| "6tus Layer Specification" - Qin Wang, Xavier Vilajosana, Thomas Watteyne |
| "A Common Operational Problem in DNS Servers - Failure To Respond." - Mark Andrews |
| "A framework for RPs to use IKEv2 KMP" - Uma Chunduri, Albert Tian, Joseph Touch |
| "A Framework for Semantic IPv6 Prefix" - Sheng Jiang, Qiong Sun, Ian Farrer, Yang Bo |
| "A Generic Bundle Mechanism for the Session Description Protocol (SDP)" - Dale Worley |
| "A Reputation Query Protocol" - Nathaniel Borenstein, Murray Kucherawy |
| "A Security Threat Analysis for Routing over Low-Power and Lossy Networks" - Tzeta Tsao, Roger Alexander, Mischa Dohler, Vanesa Daza, Angel Lozano |
| "A Simple Secure Address Generation Scheme for IPv6 AutoConfiguration (SSAS)" - Hosnieh, Christoph Meinel |
| "A Summary of Various Mechanisms Deployed at L-Root for the Identification of Anycast Nodes" - Joe Abley |
| "A workaround for termination of IPv4 network services" - Hiroaki Hazeyama, Atsushi Onoe, Osamu Nakamura |
| "Allocating and Retiring Special Purpose MPLS Labels" - Kireeti Kompella, Adrian Farrel |
| "Allocating and Retiring Special Purpose MPLS Labels" - Kireeti Kompella, Loa Andersson, Adrian Farrel |
| "Analysis of Comparisons between OpenFlow and ForCES" - Susan Hares |
| "Applicability of Access Node Control Mechanism to PON based Broadband Networks" - Nabil Bitar, Sanjay Wadhwa, Thomas Haag, Li Hongyu |
| "Attribute-Value Pairs For Provisioning Customer Equipment Supporting IPv4-Over-IPv6 Transitional Solutions" - Cathy Zhou, Tom Taylor |
| "Authenticated Identity Management in the Session Initiation Protocol (SIP)" - Jon Peterson, Cullen Jennings, Eric Rescorla |
| "Autonomous Extensible Internet with Network Address Translation(AEIP NAT)" - Diao Yongping, Ming Liao, Yuping Diao |
| "Benchmarking Neighbor Discovery Problems" - William Cerveny |
| "BGP FRR Protection against Edge Node Failure Using Vector Labels" - Ahmed Bashandy, Nagendra Kumar, Maciek Konstantynowicz |
| "BGP IP VPN Data Center Interconnect" - Luyuan Fang, Rex Fernando, Dhananjaya Rao, Dhananjaya Rao |
| "BGPSEC Protocol Specification" - mlepinski.ietf@gmail.com |
| "Binary Encodings for JavaScript Object Notation: JSON-B, JSON-C, JSON-D" - Phillip Hallam-Baker |
| "Careerbuilder Job Application" email scam with Dynamic DNS |
| "CDNI Control Interface / Triggers" - Rob Murray, Ben Niven-Jenkins |
| "CLUE Signaling" - Paul Kyzivat, Lennard Xiao, Christian Groves |
| "CLUE Switching Mixer Example" - Mark Duckworth |
| "Controlled Delay Active Queue Management" - Kathleen Nichols, Van Jacobson |
| "CUSAX: Combined Use of the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Emil Ivov, Enrico Marocco, Peter Saint-Andre |
| "CUSAX: Combined Use of the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Emil Ivov, Peter Saint-Andre, Enrico Marocco |
| "DANE TLSA implementation and operational guidance" - Viktor Dukhovni |
| "DECADE: DECoupled Application Data Enroute" - Richard Alimi, Akbar Rahman, Dirk Kutscher, Yang Yang, Haibin Song, Kostas Pentikousis |
| "Definition of Managed Objects for the Optimized Link State Routing Protocol version 2" - Ulrich Herberg, Robert Cole, Thomas Clausen |
| "Delay Tolerant Networking Email Convergence Layer Protocol" - Bjoern Gernert, Sebastian Schildt |
| "DHCPv4 over A+P softwires" - Ole Troan |
| "Diameter Overload Control Solution Issues" - Ben Campbell |
| "Distributed Mobility Management: Service flows distribution and handoff technique based on MIPv6" - Liu Min, Yuwei Wang |
| "DNS Root Name Service Protocol and Deployment Requirements" - Marc Blanchet, Lars-Johan Liman |
| "Domain Name Registration Data Access Protocol Object Inventory Analysis" - Linlin Zhou, Ning Kong, Sean Shen, Steve Sheng |
| "Dynamic RP encodings in BGP based MVPNs" - Pavan Kurapati, Marco Rodrigues, Kurt Windisch, Saud Asif |
| "Emergency Services Support in WebRTC" - Bernard Aboba, Martin Thomson |
| "Event Publishing Extensions to iCalendar" - Mike Douglass |
| "Explicit RPF Vector" - Javed Asghar, IJsbrand Wijnands, Sowmya Krishnaswamy, Apoorva Karan, Vishal Arya |
| "Extending an IPv6 /64 Prefix from a 3GPP Mobile Interface to a LAN" - Cameron Byrne, Dan Drown, Vizdal Ales |
| "Extensions to RSVP-TE for P2MP LSP Egress Local Protection" - Huaimo Chen, So Ning, Autumn Liu, Fengman Xu, Mehmet Toy, Lei Liu |
| "Extensions to Secure Shell Public Key Subsystem" - Mark Joseph, Jim Susoy |
| "Free" exchange rate conversion |
| "Gotchas" to Look for When Hiring an ERP Consultant |
| "Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)" - Ali Begen, Colin Perkins, Dan Wing, Eric Rescorla |
| "Home Documents for HTTP Services: XML Syntax" - Erik Wilde |
| "HTTP Client Hints" - Ilya Grigorik |
| "HTTP Digest Update" - Rifaat Shekh-Yusef, David Ahrens |
| "HTTP Origin and Hop Hints" - Mark Nottingham |
| "HTTP Session Management" - Phillip Hallam-Baker |
| "Channel Binding Signalling for the Generic Security Services Application Programming Interface" - Nico Williams |
| "IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters" - Donald Eastlake, Joe Abley |
| "IANA Guidance for Managing the ULE Registry" - Gorry Fairhurst |
| "ICANN Registry Interfaces" - Gustavo Lozano |
| "IGP Extensions for Stateful PCE Discovery" - Siva Sivabalan, Jan Medved, Xian Zhang |
| "In-Band Authentication Extension for Protocol Independent Multicast" - Manav Bhatia, Dacheng Zhang, Bharat Joshi |
| "Indoor Signal Position Conveyance" - Kipp Jones, Christopher Steger |
| "Instant Messaging and Presence Purpose for the Call-Info Header in the Session Initiation Protocol (SIP)" - Peter Saint-Andre |
| "Interoperability between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Chris Christou, Michael Lundberg, Christopher Ross, Peter Saint-Andre |
| "Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Addresses and Error Conditions" - Peter Saint-Andre, Avshalom Houri, Joe Hildebrand |
| "Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Groupchat" - Peter Saint-Andre, Salvatore Loreto, Saul Corretge, Fabio Forno |
| "Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Media Sessions" - Peter Saint-Andre |
| "Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): One-to-One Text Chat" - Peter Saint-Andre, Salvatore Loreto, Eddy Gavita, Nazin Hossain |
| "IODEF Usage Guidance" - Panos Kampanakis |
| "IPv6 Email Authentication" - Douglas Otis, David Rand |
| "Key Wrapping with AES GCM for JWE" - Michael Jones |
| "Lawful-Intercept Support for SP Wi-Fi Deployments" - Byju Pularikkal, Sri Gundavelli, Mark Grayson, Rajat Ghai |
| "Layer 2 (L2) LISP Encapsulation Format" - Michael Smith, Dinesh Dutt, Dino Farinacci, Fabio Maino |
| "Link Management Protocol (LMP) Test Messages Extensions for Evolutive Optical Transport Networks (OTN)" - Daniele Ceccarelli, Diego Caviglia, Francesco Fondelli, Fatai Zhang, Dan Li, Dieter Beller |
| "LISP Based FlowMapping for Scaling NFV" - sbarkai@gmail.com, Dino Farinacci, David Meyer, Fabio Maino, Vina Ermagan |
| "LISP Based FlowMapping for Scaling NFV" - Sharon Barkai, Dino Farinacci, David Meyer, Fabio Maino, Vina Ermagan |
| "Macros Nixed by Major Providers" - Douglas Otis, David Rand |
| "Management of Networks with Constrained Devices: Problem Statement, Use Cases and Requirements" - Mehmet Ersue, Dan Romascanu, Juergen Schoenwaelder |
| "Managing SSH Keys for Automated Access - Current Recommended Practice" - Tatu Ylonen, Greg Kent |
| "Middlebox considerations in NVO3 overlay networks" - Melinda Shore, Gu Yingjie, Senthil Sivakumar |
| "Mounting YANG-Defined Information from Remote Datastores" - Alex Clemm, Jan Medved, Eric Voit |
| "Multiplexing Negotiation Using Session Description Protocol (SDP) Port Numbers" - Christer Holmberg, Harald Alvestrand, Cullen Jennings |
| "Multi-Upstream Interfaces IGMP/MLD Proxy" - Hong-Ke Zhang, Thomas Schmidt |
| "Network Management of Mobile Ad hoc Networks (MANET): Architecture, Use Cases, and Applicability" - James Nguyen, Robert Cole, Ulrich Herberg, Jiazi Yi, Justin Dean |
| "Network Virtualization Overlay Control Protocol Requirements" - Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari Sridharan |
| "New" slammer and BHO's |
| "NVGRE Router Alert Option" - Kanwar Singh, Pradeep Jain, Florin Balus, Wim Henderickx |
| "NVGRE-EXT: Network Virtualization using Generic Routing Encapsulation Extensions" - Murari Sridharan, Yu-Shun Wang, Pankaj Garg, Praveen Balasubramanian |
| "OAuth 2.0 Token Revocation" - Torsten Lodderstedt, Stefanie Dronia, Marius Scurtescu |
| "OmniBroker Protocol" - Phillip Hallam-Baker |
| "Operational Considerations Regarding Reputation Services" - Murray Kucherawy |
| "OSPF Incremental Link State Database Synchronization" - Alvaro Retana, Acee Lindem |
| "P6R's Secure Shell Public Key Subsystem" - Mark Joseph, Jim Susoy |
| "PCP Considerations for WebRTC Usage" - Reinaldo Penno, Tirumaleswar Reddy, Dan Wing, Mohamed Boucadair |
| "PCP Extension for Third Party Authorization" - Dan Wing, Tirumaleswar Reddy, Prashanth Patil, Reinaldo Penno |
| "Precursor Notification for dynamic MANET On-demand (AODVv2) Routing" - Charles Perkins |
| "Prefix Delegation Support for Proxy Mobile IPv6" - Xingyue Zhou, Jouni Korhonen, Carl Williams, Sri Gundavelli, Carlos Bernardos |
| "Problems with STUN Authentication for TURN" - Tirumaleswar Reddy, Ram R, Muthu Perumal, Alper Yegin |
| "Profile Support for the Atom Syndication Format" - Erik Wilde |
| "Proposed Refactoring of JOSE to Align Encryption and Key Wrapping" - Richard Barnes |
| "Protocol to Access White Space (PAWS) Database: Use Cases and Requirements" - Anthony Mancuso, Scott Probasco, Basavaraj Patil |
| "PSC protocol updates for non-revertive operation" - Tae-sik Cheung, Alessandro D'Alessandro, Huub van Helvoort |
| "Pseudowire Setup and Maintenance using the Label Distribution Protocol" - Luca Martini, Giles Heron |
| "RADIUS Attribute for 4rd" - Sheng Jiang, Yu Fu, Bing Liu |
| "RADIUS Extensions for DS-Lite Multicast" - Jie Hu, Wei Meng, Cui Wang |
| "Reconfigure Triggered by DHCPv6 Relay Agents" - Mohamed Boucadair, Xavier Pougnard |
| "Recursive PCP" - Stuart Cheshire |
| "Redirection Service for Registration Data Access Protocol" - Carlos Martinez, Arturo Servin, Linlin Zhou, Dario Gomez, Gerardo Rada |
| "Registration of Second-Level URN Namespaces Under "ietf"" - Barry Leiba |
| "Requirements for Ethernet VPN (E-VPN)" - Ali Sajassi, Rahul Aggarwal, Nabil Bitar, Aldrin Isaac |
| "Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) extension for recording TE Metric of a Label Switched Path" - Zafar Ali, George Swallow, Clarence Filsfils, Matt Hartley, Kenji Kumaki, Ruediger Kunze |
| "Router Advertisement based privacy extension in IPv6 autoconfiguration" - Hosnieh, Christoph Meinel |
| "Routing for IPv4-embedded IPv6 Packets" - Dean Cheng, Mohamed Boucadair, Alvaro Retana |
| "RTCP XR Report Block for One Way Delay metric Reporting" - Ray van Brandenburg, Kevin Gross, Wenson Wu, Fernando Boronat, Mario Montagud |
| "RTCWeb Data Channels" - Randell Jesup, Salvatore Loreto, Michael Tuexen |
| "RTP payload format for Enhanced Variable Rate Narrowband-Wideband plus 2kbps Codec (EVRC-NW2K)" - Alok Gupta |
| "rxgk: GSSAPI based security class for RX" - Simon Wilkinson, Benjamin Kaduk |
| "Scenarios and Requirements for IP in Intelligent Transportation Systems" - Alexandru Petrescu, Christophe Janneteau, Michael Boc, Witold Klaudel |
| "SDP for the WebRTC" - Suhas Nandakumar, Cullen Jennings |
| "Segment Routing with IS-IS Routing Protocol" - Stefano Previdi, Clarence Filsfils, Ahmed Bashandy, Martin Horneffer, Bruno Decraene, Stephane Litkowski, Igor Milojevic, Rob Shakir, Saku Ytti, Wim Henderickx, Hannes Gredler |
| "Segment Routing with IS-IS Routing Protocol" - Stefano Previdi, Clarence Filsfils, Ahmed Bashandy, Martin Horneffer, Bruno Decraene, Stephane Litkowski, Igor Milojevic, Rob Shakir, Saku Ytti, Wim Henderickx, Jeff Tantsura |
| "Significance of IPv6 Interface Identifiers" - Brian Carpenter, Sheng Jiang |
| "Sophisticated Android Trojan" identified |
| "Supporting the Exercise command for PSC linear protection protocol" - Alessandro D'Alessandro, Jeong-dong Ryoo, Huub van Helvoort |
| "Survey of P2P Streaming Applications" - Gu Yingjie, Ning Zong, Yunfei Zhang, Francesca Piccolo, Shihui Duan |
| "Survey Report on PIM-SM Implementations and Deployments" - Lianshu Zheng, Jeffrey Zhang, Rishabh Parekh |
| "Terrorist" Lyrics Land High Schooler In Jail |
| "The Applicability of the PCE to Computing Protection and Recovery Paths for Single Domain and Multi-Domain Networks." - Huaimo Chen, Dhruv Dhody |
