Global Oil Supply |
The Danger In Exempting Wireless From Net Neutrality |
The dangers of shared web hosts |
The Dark Side of Certificate Transparency |
The Data Crunchers Who Helped Win The Election |
The Empire Hacks Back Challenge: Test Your Windows Command-Line Kung Fu |
The era of big DDOS? |
The Family System Administrator |
The Faraway Cloud: Measuring Cloud Performance |
The FBI Is Now Investigating the Steubenville Backlash |
The FBI will turn off the Internet on Monday (or not), (Mon, Jul 9th) |
The FBI's reported new plan to read your emails |
The Foldable Readius Ereader Is Dead |
The Foundation of Your ATS Should be a CRM |
The Free State Project, One Decade Later |
The FSF Adopts the Kickstarter Approach To Fund-raising |
The Full Text of President Obama's 2013 State of the Union Address |
The Gates Foundation Engages Its Critics |
The government wants to know what it doesn't know |
The H Roundup - AMD fires developers, Android turns 5, E17 alpha arrives |
The H Roundup - Bogus leap seconds, EFI rootkits and cloud cracking |
The H Roundup - Linux Mint 15 RC, WebM patents, Google drops XMPP |
The H Roundup for the week ending 12 May |
The H Roundup for the week ending 14 July |
The H Roundup for the week ending 17 March |
The H Roundup for the week ending 18 February |
The H Roundup for the week ending 19 May |
The H Roundup for the week ending 2 June |
The H Roundup for the week ending 23 June |
The H Roundup for the week ending 24 March |
The H Roundup for the week ending 28 July |
The H Roundup for the week ending 9 June |
The H Roundup for the week ending May 5 |
The History of the Floppy Disk |
The Hunt For LulzSec's Missing Sixth Member |
The chocolate / attack correlation |
The importance of ongoing dialog |
The Intelligence Cycle for a Vulnerability Intelligence program on-the-cheap |
The Internet Plays Role of Stupidity Amplifier |
The ISC is not Trying to Trojan Your Machines |
The Largely Unknown Success Story of Afghanistan's Television Network |
The Linux-Proof Processor That Nobody Wants |
The Long Reach of US Extradition |
The Mathematics of the Lifespan of Species |
The Matthew Keys Case Shows Just How Big a Bully the Feds Can Be |
The missing Microsoft patches |
The Mobile App Design Tail Wags the Desktop Software Design Dog |
The most hated IP address of 2005 ? |
The MS Claria debate; Intrusions via MS05-017; some more light reading |
The New AI: Where Neuroscience and Artificial Intelligence Meet |
The New Series of Doctor Who: Fleeing From Format? |
The Olympic Live Stream: Observations, Recommendations, Predictions |
The other Juniper vulnerability - CVE-2015-7756 |
The Passing of the Personal Computer Era |
The Passwords You Should Never Use |
The Perils of Vendor Bloatware |
The Pirate Bay supporters hack Virgin Media |
The Pirate Bay's Oldest Torrent Is Revolution OS</em> |
The Pitfall Of Two Factor Authentication |
The Privacy Illusion |
The Prototype Still Works; Insider Threat Paper; More Keylogging; Translation |
The Rapid Rise of License Plate Readers |
The reasons you should attend IOD 2012 aren't always technical |
The Release Candidate For Linux Mint 14 "Nadia" Is Out |
The Return of CISPA |
The Rise of Paid Wikipedia Consulting |
The Risks of Trusting Experts |
The Science Behind Building a Space Gun |
The security risks and rewards of big data |
The Short Life of a Vulnerable DVR Connected to the Internet |
The Shumway Open SWF Runtime Project |
The Sleuth Kit (TSK) for Windows released |
The Snort Top 10 |
The SPAM People;Thanks;Package Verification |
The Strange Nature of the Nigerian App Market |
The Struggles of Getting Into the App Store |
The Tech Behind Felix Baumgartner's Stratospheric Skydive |
The Three Pillars of Data Warehousing |
The Tiny Console Killers Taking On the PS4 and Xbox 720 |
The Top 10 - The Best Conversations Happening Right Now |