| "The application/firmware, application/firmware-receipt, and application/firmware-error media types" - Sean Turner, Russ Housley |
| "The IETF Profile URI Registry" - Markus Lanthaler |
| "The Internet Numbers Registry System" - Russ Housley, John Curran, Geoff Huston, David Conrad |
| "The LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (LOADng)" - Thomas Clausen, Axel Verdiere, Jiazi Yi, Afshin Niktash, Yuichi Igarashi, Hiroki Satoh, Ulrich Herberg, Cedric Lavenu, Thierry Lys, Charles Perkins |
| "the question is not “why should we have CME IDs” but “how do we make CME IDs work?" |
| "The Subnetwork Encapsulation and Adaptation Layer (SEAL)" - Fred Templin |
| "The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)" - Inaki Castillo, Jose Millan, Victor Pascual |
| "TMCH functional specifications" - Gustavo Lozano |
| "Transaction SIGnature (TSIG) using CGA Algorithm in IPv6" - Hosnieh, martin@v.loewis.de, Christoph Meinel |
| "Transparent Interconnection of Lots of Links (TRILL) Use of IS-IS" - Donald Eastlake, Anoop Ghanwani, Radia Perlman, Dinesh Dutt, Ayan Banerjee |
| "Transport of London" Malicious E-Mail |
| "Transporting Timing messages over MPLS Networks" - Shahram Davari, Amit Oren, Manav Bhatia, Peter Roberts, Laurent Montini |
| "Traversal Using Relays around NAT (TURN) Extensions for Websocket Allocations" - Chen Xin |
| "TRILL: Adjacency" - Donald Eastlake, Radia Perlman, Anoop Ghanwani, Vishwas Manral |
| "Trust Requirements in a Federated World" - Josh Howlett, Rhys Smith, Margaret Wasserman |
| "Tunneling Compressed Multiplexed Traffic Flows (TCMTF)" - Jose Saldana, Dan Wing, Julian Navajas, Muthu Perumal, Fernando Blanco |
| "Using Extended Key Usage (EKU) for REsource LOcation And Discovery (RELOAD) X.509 Certificates" - Marc Petit-Huguenin |
| "Virtual Private Lan Services (VPLS) Management Information Base" - Thomas Nadeau, Kiran Koushik, Rohit Mediratta |
| "VPLS external Loop Protection Mechanism (VLPM)" - Richard Boldy |
| "Vulnerability Data Model" - harold.booth@nist.gov, Karen Scarfone |
| "VXLAN DCI Using EVPN" - Sami Boutros, Ali Sajassi, Samer Salam, Dennis Cai |
| "VxLAN Router Alert Option" - Kanwar Singh, Pradeep Jain, Florin Balus, Wim Henderickx |
| "X.509v3 TLS Feature Extension" - Phillip Hallam-Baker |
| "XML Schemas for Reverse DNS Management" - Terry Manderson |
| #49, Does Your Search Engine Need A Tune-up?, On The Soapbox, Auld Lang Syne |
| #DF12 Dreamforce - the Social Trade Show |
| #DF12 Dreamforce Notes - CMO and Platform Dominate the Discussion |
| #DF12 Salesforce - More than Sales and CRM |
| #DF12 The Cloud - Is Corporate IT Missing the Party? |
| $5 Sensor Turns LCD Monitors Into Touchscreens |
| (Another) AOL Pwstealer |
| (Update #Last : 23:00GMT) Cisco! Pancho!; MetaMetasploit?; BrightStor Exploits/Scanner; It Takes a Village...; Mystery; GHH |
| (Updated) Additional info on yesterday's Linksys item, the importance of patching |
| (Updated) Another Russian Bank Scam, New Exploit for MS04-020 |
| * {update #2} .org dns problems, RFI - Russian IIS Hacks? |
| * 0-Day Win32 holes, Oracle&DB2 Revisited, Snort DoS Update, IRC over SMTP, Santy Poll Results |
| * A Critical IE Patch Released / Why the Internet is Like an Elephant |
| * Back to Green |
| * DNS Cache Poisoning Report; Increase in Port Activity |
| * DNS Cache Poisoning Report; Increase in Port Activity; SANS Conference |
| * Internet Explorer 0-day exploit |
| * Microsoft Patch for IFRAME vulnerability |
| * Microsoft Patches Coming Today |
| * Microsoft Releases 8 Critical Security Patches, etc. |
| * Microsoft Security Bulletins for June 2004 |
| * MS06-040 exploit in the wild |
| * MS06-042 reissue |
| * MySQL Bot |
| * New DNS cache poisoning server; DNS Poisoning stats; Bluemountain; Win2k3 SP1; awstat.pl Details; port 1025; MS05-002 problem |
| * New exploit released for the WMF vulnerability - YELLOW |
| * Update on Windows WMF 0-day |
| * UPDATE: phpBB Worm. Holiday Security Guide, Predictions for 2005, Sign that you take security too serious. (1 Comments) |
| * UPDATE: Possible MySQL Bot. New Juniper Vuln, Advice on managing X Windows security, Request for input on 2005 Critical Threats |
| * Updated: Serious Symantec Vulnerability, 1-day exploits, and the missing 13th patch |
| * Veritas Backup Exec 0-day; POC code available for multiple updated MS vulns; P2P on the Vista |
| * VML Update Released |
| * VMWare vulnerability announced and fixed |
| * Windows WMF 0-day exploit in the wild |
| *Intel Centrino Vulnerabilities |
| *Santy worm defaces websites using php bug |
| *Santy Worm Update, Snort 2.2 DoS, IRC over SMTP, SSH Scanning, An InfoSec Christmas Story |
| *WebViewFolderIcon ActiveX control exploit(s) in the wild |
| .COM.COM Used For Malicious Typo Squatting |
| .MSI installer file for WMF flaw available |
| .PUB Analysis |
| .wmf FAQ Translations |
| / Reading Logs / More Phishing / TCP 135, Welchia and Lovgate / Sasser slowing / Egress Filtering and You / |
| /dev/random |
| /tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters! |
| ‘FinFisher’ spyware can take over an iPhone or Android phones remotely |
| “Banned” iPhone 5 commercial |
| “Car Talk” on NPR to end soon |
| “Order” e-mails and how to block them |
| “Patch Tuesday” (14Mar13) is upon us |
| <em>Among Others</em> Wins Hugo For Best Novel |
| <em>Team Fortress 2</em> Beta Patch Adds Files Referring To Linux Support |
| <em>The Oatmeal</em> Begins a Fundraiser for a Nikola Tesla Museum |
| <i>Angry Birds</i> boss: Piracy helps us 'get more business' |
| 03/09 Webcast Update; Possible Adware/Spyware Infection Via Worm; The Pain of Dealing With IRCBot's |
| 0-day exploit for Microsoft PowerPoint |
| 0day this, 0day that, I've got the 0day blah's, as does Microsoft Office 2000 PPT |
| 0-Day Thursday: PoC for Powerpoint Vulnerability |
| 0x01 trojan update (ev1.net host), openssl proof of concept exploit, HP mystery ssh patch |
| 1 compromised site - 2 campaigns |
| 10 commandments of Windows security |
| 10 Disruptive Online Services Enterprises Should Ban From the Network |
| 10 questions for Layer 7 Technologies CTO Scott Morrison |
| 10 Signs that your project may be doomed |
| 10 things you need to know today: March 21, 2013 |
| 100% Compliant (for 65% of the systems), (Fri, Jun 7th) |
| 100K Google Android Apps Pose Potensial Security Risk: Bit9 Report |
| 12 questions you may like to ask when recruiting an enterprise architect |
| 12/23/03 CitiBank/Visa Account Phishing, ISS IE URL Spoofing filter, Dameware scanning, Apple patch links |
| 12-year-old boy charged in Ashton Kutcher hoax |
| 16 ultimate SSH hacks |
| 17th Century Microscope Book Is Now Freely Readable |
| 18 Carriers Sign Up for Firefox OS Phones |
| 1976 Polaroids of an Apple-1 Resurface |
| 2 Cisco Vulnerabilities, New Auto-Executing Virus Capabilities (Bugbear.C), MacOS X Security Update, Metasploit Framework Release |
| 2004 - A Look Back - Your Choice for Diary of the Year - Happy New Years |
| 2005 SANS Top 20 |
| 2006 Predictions |
| 2006, Week 1: A Look at the Numbers |
| 2013 Security Breaches: A Bad Year Already |
| 2016-11-18 example of KaiXin EK activity |
| 21st IOCCC Source Code Released |
| 2222/tcp Probe Increase |
| 2222/tcp Probes |
| 24 BEA WebLogic Vulnerabilities and Security Issues |
| 2-factor auth poll-results; Sticky firewall question; Handling Incidents Involving Dynamic DNS; Sybase Buffer Overflow Vulnerability Details to Be Announced; Mac OS X Issues Released; Belated Happy N |
| 2nd generation WMF 0day Exploit Spammed |
| 2nd generation WMF exploit: status of the anti-virus products after one day. |
| 3 Questions to Ask "Cloud Computing Job Candidates" |
| 300 blogs |
| 3D Printers For Peace Contest |
| 40 Essential Mashable Stories You May Have Missed in 2012 |
| 404dnserror Adware |
| 419 Scams Now In Chat Rooms (1 Comments) |
| 4242/TCP Activity is up |
| 5 Microsoft Advisories |
| 5 Questions to Ask your IoT Vendors; But Do Not Expect an Answer. |
| 5 signs that you've lost control over your cloud apps |
| 5. PTF Identification (Part 1) URL and Page |
| 50 Million Potentially Vulnerable To UPnP Flaws |
| 50 Years of Research and Still No Microwave Weapons |
| 52 Digital Media Resources You May Have Missed |
| 522 Error Code for the Win |
| 6 adorable animals that interrupted sporting events |
| 6 bagle versions in 1 day |
| 6 Black Friday Scams to Fear |
| 6 of the saddest Valentine's Day apps (and one good one) |
| 6101 and 6129 scans on the rise; “infected links”; A reader Query; A Goodie Basket for Grandma |
| 65 Digital Media Resources You May Have Missed |
| 7 Craziest Intelligence Leaks in US History |
| 7 Modeling Tools To Help Assess Cloud ROI |
| 7. PTF File Access |
| 72% of Xbox 360 Gamers Approve of "More Military Drone Strikes" |
| 7sir7 Mass Hack Update / DNS Cache Poisoning / Phishing with a twist |
| 8.7 million mobile customers hacked in S.Korea |
| 802.11ad Will Knock Your Socks Off, Says Interop Panel |
| 80FFTs Per Second To Detect Whistles (and Switch On Lights) |
| 9 Data Centers: Unexpected Beauty |
| A $5,000 vulnerability in Facebook |
| A (Mostly) 3-D Printed Race Car Hits 140 Km/h |
| A .BUP File Is An OLE File |
| A Blood Test That Screens For Cancer |
| A Bump in the Wire |
| A Bunch Of Bull in a China Shop |
| A busy Black Tuesday coming up..... |
| A cavity in Linux Bluetooth? |
| A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers |
| A Collaborative Way of Working: Oracle E-Business Suite Integration |
| A Conversation with the President of the Open Source Initiative (Video) |
| A couple of handy iptables tutorials |
| A Day Early, Google's at it With 8-Bit Google Maps - for April Fools' 2012 |
| A day in the life of a pentester, or is my job is too sexy for me? |
| A Few Improvements for Firefox's Android UI |
| A few Mirai Updates: MIPS, PPC version; a bit less scanning |
| A few preliminary log analysis thoughts |
| A Few Thoughts on the Recent MySpace Worm |
| A Glimpse At Piracy In the UK and Beyond |
| A Good Day for Phishing; SSH Followup; NIMDA, Still There; Tip for the Day |
| A handful of bugs, a fix, and some good reading |
| A Humanoid Robot Named "Baxter" Could Revive US Manufacturing |
| A Lesson Learned from the Mailbox |
| A loan offer or two |
| A Look at the Mandiant M-Trends 2016 Report |
| A Look Inside a Dirty Computer |
| A look through the spam filters - examining waves of Upatre malspam |
| A Major Shift in Cyber Security of Industrial Control Systems (February 5, 2013) |
| A malware jungle |
| A new botnet - Mocbot |
| A new DB2 for z/OS Redbook draft is now available for download |
| A new tool to detect & remove malware |
| A Nonsensical Proposal - Beta Patches |
| A Peek Into The MailBag |
| A phased approach to IPv6 that's so easy, you'll almost think you're still ignoring it |
| A Piezoelectric Pacemaker That Is Powered By Your Heartbeat |
| A possible first example of user interface exploits in Internet Explorer; Holiday gift-giving |
| A Quarter of Sun-Like Stars Host Earth-Size Worlds |
| A question; New MSBA; Finding zlib; Evading Snort; Some Reading; FTBM VI: Hypnotized and EULAgized |
| A Quick Guide-BI Platform & Implementation Strategy |
| A quiet day on the Internet |
| A Real-Time Map of Global Cyberattacks |
| A recent decline in traffic associated with Operation Windigo |
| A recent example of wire transfer fraud |
| A Report from the Field |
| A Report on ICANN 43: New gTLDs and DNSSEC |
| A Robot With a Chainsaw! |
| A Sad-day for Customer Service |
| A Sea Story: the Wreck of the Replica HMS Bounty |
| A Security Sampler |
| A slew (well, a couple) of new vulns, more on weird DNS traffic and a mystery app |
| A Snapshot of the Inside of an Atom |
| A sober New Years update. |
| A TCP/IP mystery (solved) |
| A Terrifying Tale of TCP ... Terror |
| A Tip For The Analysis Of MIME Files |
| A Tool to Create PS Role Matrix with Navigations |
| A Trail of Clicks, Culminating In Conflict |
| A trip through the spam filters: more malspam with zip attachments containing .js files |
| A trojan that deletes spyware? - More botnet fun - World record attempt |
| A TWiki Vulnerability Allows Remote Code Execution |
| A very [word beginning with 'q' deleted] day and helpful links |
| A Wall Against Cryptowall? Some Tips for Preventing Ransomware |
| A Wi-Fi Wardriving Motorbike — With Plans Available |
| A wild ride last month. |
| Aaron Swartz Isn't the First Hacker to Commit Suicide in the Face of a Federal Investigation |
| Aaron Swartz's Estate Seeks Release of Documents |
| Aaron's Law: Violating a Site's ToS Should Not Land You in Jail |
| Abuse handling and the misfortunes of the good Samaritan |