The Top 5 Reasons Cloud Computing Projects Fail |
The Top Paying Tech Companies For Interns |
The trouble with talking to computers. |
The Twelve Days of Christmas Packet Challenge |
The Two Big Problems With Online College Courses |
The Ultimate OS X Hardening Guide Collection, (Mon, Feb 20th) |
The ultimate tips box |
The Value a "Fresh Set Of Eyes" (FSOE) |
The White House's Next Enemy: Botnets |
The Wordpress Plugins Playground |
The World Remains Five Minutes From Midnight |
The worst security snafus of 2012 – so far |
There are no more Passive Exploits |
There Is No Reason At All To Use MySQL: MariaDB, MySQL Founder Michael Widenius |
They didn't predict that: Astrologers! blamed! after! Yahoo! hack! |
They Work Long Hours, But What About Results? |
Think Tank's Website Rejects Browser Do-Not-Track Requests |
Third Party Debates Moderated by Larry King: Discuss |
Third-party apps ripe targets for cybercriminals, Secunia says |
Thirty Six Days to Dreamforce |
This Article is Brought to You By the Letter ノ |
'This Is Your Second and Final Notice' Robocallers Revealed |
This Week's Top 10 Discussions |
This Week's Top 10 Discussions - April 29, 2013 |
This Week's Top 10 Discussions - May 6, 2013 |
Thomson Reuters employee indicted for aiding hackers -court filing |
Those never-ending waves of Locky malspam |
Thoughts about Informix |
Thoughts on PCI (Payment Card Industry) compliance requirements |
Thoughts on VoIP, Holiday recommended reading |
Thousands of Kuwaitis protest against voting changes |
Thousands of Publicly Accessible Printers Searchable On Google |
Thousands of Publicly Addressable Printers Searchable On Google |
Threats in the Cloud Environment SSH Scanners |
Three Mile Island Shuts Down After Pump Failure |
Three reasons you shouldn't neglect your application security |
Three Ways Cloud Computing Providers Shoot Themselves in the Foot |
Thunderbird Download Link |
Tibetan and Uyghur activists targeted with Android malware |
Tim Bryce - COMMON COURTESY - 9/24/2012 |
Tim O'Reilly Steps In To Debate Open Government and Linux |
Time for some predictions |
Time to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801, (Wed, Oct 24th) |
Time to update Mozilla/Firefox/Thunderbird and Ethereal; also: sightings of infected IIS 6 servers. |
Time to upgrade Ethereal... |
Time Zone Updates, Part 2 |
Times sued over police hacking |
Tiny Pill Relays Body Temperature of Firefighters In Real-time |
Tip of the Day - Backup and Backup Management for Home or Small Business Users |
Tip of the Day - Color and Bar Coded Daily Risk Analysis |
Tip of the Day - Fleshing out the details in email policy |
Tip of the Day - Home Wireless Gateways |
Tip of the Day - If you don't need it on, turn it off. |
Tip of the Day - Like a Kid in a WMIC Candy Store |
Tip of the Day - Making the Switch |
Tip of the Day - PHP Security |
Tip of the Day - Protecting HP JetDirect-based Printers |
Tip of the Day - Turn the NICs off during installation |
Tip of the Day : snort rule management |
Tip Of The Day |
Tip of the Day: Audit |
Tip of the Day: Be unpredictable and diverse |
Tip of the Day: Don't be a victim (well try to not be a victim) - security toolbars |
Tip of the Day: Logbooks |
Tip of the Day: mount options |
Tip of the Day: Protect the Single Points of Compromise |
Tip of the Day: Read e-mail in plain text (as God intended) :) |
Tip of the Day: Remove Default Route |
Tip of the Day: Secure Surfing at the Coffee Shop (or Hacker Conferences) |
Tip of the Day: Standards |
Tip of the Day: Strong Passwords |
Tip of the Day: Surviving the monthly patch cycle |
Tip of the day: Test, don't ping |
Tip of the Day: The -they shall not be broken into- challenge |
Tip of the Day: Turn off your Computer |
Tip of the Day: Use ssh keys |
Tip of the Day: Use the features of your switches |
Tip of the day: using host based firewall on Windows XP SP2 |
Tip: Quick Analysis of Office Maldoc |