| Abusing Oracles |
| Academia joins in battling Android malware |
| ACDSee Fotoslate DLL Loading Arbitrary Code Execution Vulnerability |
| ACDSee Photo Editor 2008 DLL Loading Arbitrary Code Execution Vulnerability |
| ACDSee Picture Frame Manager DLL Loading Arbitrary Code Execution Vulnerability |
| ACLU: Most US police don't seek warrants before tracking cell phones |
| Acrobat Reader Vulnerabilities - FreeBSD Security Benchmark - Phishing Season |
| Acronis vmProtect 7 Tightens vSphere Integration |
| Active exploit of Open Conference Systems web application |
| ActiveX Kill Bit Can Be Bypassed - Another Reason to Apply MS05-054? |
| Activists urge Skype: Tell us who is spying on us |
| Activity increase on Port 12345; More Phishing; Ethereal Exploit |
| Actor that tried Neutrino exploit kit now back to Angler |
| Actor using Angler exploit kit switched to Neutrino |
| Actor using Rig EK to deliver Qbot - update |
| Actors using exploit kits - How they change tactics |
| acts of terrorism trojan |
| Actual Final Third Party Debate Tonight |
| ACTUALIZA1-Chinas Huawei, Zte deben ser excluidas EEUU: comisión |
| Ad Blocking – a Coming Legal Battleground? |
| AD Security's Unofficial Guide to Mimikatz & Command Reference |
| Adafruit Launches Educational Show Aimed At Kids |
| Adaware corrects their false positives |
| Additional notes on Stumbler. |
| ADF BC, Overriding prepareSession, and PL/SQL |
| Administrata; MS05-026 exploits in the field? No, not really; OpenRBL ist Kaput; Passive Reconnaissance and the Disaster Response threat-space; mod_jrun exploit sweep |
| Adobe Acrobat and Reader Pre-Announcement |
| Adobe Acrobat Update |
| Adobe backpedals, will now patch software for free |
| Adobe backs down, patches critical Photoshop CS5 hole |
| Adobe backs down, will release patches for critical holes |
| Adobe Connect Security Breach Exposes Personal Data of 150K Users |
| Adobe Flash Player Bug Spreading Via Word Documents in Emails |
| Adobe Flash Player Update |
| Adobe Flash Player update http://www.adobe.com/support/security/bulletins/apsb12-22.html, (Tue, Oct 9th) |
| Adobe Flash player upgrade time |
| Adobe Flash Update |
| Adobe Flash update available |
| Adobe Flash update closes several critical holes |
| Adobe Flash Update: Here we go again!! |
| Adobe Hopes Pop-up Warnings Will Stop Office-Borne Flash Attacks |
| Adobe Issues Another Flash Player Fix (March 5, 2012) |
| Adobe Issues Emergency Flash Player Patches to Block Cyber Attacks |
| Adobe Issues Reader, Acrobat Security Updates to Stave Off Attacks |
| Adobe January 2017 Patches |
| Adobe open sources Malware Classifier tool |
| Adobe Patch Tuesday - February 2016 |
| Adobe patches critical Flash bugs, ships sandboxed plug-in for Firefox |
| Adobe patches new Flash zero-day bug with emergency update |
| Adobe Reader Update |
| Adobe releases critical security updates for Reader, Flash Player and ColdFusion |
| Adobe releases open source malware classification tool |
| Adobe Releases Surprise Shockwave Player Patch |
| Adobe Revoking Code Signing Certificate Used To Sign Malware |
| Adobe scrambles to revoke stolen cert |
| Adobe switches Flash fix schedule to Patch Tuesdays |
| Adobe Update to Vulnerabilities, (Sat, May 12th) |
| Adobe Updates Flash Player, Shockwave and PDF Reader |
| Adobe Updates for Flash Player. More info can be found here --> http://www.adobe.com/support/security/bulletins/apsb12-14.html, (Sat, Jun 9th) |
| Adobe Updates Shockwave Player |
| Adobe will be changing Creative Suite to a subscription model after CS6 |
| Adobe Working on Patches for Newly Discovered Zero-Day Code Flaws |
| Adobe: Pay upgrade price to patch critical bugs |
| Adobe: Photoshop is not a target for attackers |
| Adobe's Creative Cloud Illustrates How the Cloud Costs You More |
| Adobe's security chief praises Apple for Flash-crippling move |
| ADODB.connection Vuln |
| Adore-ng 0.31 released and POC code for do_mremap() |
| Advance info for Patch Tuesday; Yellow; DNS cache poisoning update |
| Adventures in Hunting Rogue Wireless Access Points |
| Advocacy group takes aim at antiporn bill requiring ISP data retention |
| Adwind: another payload for botnet-based malspam |
| African Robotics Network Challenge Spurs Rash of $10 Robots |
| African Soil Mapped For the Very First Time |
| After 24 hours of fun we are back online! |
| After Aaron Swartz's Death, the Focus Now Falls On the Prosecutors |
| After Flash, what will exploit kits focus on next? |
| After Weeks of Trying, UK Cryptographers Fail To Crack WWII Code |
| Aftermath of Microsoft's October Bulletins, more bots, and Linux rootkits |
| Agile Development Teams CAN build secure software |
| AI System Invents New Card Games (For Humans) |
| aim for a gdi exploit. |
| AIM Phishing, Windows file integrity flashback, pstools vulnerability |
| AIM worm and AV... |
| Air Force Looking To Beef Up Spacecraft Network Security |
| Air Quality Apps and Bottled Air Thrive On Beijing's Pollution |
| Airlines Face Acute Pilot Shortage |
| Akamai Problems, New Angle(r) On An Old Phish |
| Akamai problems. Quiet, well kinda quiet, day on the Internet |
| Akamai/Internet DNS Problems (Updated), Exploitation of IE URL Spoofing, MS Re-Releases NT 4.0 Patch, ISC Site Under Heavy Load |
| Al Jazeera says hackers sent false mobile texts |
| Alan Cox: Fedora 18 "The Worst Red Hat Distro," Switches To Ubuntu |
| Alcatel CEO to leave after company swings to 2012 loss |
| ALERT - Black Ice Worm |
| All CVE Details at Your Fingertips |
| All Five Star Trek Captains Share a Stage |
| All I want for christmas are my exploits.... |
| All quiet on the MAE Western front |
| All-At-Once Operations in SQL: A Flaw In The Language? |
| All's quiet on the Internet ... |
| Ally Financial latest U.S. bank to face cyber attack |
| Ally Financial latest U.S. bank to face cyber attacks |
| Alpha Centauri Has an Earth-Sized Planet |
| Always get permission - VA stolen laptop recovered |
| Amarok 2.6 Music Player Released |
| Amateurs battle malware, hackers in UK cybergames |
| Amazing Mindreader Reveals Scary Truth [VIDEO] |
| Amazon and Google Barred From UK Government Cloud |
| Amazon Buys Sunlight Readable Color Display Company Liquavista |
| Amazon Charges Sales Tax On "Shipping and Handling" |
| Amazon launches Android app store in China |
| Amazon Recalling Sony CRM CD's |
| Amazon To Launch Sydney Data Center |
| Amazon Woes |
| Amazon woos enterprise with Virtual Private Cloud |
| Amazon, Microsoft Partner Up for Cloud Management |
| AMD Files Suit Against Former Employees For Alleged Document Theft |
| AMD Forums Uh-Oh |
| AMD Launches New Mobile APU Lineup, Kabini Gets Tested |
| AMD Next-Gen Graphics May Slip To End of 2013 |
| AMD Releases UVD Engine Source Code |
| AMD Reportedly Preparing Massive Layoff |
| AMD Trinity APUs Stack Up Well To Intel's Core 3 |
| AMD Unveils Elite A-Series APUs With Enhanced Performance, Improved Efficiency |
| AMD, Intel Partner to Form Cyber Security Research Alliance |
| AMD's Next-Gen Steamroller CPU Could Deliver Where Bulldozer Fell Short |
| American democracy activist returns to US, lands in LA after 9-month detention in Vietnam |
| Amid Fiscal Uncertainty Venture Capital Is Way Down In Silicon Valley |
| Amnesty International's UK website compromised to infect visitors with cyberspying malware |
| Amsterdam Using Airbnb Listings To Identify Illegal Hotels |
| An Analysis of Jester's QR Code Attack. (Guest Diary), (Sun, Mar 11th) |
| An anti-virus goof; security awareness; and a return visit from some old friends; phishers, and sasser |
| An Assessment of the Oracle Password Hashing Algorithm |
| An Assignment From Professor Packetslinger of the School of Loose Screws |
| An Impromptu Lesson on Passwords .., (Mon, Apr 30th) |
| An ISC Back to School Special |
| An oldie but a goodie - 419 Death Scam |
| An Oven That Runs Android |
| An Overview of the FreeVideo Player Trojan |
| An unpatched IE exploit invokes a second older unpatched IE exploit |
| Analysis of botnet spamming trojan (SecureWorks) |
| Analysis of Mocbot Goals |
| Analyze of a Linux botnet client source code |
| Analyze of a malicious Word document with an embedded payload |
| Analyzing evidence of DNS attacks in PIX firewall logs; Trojans for industrial espionage; openrbl.org offline? |
| Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan, (Fri, Sep 14th) |
| Analyzing Office Maldocs With Decoder.xls |
| Analyzing outgoing network traffic, (Thu, Aug 23rd) |
| Analyzing Quarantine Files |
| Analyzis of a Malicious .lnk File with an Embedded Payload |
| Anatomy of a global bank cyber theft |
| Ancestor of All Placental Mammals Revealed |
| Ancient Egyptian Tech May Be Key To Printing 3D Ceramics |
| Ancient vulnerability sparks world-wide hypegasm |
| And *another* 0-day Linux kernel vulnerability |
| and little flaws in IVE |
| And now, for something completely different! A novel use for an iPad.. |
| And Now, the Cartoon News |
| And the SHA-3 title goes to .....Keccak, (Thu, Oct 4th) |
| And Today is Super Tuesday |
| Android a photo-slurper too: report |
| Android adware capability a vulnerability, claim boffins |
| Android Apps Don't Need Permission to See Your Data |
| Android bot attacks rooted smartphones |
| Android in enterprises 'severely limited' by weak management support from Google |
| Android Malware "Obad" Called Most Sophisticated Yet |
| Android Malware Botnet Claims Doubted as Researchers Review Evidence |
| Android Malware Intercepts Text Messages, Forwards To Criminals |
| Android malware writers exploit Instagram craze to distribute SMS Trojan horse |
| Android Phone Hacked by Researchers via NFC - Security - News & Reviews - eWeek.com |
| Android smartphones infected via drive-by exploit |
| Android smartphones: USSD calls can kill SIM cards |
| Android Stagefright multimedia viewer prone to remote exploitation |
| Android threats growing in number and complexity, report says |
| Android Trojan distracts Japanese with anime and porn |
| Android Trojan leaves 100,000 users out of pocket |
| Android, iOS bugs expose phones to voyeurs, data thieves |
| Angler EK campaign targeting several .co domains deploying teslacrypt 3.0 malware |
| Angler exploit kit generated by "admedia" gates |
| Angler Exploit Kit, Bedep, and CryptXXX |
| Angler's best friends |
| Animation Sophistication: The Croods</em> Required 80 Million Compute Hours |
| Announcing ISCAlert - Email Worms Bog Down ISPs |
| Annual "Worst CEO" List Released |
| Anomaly Detection |
| Anonymous attacks Israeli websites over Gaza bombings |
| Anonymous Australia Disavows Self-Proclaimed LulzSec Leader |
| Anonymous blows off WikiLeaks, calls Assange a sellout after Lady Gaga dinner |
| Anonymous Claims Attack on Facebook |
| Anonymous claims it hacked a DOJ site |
| Anonymous doxes Cambodia after Pirate Bay arrest |
| Anonymous Files Petition To Make DDoS Legal Form of Protest |
| Anonymous Group Hackers Claim Top Universities Are Easy Targets |
| Anonymous Hackers Claim Protest Attacks Hit Zynga, Facebook, Others |
| Anonymous Hacking Tool Infected With Trojan (March 5, 2012) |
| Anonymous hater claims responsibility for Pirate Bay DDoS attack |
| Anonymous releases sample of Australian telco's data |
| Anonymous stalking Australian spooks |
| Anonymous takes down UK government websites in Assange attack |
| Anonymous takes out Indian CERT as attacks continue |
| Anonymous targets Home Office and other government websites |
| 'Anonymous' targets Israeli websites over Gaza war |
| Anonymous threat shutters Gitmo WiFi |
| Anonymous threatens cyberwar on North Korea, steals 15,000 passwords |
| Anonymous threatens to DDOS root Internet servers |
| Anonymous wants DDoS attacks recognized as speech |
| Another 0-Day Exploit - CVE-2006-4777 |
| Another Active Day |
| Another backdoor in networking hardware for industrial systems |
| Another Day - Another Ransomware Sample |
| Another day in the life - Padobot, ports 5000, 135, 445 |
| Another day, another bot being spammed |
| Another Day, Another Malicious Behaviour |
| Another Day, Another Spam... |
| Another Day, Another Wave of Phishing Emails |
| Another EUSecWest NFC Trick: Ride the Subway For Free |
| Another example of Angler exploit kit pushing CryptoWall 3.0 |
| Another great course, but this time for prestigious jobs seekers |
| Another IE Exploit makes the rounds... |
| Another Java Exploit For Sale |
| Another Juniper problem - Juniper Bulletin PSN-2005-11-003 from 11/04/05 |
| Another Malicious Document, Another Way to Deliver Malicious Code |
| Another month another password disclosure breach, (Thu, Nov 15th) |
| Another new Word 0-day, information & dat released by McAfee |
| Another Phishing Trick; More Osama Messages; Crunchy-Gooey Security Designs |
| Another Player In the World of Free, Open Online CS Courseware |
| Another PnP Worm; Feedback from Microsoft; Reader Mailbag; Johannes Redux; Apple Security Patches |
| Another round of DNS cache poisoning |
| Another Virus, ISC Poll Results, Port 1433 scans |
| Another wave of virus / New Gaobot / HP Web JetAdmin Vulnerability exploitation |
| Another WMF attack vector? |
| Anthropologist Spends Three Years Living With Hackers |
| Anti-Israel hackers leak nuclear watchdog email addresses |
| Antiphishing.org Trend Report |
| Antisec Exposes 1 Million Apple Device IDs Following 'FBI Hack' |
| AntiSec hackers release 1 million stolen Apple device IDs – are you affected? |
| Anti-spam list shutoff; Special report on "phishing" attacks |
| Antivirus Firms "Won't Co-operate" With PC-Hacking Dutch Police |
| ANU puts quantum random numbers online |
| AOL ICQ vulnerabilities |
| AOL: the Good, the Bad and the Ugly |
| AP Exclusive: Iran poised for big nuke expansion (AP) |
| AP PHOTOS: In a digital age, paper stocks hang on |
| Apache attack drives traffic to malware |
| Apache CloudStack Becomes a Top-level Project |
| Apache POI CVE-2012-0213 Denial Of Service Vulnerability |
| Apache Traffic Server update closes important security hole |
| APAR Friday: A new optimization DSNZPARM keyword (HIPER) |
| APAR Friday: Another performance enhancement for UNLOAD |
| APAR Friday: Enhance REORG TABLESPACE PART performance |
| APAR Friday: Here's a list of APARs you should be checking out this week |
| Apple "Patch Tuesday" |
| Apple AirPort Firmware Update |
| Apple and Cisco Security Advisories 19 SEP 2012, (Thu, Sep 20th) |
| Apple and Mozilla take on Java vulnerabilities |
| Apple Angers Mac Users With Silent Shutdown of Java 7 |
| Apple apologizes in China after service criticism |
| Apple banishes Java from Mac browsers |
| Apple blocks Java on the Mac over security concerns |
| Apple closes numerous holes in Mac OS X and Safari |
| Apple delivers Flashback malware hunter-killer |
| Apple Denies FBI Had Access To UDIDs |
| Apple Faces Lawsuit For Retina MacBook Pro 'Ghosting' Issue |
| Apple finally flips switch on HTTPS by default in App Store |
| Apple Firms Up Their Firmware |
| Apple fixes security vulnerabilities with Apple TV 5.1 update |
| Apple Flashback Trojan infection shows weekend decline |
| Apple ID Leaks Traced to Application Developer |
| Apple iOS 10 and 10.0.1 Released |
| Apple iOS SMS Issue Enables Sender Identity Spoofing |
| Apple iOS7 Will Include Activation Lock Security Measures (June 11, 2013) |
| Apple Is Now the Most Valuable Company In History |
| Apple Issues Java Security Update |
| Apple land-grabs iThingy feature management patent |
| Apple logging passwords in plain text |
| Apple Mac OS X security patch bundle 2006-002 |
| Apple Mobile Devices Cleared For Use On US Military Networks |
| Apple Nabs Java Exploit That Bypassed Disabled Plugin |
| Apple OS X patches out |
| Apple OSX Patches, 2006-003 |
| Apple Patents Alternative To NFC |
| Apple Patents Page Turn Animation |
| Apple Patches "Trident" Vulnerabilities in OS X / Safari |
| Apple Patches Everything |
| Apple Pays Only 2% Corporate Tax Outside US |
| Apple plugs Java hole after Flashback Trojan intrusion |
| Apple prompting some users for extra App Store security details |
| Apple publishes standalone Flashback malware removal tool |
| Apple Quicktime 7.1.3 released |
| Apple QuickTime 7.7.4 for Windows updated, MANY security vulnerabilities: http://support.apple.com/kb/HT1222, (Wed, May 22nd) |
| Apple QuickTime and iTunes continued |
| Apple releases Java update with Flashback removal tool - Update |
| Apple Remote Desktop update fixes no encryption issue, (Wed, Aug 22nd) |
| Apple Said To Be Working On a 'Watch-Like Device' |
| Apple Security Update 2005-009 |
| Apple Security Update 2006-001 (more details) |
| Apple Security Update: OS X Server v.2.2.1 now available http://support.apple.com/kb/HT5644 , (Tue, Feb 5th) |
| Apple Suit Against Motorola Over FRAND Licensing Rates Dismissed |
| Apple taking technical, legal action against Flashback malware |
| Apple to end support for original iPhone: report |
| Apple updates Airport Drivers |
| Apple Updates Everything (Again) |
| Apple Updates MacBooks and Mac Pro Desktop With Haswell, "Unified Thermal Core" |
| Apple updates OS X |
| Apple Updates the Update |
| Apple updates to 10.4.8 and Security Update 2006-006 |
| Apple Wants Another $707 Million From Samsung |
| Apple Working on Exchange-Crippling iOS 6.1 Bug |
| Apple, Amazon Change Security Policies After Hack of Journalist`s Accounts |
| Apple, Amazon, close password door after horse bolts |
| Apple, Google tumble off top 20 trusted companies list |
| Apple, Oracle, Google Lead Major Vendors with Software Vulnerabilities in Q1, Security Report Says |
| Apple's latest release to OS X; phpBB posts new release |
| Apple's Ode to Hackers |
| Apple's Secret Plan To Join iPhones With Airport Security |
| Apple's soon-to-be-slurped securo firm shrugs off crypto warning |
| APPLE-SA-2006-12-19 |
| Application Associate Consultant Certification Exam for SAP BusinessObjects Access Control 10.0 (C_GRCAC_10) - Review Questions and Answers |
| Application Aware and Critical Control 2 |
| Application Portfolio Management Survey–What is your organization doing? |
| Arctic Investigation Underway Into Solar Storm Sat-Nav Disruption |
| Arctic Sea Ice Hits Record Low |
| Arctic Sea Ice Hits Record Low Extent |
| Are App.net's Crowdfunders Being Taken For a Ride? |
| Are Desktop Computers Gone? |
| Are there any websites that are NOT compromised?, (Wed, May 8th) |
| Are Windows XP/7 Users Smarter Than a 3-Year-Old? |
| Are you a "Hunter"? |
| Are you a DB2 Version 8 user? Here's a warning... |
| Are you a security pirate? |
| Are you being harassed or stalked online? |
| Are you dissatisfied with ‘Send to mail recipient’ ? Here’ show to fix it. |
| Are you getting I-CANNED ? |
| Are you looking to setup your own Malware Sandbox? |
| Are you mentoring the next in line? |
| Are You Protecting your "Backdoor" ? |
| Are you ready for more Ron Burgundy? Anchorman 2 is coming... |
| Are you sure you're as prepared as you think you are? |
| Are you using MQTs? |
| Arch Linux For Newbies? Manjaro Is Here! |
| Architecture Definition Requirements Report |
| Architecture Definition: The System Blueprint (Expanded) |
| Architecture Firm and ESA To 3D Print Building On the Moon |
| Archiving the snort tips |
| Archos Gamepad Released In the USA |
| Arkeia remote exploit scan activity; More MyDoom; Where is Tokelau?; IRC Botnet |
| Arnold muscles in to put the smackdown on phishers. |
| Art School's Expensive Art History Textbook Contains No Actual Art |
| Artemis Project's N-Eye |
| Artificial Muscles Pack a Mean Punch |
| Aruba's 802.11ac Rollout Cleans Up Sticky Clients |
| As cyber threats build against U.S., CEOs ask for "light touch" |
| As the Bot Turns |
| Asian hackers p0wned by Eastern European rivals |
| Asian political activists whacked in Mac backdoor hack attack |
| Asigra Updates Cloud Backup, Extends NetApp Partnership |
| Ask Personal Audio's James Logan About Patents, Playlists, and Podcasts |
| Ask Slashdot: Advice For Getting Tech Career Back On Track |
| Ask Slashdot: Anti-Theft Devices For Luggage? |
| Ask Slashdot: Best Approach To Reenergize an Old Programmer? |
| Ask Slashdot: Best Book Or Game To Introduce Kids To Programming? |
| Ask Slashdot: Best Cell Phone Carrier In the US? |
| Ask Slashdot: Best Incentives For IT Workers? |
| Ask Slashdot: Best Linux Game For Young Kids? |
| Ask Slashdot: Best Pay-as-You-Go Plan For Text and Voice Only? |
| Ask Slashdot: Best Practices For Collecting and Storing User Information? |
| Ask Slashdot: Best Use For an Old Smartphone? |
| Ask Slashdot: Best VPN Service For Australia? |
| Ask Slashdot: Best Way To Block Noise In a Dorm? |
| Ask Slashdot: Dealing With a Fear of Technological Change? |
| Ask Slashdot: Encrypted Digital Camera/Recording Devices? |
| Ask Slashdot: Explaining Role-Playing Games To the Uninitiated? |
| Ask Slashdot: Explaining Version Control To Non-Technical People? |
| Ask Slashdot: Geekiest Way To Cook a Turkey? |
| Ask Slashdot: Hackable Portable Music Player For Helicopters? |
| Ask Slashdot: Hearing Aids That Directly Connect To Smart Phones? |
| Ask Slashdot: How Do You Deploy Small Office Wi-Fi SSIDs? |
| Ask Slashdot: How Do You Handle SPF For Spam Filtering? |
| Ask Slashdot: How Do You Sell an Algorithm To Venture Capitalists? |
| Ask Slashdot: How Much Is a Fun Job Worth? |
| Ask Slashdot: How To Avoid Working With Awful Legacy Code? |
| Ask Slashdot: How To Convince a Company Their Subscriber List Is Compromised? |
| Ask Slashdot: How To Convince a Team To Write Good Code? |
| Ask Slashdot: How To Get Paid For Open-Sourcing Your Work? |
| Ask Slashdot: How To Make a DVD-Rental Store More Relevant? |
| Ask Slashdot: How Would You Convince Someone To Give Up an Old System? |
| Ask Slashdot: How Would You Feel About Recording Your Entire Life? |
| Ask Slashdot: Is Samba4 a Viable Alternative To Active Directory? |
| Ask Slashdot: Is the Rise of Skeuomorphic User Interfaces a Problem? |
| Ask Slashdot: Job Search Or More Education? |
| Ask Slashdot: Mac To Linux Return Flow? |
| Ask Slashdot: Math and Science iOS Apps For Young Kids? |
| Ask Slashdot: New To Linux; Which Distro? |
| Ask Slashdot: Open Source Remote Application Access? |
| Ask Slashdot: Open-Source Forensic Surveillance Analysis Software? |
| Ask Slashdot: Options For FOSS Remote Support Software? |
| Ask Slashdot: Server Room Toolbox? |
| Ask Slashdot: Should Bitcoin Be Regulated? |
| Ask Slashdot: Should Hosting Companies Have Change Freezes? |
| Ask Slashdot: To AdBlock Or Not To AdBlock? |
| Ask Slashdot: What Equipment and Furniture For an Electronics Hardware Lab? |
| Ask Slashdot: What Is Your Favorite Monitor For Programming? |
| Ask Slashdot: What To Do About Patent Trolls Seeking Wi-fi License Fees? |
| Ask Slashdot: What Video Games Keep You From Using Linux? |
| Ask Slashdot: What Were You Taught About Computers In High School? |
| Ask Slashdot: What Would You Look For In a Prosthetic Hand? |
| Ask Slashdot: Where Should a Geek's Charitable Donations Go? |
| Ask slashdot: Which 100+ User Virtualization Solution Should I Use? |
| Ask Slashdot: Which International Online Music Stores Are Legit? |
| Ask Slashdot: Which Virtual Machine Software For a Beginner? |
| Ask Slashdot: Why Buy a Raspberry Pi When I Have a Perfectly Good Cellphone? |
| Ask Slashdot: Why Is It So Hard To Make An Accurate Progress Bar? |
| Ask Slashdot: Why Won't Companies Upgrade Old Software? |
| Ask Slashdot: Will You Shop Local Like President Obama, Or Online? |
| Ask Slashdot: Wiring Home Furniture? |
| Ask Slashdot: Worth Going For a Graduate Degree In the Middle of Your Career? |
| Ask the Expert – James Jardine |
| Ask the Expert – John Steven |
| Ask the Expert – Nick Galbreath |
| Ask the Expert – Rohit Sethi |
| Ask the Expert – Chenxi Wang |
| Ask the Expert – Jeremiah Grossman |
| ASLR on Android 4 found wanting |
| ASN.1 Attacks / MS04-007 |
| ASN.1 DoS exploit hostname resolution, Recent Scan Increases, anti spam effort |
| ASN.1 vuln keeps on a'chugging. |
| ASN.1 vuln, Windows integrity checker |
| ASP.NET MVC and Knockout - MVC (vs?) MVVM |
| Assange bids for Senate seat |
| Assange calls for help from … Quakers? |
| Assange film "Underground" focuses on early years in Australia |
| Assange Makes Statement Calling For an End To the "Witch Hunt" |
| Assange movie debuts this weekend |
| Assange movie portrays hero as cold war rebel |
| Assange movie portrays leaker as cold war rebel |
| Assange movie portrays leaker as teen rebel |
| Assange Seeks To Sue Prime Minister Gillard For Defamation |
| Assange<sup>TM</sup> TV broadcasts this week |
| Assessing Remote Certificates with Powershell |
| Asteroid Apophis Just Got Bigger |
| Astronomers Probe Mysterious Gas In Titan's Atmosphere |
| Astronomers Want To Hunt Down Earth's Mini-Moons |
| At Galaxy unveiling, Samsung will have insurance plan in back pocket |
| At WICSA 2012 this week |
| AT&T Network Outage |
| AT&T, et al Privacy Suit Dies as Supreme Court Refuses to Hear Appeal |
| Attacking NoSQL applications |
| Attacks against Joomla com_peoplebook |
| Attacks on Iranian oil industry led to Flame malware find |