Tippingpoint IPS DoS |
Tips for Stopping Ransomware |
T-Mobile patches Wi-Fi eavesdrop vuln |
To protest Israel's Gaza offensive, 'Anonymous' launches millions of cyberattacks |
To report any scams/malware related to Hurricane Matthew, use our contact form: https://isc.sans.edu/contact.html |
To SSL or not to SSL - send us your links! |
ToD - Configuration Management - maintaining security awareness |
Today's Locky Variant Arrives as a Windows Script File |
Tolkien Estate Sues Over Lord of the Rings</em> Slot Machines |
Tomcat IR with XOR.DDoS |
Tool Released to Decrypt Petya Ransomware Infected Disks |
Tool Tip: Kansa Stafford released, PowerShell for DFIR |
Tool updates and Win 8, (Sun, May 6th) |
Tools released at Defcon can crack widely used PPTP encryption in under a day |
toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics |
Top 100 security tools |
Top 20 Internet Status Sites |
Top 20 update; IM malware and IRC bots are the flavor of the day; Sober variant |
Top 6 Mashable Comments This Week (Mashable) |
Top20 List Updated; TCP/1433 Remains Elevated; ZoneAlarm 6.0 Released; The Penetrating Packets: Spam E-Mail |
TOR servers seized by police in Germany |
Torvalds Takes Issue With De Icaza's Linux Desktop Claims |
Total Solar Eclipse Bedazzles Northern Australians |
Tour of the Deep Underground Science and Engineering Lab |
TR-069 NewNTPServer Exploits: What we know so far |
Tracking HTTP POST data with ELK |
Tracking Privileged Accounts in Windows Environments |
Tracking SSL Certificates |
Trade Group: US Software Developer Wages Fell 2% Last Year |
Trading Privacy for Convenience |
Traits of a Software Professional |
Treasure Your Trials |
Trend Micro unearths more links between China and hacker group |
Trends in malware installers, Oddbob is back, .ANI file followup, and SMTP oddities redux. |
Treo 700w DST Ooooops! |
Trevor Eddolls - IBM Champion 2012 |
Tricks for DLL analysis |
Trisquel 6.0 'Toutatis' Is Now Available |
Trojan attack on Maplesoft customers |
Trojan Disguised as Microsoft Patch; Identity Theft |
Trojan dropper in Power Point - a new issue? |
Trojan exploiting MS05-053 - TROJ_EMFSPLOIT.A |
Trojan postcards; Using authorized apps to do bad things; More IE and Outlook problems? |
Trojan.Mdropper.Q / Email Attachment Practices |
Trojanized SSH Daemon In the Wild, Sending Passwords To Iceland |
Trouble At OnLive |
Trouble Brewing? - Port 106 Activity |
Trusteer Identifies Universal Man-in-the-Browser Attack Technique |
Trustworthy Computing |
TSA Says Screening Drinks Purchased Inside Airport Terminal Is Nothing New |
Tsunami.exe, Oracle critical patch update, got packets? |
Turkey Lurkey brings state of calm to the net -- well, almost |
Turkish agency blamed by U.S. companies for intercepted Web pages |
Turkish Registrar Enabled Phishing Attacks Against Google |
Turning SF's Bay Bridge Into a Giant LED Display |
TV station hacker warns of zombies in Montana |
Twas the night before Christmas, when all through the house Not a creature was stirring, not even a mouse. |
Tweet-to-buy? American Express says yes |
Twin Craft To Study Space Weather From Within Earth's Radiation Belts |
Twitter Based "Ted" System Warns of Earthquakes Earlier |
Twitter Breached, 50k Accounts Posted to Internet |
Twitter clients stay signed in with pre-breach passwords |
Twitter hires Apple’s hacker nemesis to boost its security team |
Twitter jumps on Do Not Track bandwagon |
Twitter locks down logins by adding two-factor authentication |
Twitter Resets 250,000 User Passwords After Cyber-Attack |
Twitter spam campaign infects users with fake antivirus programs |
Twitter stumble causes outage, not hactivist |
Twitter suffers malware spam outbreak |
Twitter Tells News Organizations to Expect Even More Hacks in the Future |
Twitter's Vine App Ready To Bomb Internet With GIF-Like Videos |