| Attachmate Reflection DLL Loading Arbitrary Code Execution Vulnerability |
| Attention Crypto Nerds: Gutmann's Godzilla Crypto Tutorial is Available for Download |
| Auditing a Network for VOIP Call Quality Metrics, (Wed, Sep 5th) |
| Aug 21 Sun JAVA patch fixes problems that May Allow Applets and Applications to Run With Unpatched JRE's installed |
| August 2015 Microsoft Patch Tuesday |
| AUP/Terms of Service Agreements |
| Aurora attack tried to pinch secret list of Chinese spies |
| Aurora Attackers Were Looking For Google's Surveillance Database |
| Australia central bank says no information lost in cyber attacks |
| Australia Passes 'Lite' Data Retention Laws |
| Australia puts digital frontier at heart of national security plan |
| Australia puts digital frontier at heart of security strategy |
| Australian cops bust Romanian credit card theives |
| Australian cops bust Romanian credit card thieves |
| Australian Govt Forces Apple, Adobe, Microsoft To Explain Price Hikes |
| Australian gov't under pressure over hacking claim |
| Australian Intelligence HQ Blueprints Hacked |
| Australian Police Move To Make 3D Printed Guns Illegal |
| Australian Scientists Discover Potential Aids Cure |
| Australian spy HQ plans stolen by Chinese hackers: report |
| Australian Telcos Declare SMS Unsafe For Bank Transactions |
| Australians Urged To Spoof IP Addresses For Better Prices |
| Australia's Biggest Telco Sold Routers With Hardcoded Passwords |
| Australia's central Bank hoses down Chinese hack report |
| Australia's de-facto net filter has ZERO regulation |
| Australia's Mandatory Data Breach Notification Bill Revealed |
| Austrian ID card vulnerable to spoofing attack |
| Austrian Skydiver Prepared to Leap From Edge of Space |
| AuthenTec sells out to Apple to the sound of 1,000 lawsuits |
| Authentication Issues between entities during protocol message exchange in SCADA Systems, (Sun, Aug 19th) |
| Author of Sasser worm and Phatbot caught; New Sasser Worm Variant; SANS Security Newsletters and Digests |
| Automated DMCA Takedown Notices Request Censorship of Legitimate Sites |
| Automatic MIME attachments triage |
| Automating Metrics using RTIR REST API |
| Automating Phishing Analysis using BRO |
| Automating Vulnerability Scans |
| Autoruns and VirusTotal |
| Autoruns updated October 6th |
| AV Diversification, Next Generation Network Defense |
| AV Phone Scan via Fake BSOD Web Pages |
| Avere, Fujitsu Team Up for New Storage Offering |
| AWStats Exploits, Port 7162/TCP and 24212/TCP traffic, spamvertised site redirected to Al'Jazeera |
| AWSTATS |
| Back to Green / Previous Sasser Traffic Analysis / Phatbot Source Code / Netsky.AC / CheckPoint VPN-1 Vulnerability |
| Back to Green on the Snort BO Buffer Overflow |
| Back to Green, A Word From Microsoft |
| Back to green, but the exploits are still running wild |
| Backbone issues? |
| Backdoor found in popular FPGA chip |
| Backdoor in industrial networking hardware |
| Backdoor Targeting Apache Servers Spreads To Nginx, Lighttpd |
| Backdoor Trojans significant and tangible threat to Windows users - MS Antimalware Team |
| Backdoors left behind by worms; DHCP connection |
| BackTrack 5 update expands security toolkit |
| Backup the PST File Efficiently and Prevent Data Loss |
| Back-ups, archives, and Pogoplug |
| Bad Grammar Make Bestest Password, Research Say |
| BadNews not so bad, says Google |
| Ballmer Tells the BBC There's More MS Hardware On the Way |
| Bank card-slurp nasty 'infects tills, ATMs', corrupt staff fingered |
| Bank group warns of heightened risk of cyber attacks |
| Bank of America website slows; Prophet film threat made |
| Bank Puts a Billion Transaction Records Behind Analytics Site |
| Banking Trojan hijacks live chat to run real-time fraud |
| 'Bankrupt' Australian Surgeon Sues Google For Auto-Complete |
| Banks on the business end of DDoS attack surge - report |
| Banks use non-ssl login forms. |
| Barack Obama Retains US Presidency |
| Barclaycard pay-by-bonk fraud risk exposes Amazon's security |
| Barclays contactless card users exposed to fraud |
| Bargain: 10'000 infected PC's for only 25$ |
| Barnes & Noble confirms PIN pad tampering |
| Barnes & Noble Founder Wants to Take Retail Division Private |
| Barnes & Noble halts use of PIN pad devices after data breach |
| Barnes & Noble says PIN pads in 63 stores hacked |
| Barracuda Networks outage statement |
| Bartalex malspam pushing Pony/Dyre |
| Basic Defenses Absent at Most Breached Sites |
| Battle of the ISP's |
| BBC Criticized For Snooping Under RIPA Powers |
| BBC Radiophonic Workshop Revived Online |
| BBC Turns Off CEEFAX Service After 38 Years |
| Be Careful What You Filter and Anti-Spyware Infrastructure Ideas |
| Be on the Lookout for PHP compromises; Will New Anti-Spam Protocols Work?; Internet Survival Time by Sophos; phpBB: anti santy worm again ? |
| Beagle Backdoor Port, Wakeup Call from NetSky.G and NetSky.H |
| Beagle Exploit, SSL NULL encryption (update), port 12345 and 1026 |
| BeagleBone Black Ships With New Linux 3.8 Kernel |
| Beer Drone Delivery Service For South African Music Festival |
| Bees Communicate With Electric Fields |
| Behavioral Analysis of Rootkit Malware |
| Behind the Scenes With Samsung's Factory Workers |
| Belated "deja vu" - IR for rootkits that run in safe mode |
| Belgian Consumer Organization Sues Apple For Not Respecting Warranty Law |
| Belize wants to quiz anti-computer virus guru McAfee in murder probe |
| Bellsouth.(net|com) troubles |
| Benevolent malware? reincarna/Linux.Wifatch |
| Berners-Lee hits out at government web snooping plans |
| Best of Interop 2013 Winners Announced |
| BEST Study Finds Temperature Changes Explained by GHG Emissions and Volcanoes |
| Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor |
| Better Brain Implants With Ultrathin Carbon Fiber Electrodes |
| Better onion anonymity possible: researcher |
| Beware the malware-tipped SPEAR TRAP in your inbox |
| Beyond The Fence |
| BHO FAQ, Survival Time, and auth/ident activity |
| BHO scanning tool and New Scam Targets Bank Customers |
| BHO, Browsers and related / Port 3705 / ISCAlert Portuguese version |
| BI Solution-Design Strategies |
| Big Brother is prosecuting you: More cops to use court vid chats |
| Big Business surrounding Internet Fraud |
| Big data analytics defining new malware strategy |
| Big Data to Overtake Hadoop in 2013 |
| Big Honkin' Botnet - 1.5 Million! |
| Big Change |
| Bill Gates Answers Questions From Redditors |
| Bill Gates Regains the Position of World's Richest Person |
| BIND 8 and 9 Vulnerabilities / ISP Blocking Traffic yet / Sharing thoughts |
| BIND 9 patched against remote crash vuln |
| BIND 9 Security Updates, (Mon, Jul 30th) |
| BioShock: Infinite</em> Released |
| BioWare Founders Announce Retirement |
| Bit9 Hacked, Stolen Certs Used To Sign Malware |
| Bit9 Hacked: Stolen Digital Keys Used to Sign Malware |
| Bit9 wants to bin 'broken' antivirus, install whitelisting tech |
| Bitcoin Exchange BitFloor Says It Will Replace Stolen Coins |
| Bitcoin exchange shuts after heist |
| Bitcoin Foundation vows to clean up currency's bad rep |
| BitCoin Gets a Futures Market |
| Bitcoinica Bitcoin site breached |
| Bitcoin's Success With Investors Alienates Earliest Adopters |
| BitInstant CEO Says World Operates "On an Inferior Monetary System" |
| BitInstant Continues Bitcoin Paycard Plan |
| BitTorrent Sees Sync Users Share Over 1PB of Data |
| BizCN gate actor changes from Fiesta to Nuclear exploit kit |
| BizCN gate actor sends CryptoWall 4.0 |
| BizCN gate actor update |
| Black Hat: Researcher pinpoints promising ways to attack Windows 8 |
| Black tuesday - the day after |
| Black Tuesday 4 vulnerabilites, Wins Traffic flow diagrams |
| Black Tuesday Advance Notice |
| Black Tuesday Patch Roundup, Panic and/or Mayhem ensues |
| Black Tuesday Summary |
| BlackBerry 10 Can BBM Anything You're Watching, Even Porn |
| BlackBerry 10 passes US defence department tests |
| BlackBerry 10 reportedly delayed until March, near-term licensing deals deemed ‘unlikely’ |
| BlackBerry 10 Review: Good, But Too Late? |
| BlackBerry still trumps Android for security, analysis finds |
| BlackBerry Users in Europe, Africa Suffer 3-Hour Outage - Mobile and Wireless - News & Reviews - eWeek.com |
| BlackBerry10 passes US defence department tests |
| BlackEnergy .XLS Dropper |
| Blackworm Notifications |
| BlackWorm Summary |
| Blackworm/Nyxem Animation of Infections |
| Blame crap mobe apps for swap-by-bonk hacks, say NFC bods |
| Blaster Worm Cleanup |
| Blaster Worm Update - Power Outage |
| Blaster Worm Update |
| Bleeding Snort Domain. |
| Bleeding Snort Sigs Available |
| Blizzard Compromise-- what they missed in their user communication, (Fri, Aug 10th) |
| Blizzard Entertainment Hack Hits Battle.net Users |
| Blizzard Reportedly Planning A Linux Game For 2013 |
| Blizzard Says Battle.Net Has Been Hacked |
| Blocking Powershell Connection via Windows Firewall. |
| Blog Reveals a Chinese Military Hacker's Life Is One of Boredom and Bitterness |
| Bloggers Put Scientific Method To the Test |
| Bloodhound.Exploit.52 (Flash Player 7) detections |
| Blue Coat WinProxy Vuln |
| Blue Coat, Skype and QQ named as government surveillance helpers |
| Blue for Reset?, (Fri, Jan 4th) |
| Bluetooth 0day hacking |
| Bluetooth Auditing |
| Bluetooth Followup Links |
| Bluetooth Used To Track Traffic Times |
| Boffins demo passwords even users don’t know |
| Boffins foul VM sandboxes with CPU-sniffing hack |
| Boffins hide messages in Skype ‘silence packets’ |
| Boffins receive quantum key from moving plane |
| Bofra/IFrame After Action Review |
| Bofra/IFrame Exploits on More Web Sites (updated); IFRAME vulnerability summary; Two more IE Exploits |
| Bofra/IFrame Exploits Update |
| Bogus anti-hacking tool targets Syrian activists |
| Book Review: Why Does the World Exist? |
| Book that makes learning statistics fun - "What is P-value Anyway?" |
| Booleans Extreme |
| Bot C&C Servers on Port 80 |
| Bot herds exploring vertical markets |
| Bot Nets - Moving to Prime Time, AV Vendors Taking Out Valuable Resource, |
| Bot with Veritas; Internet crash in Pakistan; MS Security Bulletin Scam; MS05-017 Exploit |
| Botnet Malware code modifier's competition continues |
| Botnet Report; MD5 Checksum; Handlers Update, Live from Las Vegas |
| Botnet Research |
| Botnet responsible for 18% of the world's spam shut down |
| Botnet traffic using TOR |
| Botnets and Adwares-Spywares connection |
| BotNets and Security Awareness in Academia; Potpourri of MS04-028 Scanning Tools from MS |
| Botnets Host DNS; 'leet Names and Security Tools |
| Botnets spreading Dridex still active |
| Botnets, PHP includes |
| Bots installed through IM and Packet Capture howto |
| Bots looking for FlashChat App |
| Bots: They are not just for Windows anymore. |
| Bounced emails with viral attachments |
| Box becomes first third-party app on Good's platform |
| BP engineer charged over oil spill data deletion from iPhone |
| Brain Scans of Rappers and Jazz Musicians Shed Light On Creativity |
| Brazilian Judge Orders 24-hour Shutdown of Google and Youtube |
| Breakthrough In Drawing Complex Venn Diagrams: Goes to 11 |
| Bredolab botnet author sentenced to 4 years in prison in Armenia |
| Brennan defends drone strikes, even on Americans |
| BrewPi: Raspberry Pi and Arduino Powered Fermentation Chamber |
| BRFPlus Functions: An Overview of Operation Modes |
| Brian Krebs Gets SWATted |
| Brig counsellor: Manning's history, behaviour outweighed doctor's opinion of self-harm risk |
| Bright(?) FUD, Heise bounty, Google thinks you are malware, Tom Liston sees his shadow, and more |
| Brit upstart flogs cloudy SaaS to clipboard-waving bods |
| British car parks start reading number plates |
| British Minister likens Anonymous to fascists and racists |
| Broadcom Wireless Vulnerability |
| Brocade Announces New Hardware, Software for Data Center Strategy |
| Brocade Gets Virtual Networking with Vyatta Acquisition |
| Brown Signs California Bill For Free Textbooks |
| Browser *does* matter, not only for vulnerabilities - a story on JavaScript deobfuscation |
| Browser Bug of the Month Club |
| Browser vendors rush to block fake google.com site cert |
| Browser Vulnerabilities (all browsers), MS04-030 and -032 POC exploit released |
| Browzar, the privacy that may not be |
| Bruce Perens: The Day I Blundered Into the Nuclear Facility |
| Brute force scanning against MS SQL server accounts; Are you paranoid enough? |
| BSDCan 2013 Registration |
| BT: Olympics cyber attackers were amateurs |
| Btcd - a Bitcoind Alternative Written In Go! |