Two great books for aspiring "data scientists" |
Two Heads Are Better Than One For Brain-Computer Interfaces |
Two Changes To Quirky Could Change The World |
Two new Internet Explorer vulnerabilities disclosed including PoC |
Two New Sober Viruses on the Loose Today |
Two subsystem parameters (DSNZPARM keywords) have been added in support of DDF (and other DDF enhancements...) |
Two subsystem parameters have been added in support of DDF (and other DDF enhancements...) |
Two Things I Wish Companies Cared More About: Cloud & Acquisitions Risks |
Two-factor authentication Defense Mechanisms |
Two-Way Firewall in Windows Vista and Microsoft OneCare |
Tylenol May Ease Pain of Existential Distress, Social Rejection |
Typo Squatting Charities for Fake Tech Support Schemes |
Typo-Squatting and Password Best Practices |
U.N. nuclear agency says hackers stole information |
U.S Law Enforcement Agencies Increase Warrantless Electronic Snooping |
U.S. Army, Target, others advertising on pirate sites |
U.S. bank website hackers used advanced botnets, diverse tools |
U.S. carriers line up against texting while driving |
U.S. Congress urged to probe Chinese cyber-espionage |
U.S. cyber warrior accuses China of targeting Pentagon |
U.S. defense chief says pre-emptive action possible over cyber threat |
U.S. group studying breach at Schneider unit |
U.S. lawmakers to introduce new bill to punish cyber theft |
U.S. looks into claims of security flaw in Siemens gear |
U.S. panel urges wariness as Chinese investment grows |
U.S. report says major weapons designs compromised by Chinese |
U.S. Seeks Power to Wiretap Web Services, Including Google, Facebook |
U.S. seeks to tackle trade secret theft by China, others |
U.S. seeks to tackle trade-secret theft by China, others |
U.S. Senator Takes Wrong Turn on DOJ's GPS Tracking Requests |
U.S.-Israel project with Motorola leads to security-hardened industrial control system |
UAC Bypass in JScript Dropper |
Ubisoft assassinates Uplay flaw, denies DRM rootkit |
Ubisoft DRM opens backdoor |
Ubuntu Developing Its Own Package Format, Installer |
Ubuntu Gnome Remix 12.10 Arrives For Testing |
Ubuntu install passwd in log |
Ubuntu Isn't Becoming Less Open, Says Shuttleworth |
Ubuntu Touch Developers Aim for Daily Phone Usability Before June |
uCertify Online Prep Kit - Software Review |
UDP port 1434 directed attack to AS13489 IP ranges, (Fri, May 24th) |
UDP Port 47290 |
UDP traffic to port 50368 |
UDP/1030 (continued) |
udp/1030 Increase |
UDP/4081 Spike |
UK Authorities Threaten To Storm Ecuadorian Embassy To Arrest Julian Assange |
UK biz pays heavy price for skimping on security - PwC |
UK Broadband Plan Set To Clear EU Approval |
UK cookies cop changes own policy to ‘implied consent’ |
UK Court: MPAA Not Entitled To Profits From Piracy |
UK Critical Infrastructure and Business Trojan Attacks (Updated), imap scanning, Opera vulns, Adobe Reader/Acrobat vuln, NIST Control Tool, Mailbag |
UK Government Owns 16.9 Million Unused IPv4 Addresses |
UK Government Spending £6,000 Per Computer Every Year To Maintain Desktops |
UK Gov't Official Advises Using Fake Details On Social Networks |
UK hacker jailed for nicking PayPal, banking data from MILLIONS |
UK charges teenager for alleged jamming of anti-terrorist hotline |
UK lawmakers say Huawei-BT deal exposes flawed security controls |
UK License Plate Cameras Have "Gaps In Coverage" |
UK Ministers' Private Communications Subject To Freedom of Information Act |
UK Police Fined For Using Unencrypted Memory Sticks |
UK Police Now Double As CCTV Cameras |
UK police: Man charged in UK soldier's murder |
UK.gov to spunk £2m a year policing global cyber-security |
UKNova TV Torrent Tracker Shut Down After FACT Issues C&D |
Ultra-hackable Google Glass could be a security nightmare |
UN: More international cooperation needed to fight cyberterrorism |
Unauthorized Change Detected! |