| Bugtraq: [ MDVSA-2012:086 ] acpid |
| Bugtraq: [SE-2011-01] Additional materials released for SAT TV research |
| Bugtraq: [SE-2012-01] An issue with new Java SE 7 security features |
| Bugtraq: [security bulletin] HPSBMU02785 SSRT100526 rev.1 - HP LoadRunner Running on Windows, Remote Execution of Arbitrary Code |
| Bugtraq: [security bulletin] HPSBMU02884 rev.1 - HP Service Manager and HP ServiceCenter, Cross Site Scripting (XSS) and Disclosure of Information |
| Bugtraq: [SECURITY] [DSA 2446-1] libpng security update |
| Bugtraq: [SECURITY] [DSA 2483-1] strongswan security update |
| Bugtraq: [SECURITY] [DSA 2550-2] asterisk regression update |
| Bugtraq: [SECURITY] [DSA 2554-1] iceape security update |
| Bugtraq: [SECURITY] [DSA 2670-1] wordpress security update |
| Bugtraq: [SECURITY] [DSA 2675-2] libxvmc regression update |
| Bugtraq: [TSI-ADV-1201] Path Traversal on Polycom Web Management Interface |
| Bugtraq: [TSI-ADV-1202] Polycom Web Management Interface O.S. Command Injection |
| Bugtraq: 0day full - Free Monthly Websites v2.0 - Multiple Web Vulnerabilities |
| Bugtraq: 11in1 CMS v1.2.1 - SQL Injection Vulnerabilities |
| Bugtraq: APPLE-SA-2012-08-20-1 Apple Remote Desktop 3.6.1 |
| Bugtraq: b2ePMS 1.0 Authentication Bypass Vulnerability |
| Bugtraq: CA20130213-01: Security Notice for CA ControlMinder |
| Bugtraq: Cisco Security Advisory: Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability |
| Bugtraq: Cisco Security Advisory: Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability |
| Bugtraq: Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerabilities |
| Bugtraq: Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability |
| Bugtraq: CONFidence 2013 - Call for Papers - 28-29.05.2013 Krakow, Poland |
| Bugtraq: CORE-2013-0430 - Buffer overflow in Ubiquiti airCam RTSP service |
| Bugtraq: DEFCON London - DC4420 - June CFP - Lightning talks!!! - Tuesday 25th June 2013 |
| Bugtraq: Drupal 7.14 <= Full Path Disclosure Vulnerability |
| Bugtraq: Drupal 7.14 <= Full Path Disclosure Vulnerability (Update) |
| Bugtraq: Elcom CMS - Community Manager Insecure File Upload Vulnerability - Security Advisory - SOS-12-008 |
| Bugtraq: ESA-2012-013: RSA SecurID(r) Software Token Converter buffer overflow vulnerability |
| Bugtraq: ESA-2013-010: EMC AlphaStor Buffer Overflow Vulnerability |
| Bugtraq: Fortinet FortiMail 400 IBE - Multiple Web Vulnerabilities |
| Bugtraq: Free Monthly Websites v2.0 - Multiple Web Vulnerabilities |
| Bugtraq: Kaspersky Password Manager 5.0.0.164 - Software Filter Vulnerability |
| Bugtraq: Kohana Framework v2.3.3 - Directory Traversal Vulnerability |
| Bugtraq: Liferay users can assign themselves to organizations, leading to possible privilege escalation |
| Bugtraq: MitM-vulnerability in Palo Alto Networks GlobalProtect |
| Bugtraq: Multiple Vulnerabilities in D'Link DIR-600 and DIR-300 (rev B) |
| Bugtraq: My ROP mitigation |
| Bugtraq: NGS00241 Patch Notification: SysAid Helpdesk blind SQL injection |
| Bugtraq: NGS00254 Patch Notification: Apple Mac OS X Lion USB Hub Class Hub Descriptor Arbitrary Code Execution |
| Bugtraq: Open-Realty CMS 2.5.8 (2.x.x) <= Cross Site Request Forgery (CSRF) Vulnerability |
| Bugtraq: OpenSSL 1.0.1 Buffer Overflow Vulnerability |
| Bugtraq: Re: [#1298868584] Copy&paste from web browser considered dangerous |
| Bugtraq: Re: [Full-disclosure] XSS and SQL Injection Vulnerabilities in Jara |
| Bugtraq: Re: Drupal 7.14 <= Full Path Disclosure Vulnerability |
| Bugtraq: Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities |
| Bugtraq: Sonicwall Scrutinizer v9.5.2 - SQL Injection Vulnerability |
| Bugtraq: Sourcefire Defense Center - multiple vulnerabilities. |
| Bugtraq: Unauthenticated remote access to D-Link DCS cameras |
| Bugtraq: Universal Reader Filename Denial Of Service Vulnerability |
| Bugtraq: XSS in OSSEC wui 0.3 |
| Building Babbage's Analytical Engine |
| Building New Materials With Light |
| Business Highlights |
| Business Intelligence Trends: ERP and Business Intelligence |
| Businesses urged to test updates after McAfee glitch |
| But it worked FINE in Dev! |
| Buyers Beware |
| Buying American in Tehran: Apples, razors and Coke |
| By the Numbers: How Google Compute Engine Stacks Up To Amazon EC2 |
| BYOD boon: Make identities part of the cloud OS |
| BYOD Security: Do You Really Need MDM? |
| CA BrightStor ARCserve Backup 11.5 remote vulnerability |
| CA eTrust Antivirus [was] flagging lsass.e x e |
| CA iGateway debug mode HTTP GET request bo vulnerability/exploit |
| CA Leak Highlights Weakness in Net Security, Again |
| Cable Modem Hacker Convicted (March 2, 2012) |
| Cacti remote code and SQL injection vulnerability |
| CAIDA Report on Blackworm |
| California To License Self-Driving Cars |
| California Wants Genetically Modified Foods To Be Labelled |
| California's Unspoken Health Problem: Brain Parasites |
| Call 1-866-727-2338 for free virus and security-related support from Microsoft |
| Call centers under attack in targeted cyber-blackmail scheme |
| Call for mandatory data breach notifications renewed |
| Call for packets TCP/UDP port 48318 |
| Call for some logs and/or packets for requests to a2billing/customer/templates/default/header.tpl |
| Call for Volunteers ; Red Cross Associated Sites ; Katrina Related Fraud Continues |
| Caltech and UVic Set 339Gbps Internet Speed Record |
| Cameras leak credentials, live video |
| Can a New GPU Rejuvenate a 5 Year Old Gaming PC? |
| Can Anyone Become a Programmer? |
| Can Congress Protect the Nation's Critical Infrastructure? |
| Can Fotobar Make Polaroid Relevant Again? |
| Can Innovation Be Automated? |
| Can Legacy Dual-Core CPUs Drive Modern Graphics Cards? |
| Canada aware of second hacking attack, this time on energy firm |
| Canada aware of two cyber attacks, won't say if China involved |
| Canada Prepares For Crackdown On BitTorrent Movie Pirates |
| Canada Revenue Agency To Tax BitCoin Transactions |
| Canada's Supreme Court Tosses Viagra Patent For Vagueness |
| Canadian Court Rules You Have the Right To Google a Lawyer |
| Canadian government may block Huawei from its network |
| Canadian Government Scrapping Internet Predators Act |
| Canadian Researchers Debut PaperTab, the Paper-Thin Tablet |
| Canonical and China Announce Ubuntu Collaboration |
| Canonical Could Switch To Rolling Releases For Ubuntu 14.04 and Beyond |
| Carbon Dating Gets an Update |
| Card skimmers targeting more than ATMs, says EU |
| Careful with the seasonal attachments! |
| Carnegie Mellon, NSA seek high school hackers |
| Carrier IQ Hopes to Allay Users' Privacy Concerns |
| Cash from the Cache; Port 32772 |
| Catch of the Day; Scripted mass hack; Not-so-black Tuesday ahead |
| CC Theft Worries Manipulated; Unusual FrontPage Hack; War Spying/Viewing |
| CCTV Hack Takes Casino For $33 Million |
| CDC Says 10,000 At Risk of Hantavirus In Yosemite Outbreak |
| CERN's LHC Powers Down For Two Years |
| CERTs warn about old java bug being exploited |
| CES Ditches CNET After CBS Scandal Over Dish's Hopper |
| CGI Email Script Scanning Update, MS SQL Server scanning, Bagle Source Code Released, Comments on 802.11i |
| CIA Director David Petraeus Resigns, Citing Affair |
| CICS communication history |
| Cingular wireless outage |
| CIO Success Simplified in 3 Steps |
| Cisco 7920 Wireless IP Phone |
| Cisco Advisories |
| Cisco and iRobot Create Sheldonbot-Like Telepresence System |
| Cisco and Juniper - ISAKMP Protocol - Multiple Vulnerability Issues |
| Cisco ASA SNMP Remote Code Execution Vulnerability |
| Cisco BGP DoS - Updates Galore! |
| Cisco Cloud Web Security DNS Hijack |
| Cisco content switch SSL vulnerability |
| Cisco Continues SDN Evolution With vCider Acquisition |
| Cisco EIGRP Vulnerability and VLAN spoofing issue |
| Cisco Exits the Consumer Market, Sells Linksys To Belkin |
| Cisco IKE Resource Exhaustion Attack |
| Cisco inadvertently weakens password encryption in its IOS operating system |
| Cisco Innovates to Provide More Nimble Network Security |
| Cisco introducing Cisco Security Notices 16 JAN 2013, (Tue, Jan 15th) |
| Cisco IOS - we are aware |
| Cisco IOS / IOS XE security advisories |
| Cisco IOS DHCP vulnerability; Rumours about vulnerabilities in Win XP SP2 |
| Cisco IOS Firewall vulnerability update. |
| Cisco IOS Interface Denial of Service Vulnerability |
| Cisco IOS local privilege escalation |
| Cisco IOS Security Advisory Bundle - http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html, (Thu, Sep 27th) |
| Cisco IOS Security Advisory |
| Cisco Malformed IKE Packet Vulnerability |
| Cisco MARS vulnerabilities |
| Cisco PIX Issue |
| Cisco PSIRT reporting Customers affected by ASA VPN DoS attacks |
| Cisco Response to OpenSSL Vulnerability |
| Cisco Security Advisory: Default Password in Wireless Location Appliance |
| Cisco sgbp DoS |
| Cisco Telnet DoS Vulnerability / Suspicious GIF files being mailed? / Paranoia, the right dosage |
| Cisco VP To Memo Leaker: Finding You Now 'My Hobby' |
| Cisco VPN 3000 crafted HTTP attack |
| cisco vtp vulnerabilities |
| Cisco Vulnerability in the VPN Client Software |
| Cisco Wireless Access Point Vulnerability Announced |
| Cisco, Apple, Netgear Offer Wireless Routers for Businesses on a Budget - Enterprise Networking - News & Reviews - eWeek.com |
| CISPA Cybersecurity Bill, Reborn: 6 Key Facts |
| Citadel takedown took down security researchers too |
| Citadel Trojan Moves from Crime to Espionage |
| Cities' Heat Can Affect Temperatures 1000+ Miles Away |
| Citrix Access Gateway Advanced Access Control remote and local vulnerability reported |
| Citrix Merges Repeater Features With CloudBridge |
| ClamAV 0.87.1 released, fixes multiple security vulnerabilities |
| ClamAV fixes multiple vulnerabilities |
| ClamAV versions up to 0.88.3 DoS |
| ClamAV vulnerability; Con-fu |
| Clarifying Levels of PCI Compliance |
| Clashes over Internet rules to mark Dubai meeting |
| Classified Information Confetti |
| Clearwire to pull Huawei from network |
| CLICKbot |
| Client-Side Exploits - The Mother Lode? |
| Climate Contrarians Seek Leadership of House Science Committee |
| Climb a small mountain... |
| Cloaking Technology Could Protect Offshore Rigs From Destructive Waves |
| Cloud Computing 101: What is it and how can you take advantage? |
| Cloud Computing Needs To Embrace the Linux Model, Says Rackspace CTO |
| Cloud in the Real World |
| Cloud is a Continuum |
| Cloud is the answer! |
| 'Cloud' may open up new IT security problems |
| Cloud providers need to step up on security, say analysts |
| Cloud Relative Market Sizes |
| Cloud Security Measures Too Opaque For Customers |
| Cloud security: Four customers' approaches |
| Cloud service cracks VPN passwords in 24 hours |
| Cloud support brings WikiLeaks back online |
| Cloud wars |
| Cloud, BYOD Increases Need for Automated IAM Systems |
| Cloud-Economical Computing Model |
| Cloudy admin? Here's how to ward off Call of Duty-playing teens |
| 'Clueless' boards risk lawsuits, threaten national security |
| Clueless users: 10 more tales of the absurd |
| CME was officially lauched |
| CME-24 (again) |
| CME-24 aka blackworm update |
| CME-24 Analysis: The destruction does not appear to spread across Windows network shares |
| CME-24: It Has Begun |
| CNOOC, Nexen reapply for U.S. deal approval |
| Cockroaches Evolving To Avoid Roach Motels |
| Coffee and Intellectual Property |
| Cogent having problems... |
| CoLinux - Cooperative Linux that runs in native mode on Windows |
| Collecting Logs from Security Devices at Home, (Sun, Dec 2nd) |
| Collecting Users Credentials from Locked Devices |
| Colocation Provider PRQ Raided; Wikileaks and Many Torrent Sites Offline |
| Color My Logs: Providing Context for Your Logs Using Our Data |
| Color Printing Reaches Its Ultimate Resolution |
| Color-Screen TI-84 Plus Calculator Leaked |
| Combating phishing for banks / Story of a former worm target / Disaster preparation |
| Combined exploits of MS vulnerabilities, port 1981 increase |
| Come fly with me**..... |
| Coming soon: Certification for mobile app developers |
| Command and Control Channels Using "AAAA" DNS Records |
| Comment: LinkedIn and its password problems |
| Comments on 0day |
| Comments on Oracle Vulnerabilities, WinZip, MIT Kerberos, Seeking Wireless Compromise Stories, More Weak Password Hacks? |
| Commercial cyberspying and theft gives rich payoff |
| Commercial cyberspying, theft promise rich payoff |
| Commercial enterprises are putting our critical infrastructure at risk |
| Compaction Process - Perfect way for optimization of free space in Outlook |
| Companies House website security 'a bit of a mess' |
| Companies slow to react to mobile security threat |
| Compaq Web Management, BJs Alerts of Possible Credit Card Theft |
| Compliance isn't security, but companies still pretend it is, according to survey |
| Compromised Magento sites led to Neutrino exploit kit |
| Compromised Web Sites Infect Web Surfers |
| CompSci boffins tout file encryption for Google Docs |
| Computerized elections, some thoughts |
| Computing Difficulties in Business Spreadsheet Software: How to Overcome Them? |
| Confessions of a Spyware Author |
| Congrats March's Top 10 New Members! |
| Congress halts posting of civilian, military officials' assets |
| Congress report warns: drones will track faces from the sky |
| Congress urged to probe Chinese cyber: espionage |
| Congressional Report: US Power Grid Highly Vulnerable To Cyberattack |
| Consensus gathering on log analysis and correlation in enterprise environment |
| Considerations for modernizing your network |
| Consumer Reports: Free anti-malware software for Windows, Mac is effective |
| Contacting the ISC, good practices for response |
| Continued great response to call for Volunteers |
| Continued Sighting of Download.Ject; WiFi Security |
| Continuous Monitoring for Random Strings |
| Continuous multi-exploit scanning / Sadmind exploit |
| Converting RSS Feeds To a Dynamic 3D Scene In 120 Lines of Code |
| Coolwebsearch / Trafficadvance got a new home... |
| Cooperation seen as crucial in facing U.S. cyber threats |
| Copies of anti-censorship software used in Iran and Syria contain keylogger |
| Cops cuff premium-rate SMS Android malware suspects |
| Copyright Claim Thwarts North Korean Propaganda |
| Corn Shortage Hampers US Ethanol Production |
| Corporate Espionage Made Easy with Spyware; Honeynet KYE: Phishing paper Published; Some New Vulnerabilities |
| Corrected: From the mailbag |
| Corrupted Nyxems |
| Costa Rica: Digital currency site founder arrested |
| Could Flying Cars Actually Be On Their Way? |
| Could New York City Cut Emissions 90% By 2050? |
| Councils spunk £515m in 4 years on CCTV |
| Couple ISC Site Updates |
| Couple updates and reminders |
| Courion Access Insight Detects Data Security Risks at HCR ManorCare |
| Court: Aereo TV Rebroadcast Is Still Legal |
| Coverity and Wind River target development insecurity with new alliance |
| Craigslist Drops Exclusive License To Your Posts |
| Crap PINs give wallet thieves 1-in-11 jackpot shot |
| Cray Unveils XC30 Supercomputer |
| Create your own Job World Economic Forum thoughts |
| Creating a Bastioned Centralized Audit Server with GroundWork Open Source Log Monitoring for Event Signatures |
| Creationist Bets $10k In Proposed Literal Interpretation of Genesis Debate |
| Credit report breach has link to Zeus banking malware |
| Creeping Government Surveillance Now Without Warrants |
| Crims take to Facebook to flog ZeuS kits |
| Critical Cisco ASA IKEv2/v2 Vulnerability. Active Scanning Detected |
| Critical denial-of-service flaw in BIND software puts DNS servers at risk |
| Critical Firefox Update Today |
| Critical Flash Player Update APSB16-36 |
| Critical flaw exposes Oracle database passwords |
| Critical Java SE update due Tuesday fixes 40 flaws |
| Critical Patch to the XP SP2 Firewall Released / New Linux 2.4 and 2.6 Kernel Exploits Released / The Virus Year in Review |
| Critical Ruby on Rails security vulnerability |
| Critical Security Controls: Getting to know the unknown |
| Critical security update: PHPMailer 5.2.18 (CVE-2016-10033) |
| Critical security vulnerability in WinZip 10 |
| Critical Vulnerabilities in Palo Alto Networks PAN-OS |
| Critical vulnerability in IrfanView plugin |
| Critical vulnerability in Sophos Anti-Virus products |
| Critical vulnerability in vBSEO patched |
| Critical Xen PV guests vulnerabilities |
| Crooks break into Casino CCTV systems to nab 33 Million |
| Cross platform virus PoC |
| Crowdsourced Coders Take On Immunology Big Data |
| Cryptanalyst on British Postage Stamps |
| CryptoWall sent by Angler and Neutrino exploit kits or through malicious spam |
| CS Faculty and Students To Write a Creative Commons C++ Textbook |
| CSO Online E-Crime Survey Results |
| CSO's Ultimate Guide to Social Engineering |
| CSOs warned of serious cyber-espionage attack |
| CSS Zen Garden Turns 10 |
| CTO Says Al-Khabaz Expulsion Shows CS Departments Stuck In "Pre-Internet Era" |
| Curiosity Gearing Up for Drive to Next Study Location |
| Curiosity Rover Fires First Laser Beam At Martian Rock |
| Curious SNMP Traffic Spike |
| Custom Android ROM Developers Get OTA Update Capabilities Like Carriers |
| CVE-2006-7250 (openssl) |
| CVE-2007-6752 (drupal) |
| CVE-2007-6753 (windows_2000, windows_7, windows_server_2008, windows_vista, windows_xp) |
| CVE-2008-7309 (insoshi) |
| CVE-2008-7310 (spree) |
| CVE-2009-0693 |
| CVE-2009-0693 (wyse_device_manager) |
| CVE-2009-0695 |
| CVE-2009-0695 (wyse_device_manager) |
| CVE-2009-5030 (openjpeg) |
| CVE-2009-5031 |
| CVE-2009-5031 (modsecurity) |
| CVE-2009-5112 (webglimpse) |
| CVE-2009-5113 (webglimpse) |
| CVE-2009-5114 (webglimpse) |
| CVE-2009-5128 (websense_v10000) |
| CVE-2009-5129 (websense_v10000) |
| CVE-2009-5130 (websense_email_security) |
| CVE-2009-5131 (websense_email_security) |
| CVE-2009-5132 (websense_web_filter, websense_web_security) |
| CVE-2010-2021 |
| CVE-2010-2021 (global_redirect) |
| CVE-2010-4562 (windows_2000, windows_2003_server, windows_7, windows_server_2008, windows_vista,...) |
| CVE-2010-4563 (linux_kernel) |
| CVE-2010-4666 |
| CVE-2010-4666 (libarchive) |
| CVE-2010-5063 (virtual_war) |
| CVE-2010-5064 (virtual_war) |
| CVE-2010-5065 (virtual_war) |
| CVE-2010-5066 (virtual_war) |
| CVE-2010-5067 (virtual_war) |
| CVE-2010-5086 (bitweaver) |
| CVE-2010-5097 (typo3) |
| CVE-2010-5098 (typo3) |
| CVE-2010-5099 |
| CVE-2010-5099 (typo3) |
| CVE-2010-5100 (typo3) |
| CVE-2010-5137 |
| CVE-2010-5137 (bitcoind, wxbitcoin) |
| CVE-2010-5138 |
| CVE-2010-5138 (bitcoind, wxbitcoin) |
| CVE-2010-5139 |
| CVE-2010-5139 (bitcoind, wxbitcoin) |
| CVE-2010-5140 |
| CVE-2010-5140 (bitcoind, wxbitcoin) |
| CVE-2010-5141 |
| CVE-2010-5141 (bitcoind, wxbitcoin) |
| CVE-2010-5189 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...) |
| CVE-2010-5190 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...) |
| CVE-2010-5191 (avos, proxyav) |
| CVE-2010-5192 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...) |
| CVE-2010-5279 (virtual_war) |
| CVE-2011-1162 (kernel) |
| CVE-2011-1385 |
| CVE-2011-1385 (aix, vios) |
| CVE-2011-1390 |
| CVE-2011-1390 (rational_clearquest) |
| CVE-2011-1394 |
| CVE-2011-1394 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...) |
| CVE-2011-1395 |
| CVE-2011-1395 (maximo_asset_management, maximo_asset_management_essentials) |
| CVE-2011-1396 |
| CVE-2011-1396 (maximo_asset_management, maximo_asset_management_essentials) |
| CVE-2011-1397 |
| CVE-2011-1397 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...) |
| CVE-2011-1473 |
| CVE-2011-1473 (openssl) |
| CVE-2011-1759 (linux_kernel) |
| CVE-2011-1761 |
| CVE-2011-1761 (libmodplug) |
| CVE-2011-1767 (linux_kernel) |
| CVE-2011-1768 (linux_kernel) |
| CVE-2011-1777 |
| CVE-2011-1777 (libarchive) |
| CVE-2011-1778 |
| CVE-2011-1778 (libarchive) |
| CVE-2011-1779 |
| CVE-2011-1779 (libarchive) |
| CVE-2011-1923 |
| CVE-2011-1927 (linux_kernel) |
| CVE-2011-2082 |
| CVE-2011-2082 (rt) |
| CVE-2011-2083 |
| CVE-2011-2083 (rt) |
| CVE-2011-2084 |
| CVE-2011-2084 (rt) |
| CVE-2011-2085 |
| CVE-2011-2085 (rt) |
| CVE-2011-2182 (linux_kernel) |
| CVE-2011-2183 (linux_kernel) |
| CVE-2011-2199 |
| CVE-2011-2199 (tftp-hpa) |
| CVE-2011-2203 (kernel) |
| CVE-2011-2208 (linux_kernel) |
| CVE-2011-2209 (linux_kernel) |
| CVE-2011-2210 (linux_kernel) |
| CVE-2011-2211 (linux_kernel) |
| CVE-2011-2393 (freebsd, netbsd) |
| CVE-2011-2478 |
| CVE-2011-2478 (sketchup) |
| CVE-2011-2502 |
| CVE-2011-2503 |
| CVE-2011-2512 (qemu-kvm) |
| CVE-2011-2527 (qemu) |
| CVE-2011-2545 (spa8000_8-port_ip_telephony_gateway, spa8000_8-port_ip_telephony_gateway_firmware...) |
| CVE-2011-2657 |
| CVE-2011-2658 |
| CVE-2011-2709 (libgssglue, libgssapi) |
| CVE-2011-2722 (linux_imaging_and_printing_project) |
| CVE-2011-2866 (itunes, webkit) |
| CVE-2011-2911 |
| CVE-2011-2911 (libmodplug) |
| CVE-2011-2912 |
| CVE-2011-2912 (libmodplug) |
| CVE-2011-2913 |
| CVE-2011-2913 (libmodplug) |
| CVE-2011-2914 |
| CVE-2011-2914 (libmodplug) |
| CVE-2011-2915 |
| CVE-2011-2915 (libmodplug) |
| CVE-2011-3016 (chrome) |
| CVE-2011-3017 (chrome) |
| CVE-2011-3018 (chrome) |
| CVE-2011-3019 (chrome) |
| CVE-2011-3020 (chrome) |
| CVE-2011-3021 (chrome) |
| CVE-2011-3022 (chrome) |
| CVE-2011-3023 (chrome) |
| CVE-2011-3024 (chrome) |
| CVE-2011-3025 (chrome) |
| CVE-2011-3026 (chrome, libpng) |
| CVE-2011-3027 (chrome) |
| CVE-2011-3031 |
| CVE-2011-3032 |
| CVE-2011-3033 |
| CVE-2011-3034 |
| CVE-2011-3035 |
| CVE-2011-3036 |
| CVE-2011-3037 |
| CVE-2011-3038 |
| CVE-2011-3039 |
| CVE-2011-3040 |
| CVE-2011-3041 |
| CVE-2011-3042 |
| CVE-2011-3043 |
| CVE-2011-3044 |
| CVE-2011-3045 (chrome) |
| CVE-2011-3047 (chrome) |
| CVE-2011-3048 |
| CVE-2011-3048 (libpng) |
| CVE-2011-3058 (chrome) |
| CVE-2011-3059 (chrome) |
| CVE-2011-3060 (chrome) |
| CVE-2011-3061 (chrome) |
| CVE-2011-3062 (chrome) |
| CVE-2011-3063 (chrome) |
| CVE-2011-3064 (chrome) |
| CVE-2011-3065 (chrome) |
| CVE-2011-3066 |
| CVE-2011-3066 (chrome) |
| CVE-2011-3067 |
| CVE-2011-3067 (chrome) |
| CVE-2011-3068 |
| CVE-2011-3068 (chrome) |
| CVE-2011-3069 |
| CVE-2011-3069 (chrome) |
| CVE-2011-3070 |
| CVE-2011-3070 (chrome) |
| CVE-2011-3071 |
| CVE-2011-3071 (chrome) |
| CVE-2011-3072 |
| CVE-2011-3072 (chrome) |
| CVE-2011-3073 |
| CVE-2011-3073 (chrome) |
| CVE-2011-3074 |
| CVE-2011-3074 (chrome) |
| CVE-2011-3075 |
| CVE-2011-3075 (chrome) |
| CVE-2011-3076 |
| CVE-2011-3076 (chrome) |
| CVE-2011-3077 |
| CVE-2011-3077 (chrome) |
| CVE-2011-3078 (chrome) |
| CVE-2011-3079 (chrome) |
| CVE-2011-3080 (chrome) |
| CVE-2011-3081 (chrome) |
| CVE-2011-3083 |
| CVE-2011-3084 |
| CVE-2011-3085 |
| CVE-2011-3085 (chrome) |
| CVE-2011-3086 |
| CVE-2011-3086 (chrome) |
| CVE-2011-3087 |
| CVE-2011-3087 (chrome) |
| CVE-2011-3088 |
| CVE-2011-3088 (chrome) |
| CVE-2011-3089 |
| CVE-2011-3089 (chrome) |
| CVE-2011-3090 |
| CVE-2011-3090 (chrome) |
| CVE-2011-3091 |
| CVE-2011-3091 (chrome) |
| CVE-2011-3092 |
| CVE-2011-3092 (chrome) |
| CVE-2011-3093 |
| CVE-2011-3093 (chrome) |
| CVE-2011-3094 |
| CVE-2011-3094 (chrome) |
| CVE-2011-3095 |
| CVE-2011-3095 (chrome) |
| CVE-2011-3096 |
| CVE-2011-3096 (chrome) |
| CVE-2011-3097 |
| CVE-2011-3097 (chrome) |
| CVE-2011-3098 |
| CVE-2011-3098 (chrome) |
| CVE-2011-3099 |
| CVE-2011-3099 (chrome) |
| CVE-2011-3100 |
| CVE-2011-3100 (chrome) |
| CVE-2011-3101 |
| CVE-2011-3101 (chrome) |
| CVE-2011-3103 (chrome) |
| CVE-2011-3104 (chrome) |
| CVE-2011-3105 (chrome) |
| CVE-2011-3106 (chrome) |
| CVE-2011-3107 (chrome) |
| CVE-2011-3108 (chrome) |
| CVE-2011-3109 (chrome) |
| CVE-2011-3110 (chrome) |
| CVE-2011-3111 (chrome) |
| CVE-2011-3112 (chrome) |
| CVE-2011-3148 |
| CVE-2011-3148 (linux-pam) |
| CVE-2011-3149 |
| CVE-2011-3149 (linux-pam) |
| CVE-2011-3174 |
| CVE-2011-3175 |
| CVE-2011-3175 (zenworks_configuration_management) |
| CVE-2011-3176 |
| CVE-2011-3176 (zenworks_configuration_management) |
| CVE-2011-3193 (pango, qt) |
| CVE-2011-3194 (qt) |
| CVE-2011-3361 |
| CVE-2011-3361 (backuppc) |
| CVE-2011-3443 (safari) |
| CVE-2011-3444 (mac_os_x, mac_os_x_server) |
| CVE-2011-3446 (mac_os_x, mac_os_x_server) |
| CVE-2011-3447 (mac_os_x, mac_os_x_server) |
| CVE-2011-3448 (mac_os_x, mac_os_x_server) |
| CVE-2011-3449 (mac_os_x, mac_os_x_server) |
| CVE-2011-3450 (mac_os_x, mac_os_x_server) |
| CVE-2011-3452 (mac_os_x, mac_os_x_server) |
| CVE-2011-3453 (mac_os_x, mac_os_x_server) |
| CVE-2011-3457 (mac_os_x, mac_os_x_server) |
| CVE-2011-3458 (mac_os_x, mac_os_x_server) |
| CVE-2011-3459 (mac_os_x, mac_os_x_server) |
| CVE-2011-3460 (mac_os_x, mac_os_x_server) |
| CVE-2011-3462 (mac_os_x, mac_os_x_server) |
| CVE-2011-3463 (mac_os_x, mac_os_x_server) |
| CVE-2011-3464 |
| CVE-2011-3562 |
| CVE-2011-3626 (logsurfer, logsurfer+) |
| CVE-2011-3637 (linux_kernel) |
| CVE-2011-3671 (firefox, seamonkey, thunderbird) |
| CVE-2011-3829 |
| CVE-2011-3829 (support_incident_tracker) |
| CVE-2011-3830 |
| CVE-2011-3830 (support_incident_tracker) |
| CVE-2011-3831 |
| CVE-2011-3831 (support_incident_tracker) |
| CVE-2011-3832 |
| CVE-2011-3832 (support_incident_tracker) |
| CVE-2011-3833 |