Unencrypting Extortion Malware |
Unidentified E-mail worm, PHP server vulnerabilities, MS SMS Client DoS |
Uninstalling Problem Applications using Powershell |
Unity Makes Strength |
Universal IPSec VPN client for Android 4.0 |
University Security Problems and Another CHM exploit in the Wild |
Unix/Linux Steals the Show! |
Unpatched exploit gets publicity |
Unpatched Vulnerability in Firefox used to Attack Tor Browser |
Unreal Engine Heap Overflow, RBOT.CC, ISCAlert |
Unscrambling an Android Telephone With FROST |
Unspecified Vulnerabilities in Flash |
Unusual Discovery of New African Monkey Species |
Unusual New Species of Dinosaur Identified |
Update - Symantec RAR File Parser Remote Heap Overflow |
Update 20:10 GMT 2004-1-28: New variant of Novarg/MyDoom found, Microsoft Changing IE's URL Handling, Solaris Local Privilege Escalation |
Update Firefox to 1.5.0.1, the exploit is out |
Update for Intel(R) PRO/Wireless 3945ABG Network Connection Software bugs |
Update for Windows Update has teething troubles |
Update from Microsoft Not Included in April 2006 Bulletin |
Update on MS06-042 and CA Unicenter Service Desk |
Update on Postcard virus emails |
Update on Symantec Elevation of Privilege Vulnerability |
Update on the Paypal Phish Phlaw |
Update on the SUS issues |
Update on the UDP strange packets |
Update on TrendMicro Pattern 594 Issue; W2K Mainstream Support Ending June 30, 2005; My Computer Has a Rash |
Update on Word 0-Day Issue |
-UPDATE- Sasser Worm , Week in Review; LSASS Exploit Analysis; SANSFIRE 2004 |
Update to MS04-025; Windows 2003 Guides Released; Port 3072; Your Daily Phish |
Update/Fix for MS06-049 |
Update: Malware Analysis: Tools of the Trade |
Update: New Windows XP SP2 vulnerability; MS Patches reports; Bad, Bad Spam... |
Update: Paypal Phish Conditioning; DNS Denial of Service Vulnerability; CA Vet Library Vulnerability; Combating Windows Malware Tutorial |
Update: Sasser.d to start the work week, clean up tools may not be adequate |
Updated (13:45 3/18 GMT): OpenSSL DoS Vulnerability, New Bagel Variants |
Updated Acrobat Snort Sig / Cisco Advisory / Distributed Vulnerable Scripts Scans/ Diary Foot-note |
Updated DShield Blocklist |
Updated Malware Domain List |
Updated Model Puts Earth On the Edge of the Habitable Zone |
Updated MSIE VML Remote Buffer Overflow Exploit Code Released |
Updated Packet Attack flash animation |
Updated PFSense Client |
Updated RSS Feed |
Updated Twiki Snort Sig |
Updated version of Ilfak Guilfanov's patch |
Updated Windows Registry Concealment Info;Symantec AV Vulnerability |
Updated(2): Checkpoint VPN-1 ASN.1 vulnerability, RADIUS and wireless, reminder about home routers |
Updated: Bagle C Virus. New Vulnerability in RealSecure and BlackIce Products, Solaris 8 and 9 passwd(1) bulletin, WinZip flaw, IE cross-frame scripting issue |
Updated: IWAP_WWW account on compromised IIS servers |
Updated: MS04-011 LSASRV Exploit; Sasser Worm Update: Sasser.b |
Updated: Security bulletins from Sun, more Dameware |
Updates on DNS Poisoning / Peru Offline / Mailbag and other stories... |
Updates on IE vulnerability |
Updating early and often; NPR gets it right |
UPEK fingerprint scanners insecure, says Elcomsoft |
Upgrading ODI to 11g |
Upgrading Software From 350 Million Miles Away |
UPnP Problems |
UPnP scan shows 50 million network devices open to packet attack |
UPS raises dividend to 62 cents from 57 cents |
URGENT: New version of Beagle hitting |
US accused of hypocrisy over cyber warfare |
US activist released from Vietnam after 9 months |
US Activists Oppose US Govt Calls To Weaken EU Privacy Rules |
US Air Force Scraps ERP Project After $1 Billion Spent |
US Authorities Start Extradition Process in Megaupload Case (March 5, 2012) |
US banks hit by more than a week of cyberattacks |
US blaming Iran for Persian Gulf cyberattacks |
US CEO Says French Workers Have Three-Hour Work Day |