| CVE-2011-3833 (support_incident_tracker) |
| CVE-2011-3846 (system_management_homepage) |
| CVE-2011-3874 (android) |
| CVE-2011-4031 (ffmpeg) |
| CVE-2011-4042 (frontvue, pcvue, plantvue) |
| CVE-2011-4043 (frontvue, pcvue, plantvue) |
| CVE-2011-4044 (frontvue, pcvue, plantvue) |
| CVE-2011-4045 (frontvue, pcvue, plantvue) |
| CVE-2011-4077 (kernel) |
| CVE-2011-4097 (linux_kernel) |
| CVE-2011-4105 |
| CVE-2011-4105 (lightdm) |
| CVE-2011-4110 (kernel) |
| CVE-2011-4112 (linux_kernel) |
| CVE-2011-4113 |
| CVE-2011-4113 (views) |
| CVE-2011-4131 (linux_kernel) |
| CVE-2011-4132 (kernel) |
| CVE-2011-4133 (moodle) |
| CVE-2011-4185 (iprint) |
| CVE-2011-4186 (iprint) |
| CVE-2011-4187 (iprint) |
| CVE-2011-4188 |
| CVE-2011-4188 (imanager) |
| CVE-2011-4189 |
| CVE-2011-4189 (groupwise) |
| CVE-2011-4278 (moodle) |
| CVE-2011-4279 (moodle) |
| CVE-2011-4280 (moodle, spike_phpcoverage) |
| CVE-2011-4281 (moodle) |
| CVE-2011-4282 (moodle) |
| CVE-2011-4283 (moodle) |
| CVE-2011-4284 (moodle) |
| CVE-2011-4285 (moodle) |
| CVE-2011-4286 (moodle) |
| CVE-2011-4287 (moodle) |
| CVE-2011-4288 (moodle) |
| CVE-2011-4289 (moodle) |
| CVE-2011-4290 (moodle) |
| CVE-2011-4291 (moodle) |
| CVE-2011-4292 (moodle) |
| CVE-2011-4293 (moodle) |
| CVE-2011-4294 (moodle) |
| CVE-2011-4295 (moodle) |
| CVE-2011-4296 (moodle) |
| CVE-2011-4298 (moodle) |
| CVE-2011-4299 (moodle) |
| CVE-2011-4300 (moodle) |
| CVE-2011-4301 (moodle) |
| CVE-2011-4302 (moodle) |
| CVE-2011-4303 (moodle) |
| CVE-2011-4304 (moodle) |
| CVE-2011-4305 (moodle) |
| CVE-2011-4306 (moodle) |
| CVE-2011-4307 (moodle) |
| CVE-2011-4308 (moodle) |
| CVE-2011-4309 (moodle) |
| CVE-2011-4314 (jboss_enterprise_application_platform, kay_framework, openid4java) |
| CVE-2011-4320 |
| CVE-2011-4320 (ejabberd) |
| CVE-2011-4325 (kernel) |
| CVE-2011-4326 (linux_kernel) |
| CVE-2011-4328 (gnash) |
| CVE-2011-4330 (kernel) |
| CVE-2011-4337 |
| CVE-2011-4337 (support_incident_tracker) |
| CVE-2011-4358 |
| CVE-2011-4408 (ubuntu_linux) |
| CVE-2011-4409 (ubuntu) |
| CVE-2011-4447 |
| CVE-2011-4447 (bitcoind, wxbitcoin) |
| CVE-2011-4458 |
| CVE-2011-4458 (rt) |
| CVE-2011-4459 |
| CVE-2011-4459 (rt) |
| CVE-2011-4460 |
| CVE-2011-4460 (rt) |
| CVE-2011-4486 |
| CVE-2011-4487 |
| CVE-2011-4535 (modbustagserver, scadaphone, turbopower_abbrevia) |
| CVE-2011-4594 (linux_kernel) |
| CVE-2011-4599 (international_components_for_unicode) |
| CVE-2011-4608 (jboss_enterprise_application_platform) |
| CVE-2011-4611 (linux_kernel) |
| CVE-2011-4614 |
| CVE-2011-4614 (typo3) |
| CVE-2011-4621 (linux_kernel) |
| CVE-2011-4622 (kvm) |
| CVE-2011-4638 (webtitan) |
| CVE-2011-4639 (webtitan) |
| CVE-2011-4640 (webtitan) |
| CVE-2011-4816 |
| CVE-2011-4816 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...) |
| CVE-2011-4817 |
| CVE-2011-4817 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...) |
| CVE-2011-4818 |
| CVE-2011-4818 (maximo_asset_management, maximo_asset_management_essentials) |
| CVE-2011-4819 |
| CVE-2011-4819 (maximo_asset_management, maximo_asset_management_essentials) |
| CVE-2011-4871 (opcsystems.net) |
| CVE-2011-4874 (promotic) |
| CVE-2011-4880 (webmi2ads) |
| CVE-2011-4881 (webmi2ads) |
| CVE-2011-4882 (webmi2ads) |
| CVE-2011-4883 (webmi2ads) |
| CVE-2011-4898 |
| CVE-2011-4898 (wordpress) |
| CVE-2011-4899 |
| CVE-2011-4899 (wordpress) |
| CVE-2011-4923 |
| CVE-2011-4923 (backuppc) |
| CVE-2011-4956 (wordpress) |
| CVE-2011-4957 (wordpress) |
| CVE-2011-4963 |
| CVE-2011-5000 (openssh) |
| CVE-2011-5067 |
| CVE-2011-5068 |
| CVE-2011-5069 |
| CVE-2011-5070 |
| CVE-2011-5071 |
| CVE-2011-5072 |
| CVE-2011-5073 |
| CVE-2011-5074 |
| CVE-2011-5075 |
| CVE-2011-5081 |
| CVE-2011-5081 (backuppc) |
| CVE-2011-5082 (s2member) |
| CVE-2011-5083 |
| CVE-2011-5083 (dotclear) |
| CVE-2011-5084 |
| CVE-2011-5084 (movable_type) |
| CVE-2011-5084 (movable_type, movabletype) |
| CVE-2011-5085 |
| CVE-2011-5085 (movable_type) |
| CVE-2011-5085 (movable_type, movabletype) |
| CVE-2011-5086 (unitronics_uniopc) |
| CVE-2011-5087 (trace_mode_data_center) |
| CVE-2011-5088 |
| CVE-2011-5088 (bizviz, genesis32) |
| CVE-2011-5089 |
| CVE-2011-5089 (genesis32, bizviz) |
| CVE-2011-5090 |
| CVE-2011-5090 (grboard) |
| CVE-2011-5091 |
| CVE-2011-5091 (grboard) |
| CVE-2011-5092 |
| CVE-2011-5092 (rt) |
| CVE-2011-5093 |
| CVE-2011-5093 (rt) |
| CVE-2011-5094 |
| CVE-2011-5094 (network_security_services) |
| CVE-2011-5095 |
| CVE-2011-5096 (aura_application_server_5300) |
| CVE-2011-5124 (proxyone, proxysg) |
| CVE-2012-0002 |
| CVE-2012-0002 (remote_desktop_protocol, windows_7, windows_server_2003, windows_server_2008, win...) |
| CVE-2012-0006 |
| CVE-2012-0006 (windows_server_2003, windows_server_2008) |
| CVE-2012-0008 |
| CVE-2012-0008 (visual_studio) |
| CVE-2012-0016 |
| CVE-2012-0016 (expression_design) |
| CVE-2012-0018 |
| CVE-2012-0018 (visio_viewer) |
| CVE-2012-0036 |
| CVE-2012-0036 (curl, libcurl) |
| CVE-2012-0037 |
| CVE-2012-0038 (linux_kernel) |
| CVE-2012-0041 (wireshark) |
| CVE-2012-0042 (wireshark) |
| CVE-2012-0043 (wireshark) |
| CVE-2012-0044 (linux_kernel) |
| CVE-2012-0047 (wicket) |
| CVE-2012-0054 |
| CVE-2012-0054 (golismero) |
| CVE-2012-0058 (linux_kernel) |
| CVE-2012-0060 (rpm) |
| CVE-2012-0061 (rpm) |
| CVE-2012-0066 (wireshark) |
| CVE-2012-0121 |
| CVE-2012-0121 (data_protector_express) |
| CVE-2012-0122 |
| CVE-2012-0122 (data_protector_express) |
| CVE-2012-0123 |
| CVE-2012-0123 (data_protector_express) |
| CVE-2012-0124 |
| CVE-2012-0124 (data_protector_express) |
| CVE-2012-0125 (hp-ux) |
| CVE-2012-0126 (hp-ux) |
| CVE-2012-0127 |
| CVE-2012-0127 (performance_manager) |
| CVE-2012-0128 (onboard_administrator) |
| CVE-2012-0129 (onboard_administrator) |
| CVE-2012-0130 (onboard_administrator) |
| CVE-2012-0133 (procurve_switch_5400zl, procurve_switch_5400zl_management_module, procurve_switch...) |
| CVE-2012-0134 |
| CVE-2012-0135 (system_management_homepage) |
| CVE-2012-0141 |
| CVE-2012-0141 (excel, excel_viewer, office, office_compatibility_pack) |
| CVE-2012-0142 |
| CVE-2012-0142 (excel, excel_viewer, office, office_compatibility_pack) |
| CVE-2012-0143 |
| CVE-2012-0143 (excel, office) |
| CVE-2012-0146 |
| CVE-2012-0146 (forefront_unified_access_gateway) |
| CVE-2012-0147 |
| CVE-2012-0147 (forefront_unified_access_gateway) |
| CVE-2012-0151 |
| CVE-2012-0151 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp) |
| CVE-2012-0152 |
| CVE-2012-0152 (remote_desktop_protocol, windows_7, windows_server_2008) |
| CVE-2012-0156 |
| CVE-2012-0156 (windows_7, windows_server_2008, windows_vista) |
| CVE-2012-0157 |
| CVE-2012-0157 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp) |
| CVE-2012-0158 |
| CVE-2012-0158 (office, office_web_components, sql_server, biztalk_server, commerce_server, visua...) |
| CVE-2012-0159 |
| CVE-2012-0159 (office, windows_7, windows_8, windows_server_2008, windows_vista, windows_xp, sil...) |
| CVE-2012-0160 |
| CVE-2012-0160 (.net_framework) |
| CVE-2012-0161 |
| CVE-2012-0161 (.net_framework) |
| CVE-2012-0162 |
| CVE-2012-0162 (.net_framework) |
| CVE-2012-0163 |
| CVE-2012-0163 (.net_framework) |
| CVE-2012-0164 |
| CVE-2012-0164 (.net_framework) |
| CVE-2012-0165 |
| CVE-2012-0165 (office, windows_server_2008, windows_vista) |
| CVE-2012-0167 |
| CVE-2012-0167 (office) |
| CVE-2012-0168 |
| CVE-2012-0168 (ie) |
| CVE-2012-0169 |
| CVE-2012-0169 (ie) |
| CVE-2012-0170 |
| CVE-2012-0170 (ie) |
| CVE-2012-0171 |
| CVE-2012-0171 (ie) |
| CVE-2012-0172 |
| CVE-2012-0172 (ie) |
| CVE-2012-0173 |
| CVE-2012-0173 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp) |
| CVE-2012-0174 |
| CVE-2012-0174 (windows_7, windows_server_2008, windows_vista) |
| CVE-2012-0175 |
| CVE-2012-0175 (windows_2003_server, windows_7, windows_server_2003, windows_server_2008, windows...) |
| CVE-2012-0176 |
| CVE-2012-0176 (silverlight) |
| CVE-2012-0177 |
| CVE-2012-0177 (office, works, works_6-9_file_converter) |
| CVE-2012-0178 |
| CVE-2012-0179 |
| CVE-2012-0179 (windows_7, windows_server_2008) |
| CVE-2012-0180 |
| CVE-2012-0180 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp) |
| CVE-2012-0181 |
| CVE-2012-0181 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp) |
| CVE-2012-0183 |
| CVE-2012-0183 (office, office_compatibility_pack, word) |
| CVE-2012-0184 |
| CVE-2012-0184 (excel, excel_viewer, office, office_compatibility_pack) |
| CVE-2012-0185 |
| CVE-2012-0185 (excel, excel_viewer, office_compatibility_pack) |
| CVE-2012-0195 |
| CVE-2012-0195 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...) |
| CVE-2012-0201 (personal_communications) |
| CVE-2012-0206 |
| CVE-2012-0206 (powerdns) |
| CVE-2012-0207 (linux_kernel) |
| CVE-2012-0210 (devscripts) |
| CVE-2012-0211 (devscripts) |
| CVE-2012-0212 (devscripts) |
| CVE-2012-0215 |
| CVE-2012-0215 (trytond) |
| CVE-2012-0216 |
| CVE-2012-0216 (apache2) |
| CVE-2012-0217 |
| CVE-2012-0217 (windows_7, windows_server_2003, windows_server_2008, windows_xp) |
| CVE-2012-0220 |
| CVE-2012-0220 (ikiwiki) |
| CVE-2012-0221 |
| CVE-2012-0221 (factorytalk, rslogix_5000) |
| CVE-2012-0222 |
| CVE-2012-0222 (factorytalk, rslogix_5000) |
| CVE-2012-0223 (termis) |
| CVE-2012-0224 (aquis, termis) |
| CVE-2012-0225 |
| CVE-2012-0225 (wonderware_information_server) |
| CVE-2012-0226 |
| CVE-2012-0226 (wonderware_information_server) |
| CVE-2012-0228 |
| CVE-2012-0228 (wonderware_information_server) |
| CVE-2012-0246 (integraxor) |
| CVE-2012-0247 |
| CVE-2012-0247 (imagemagick) |
| CVE-2012-0248 |
| CVE-2012-0248 (imagemagick) |
| CVE-2012-0253 |
| CVE-2012-0253 (pluck_sitelife) |
| CVE-2012-0256 |
| CVE-2012-0256 (traffic_server) |
| CVE-2012-0257 |
| CVE-2012-0257 (archestra_application_object_toolkit, foxboro_control_software, infusion_control_...) |
| CVE-2012-0258 (archestra_application_object_toolkit, foxboro_control_software, infusion_control_...) |
| CVE-2012-0259 (imagemagick) |
| CVE-2012-0260 (imagemagick) |
| CVE-2012-0276 |
| CVE-2012-0277 |
| CVE-2012-0278 (flashpix_plugin) |
| CVE-2012-0279 |
| CVE-2012-0282 |
| CVE-2012-0283 |
| CVE-2012-0284 (linksys_playerpt_activex_control) |
| CVE-2012-0289 |
| CVE-2012-0289 (endpoint_protection, network_access_control) |
| CVE-2012-0291 (pcanywhere, altiris_client_management_suite_pcanywhere_solution, altiris_deployme...) |
| CVE-2012-0293 |
| CVE-2012-0293 (altiris_wise_package_studio) |
| CVE-2012-0294 |
| CVE-2012-0294 (endpoint_protection) |
| CVE-2012-0295 |
| CVE-2012-0295 (endpoint_protection) |
| CVE-2012-0300 |
| CVE-2012-0301 |
| CVE-2012-0302 |
| CVE-2012-0303 |
| CVE-2012-0315 (alftp) |
| CVE-2012-0316 (android_activities, android_mykitchen) |
| CVE-2012-0317 |
| CVE-2012-0317 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...) |
| CVE-2012-0318 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...) |
| CVE-2012-0319 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...) |
| CVE-2012-0320 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...) |
| CVE-2012-0321 |
| CVE-2012-0326 |
| CVE-2012-0326 (twicca) |
| CVE-2012-0328 |
| CVE-2012-0328 (janetter) |
| CVE-2012-0330 |
| CVE-2012-0331 |
| CVE-2012-0359 |
| CVE-2012-0366 |
| CVE-2012-0367 |
| CVE-2012-0368 |
| CVE-2012-0369 |
| CVE-2012-0370 |
| CVE-2012-0371 |
| CVE-2012-0376 (unified_communications_manager) |
| CVE-2012-0378 (5500_series_adaptive_security_appliance, adaptive_security_appliance_software) |
| CVE-2012-0381 (ios, ios_xe) |
| CVE-2012-0382 (ios, ios_xe) |
| CVE-2012-0383 (ios) |
| CVE-2012-0384 (ios, ios_xe) |
| CVE-2012-0385 (ios) |
| CVE-2012-0386 (ios, ios_xe) |
| CVE-2012-0387 (ios) |
| CVE-2012-0388 (ios) |
| CVE-2012-0399 |
| CVE-2012-0399 (envision) |
| CVE-2012-0400 |
| CVE-2012-0400 (envision) |
| CVE-2012-0401 |
| CVE-2012-0401 (envision) |
| CVE-2012-0402 |
| CVE-2012-0402 (envision) |
| CVE-2012-0403 |
| CVE-2012-0403 (envision) |
| CVE-2012-0409 (autostart) |
| CVE-2012-0410 (groupwise) |
| CVE-2012-0441 (firefox, firefox_esr, network_security_services, seamonkey, thunderbird, thunderb...) |
| CVE-2012-0451 |
| CVE-2012-0454 |
| CVE-2012-0455 |
| CVE-2012-0456 |
| CVE-2012-0457 |
| CVE-2012-0458 |
| CVE-2012-0459 |
| CVE-2012-0460 |
| CVE-2012-0467 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0468 (firefox, thunderbird, seamonkey) |
| CVE-2012-0469 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0470 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0471 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0472 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr) |
| CVE-2012-0473 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0474 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0475 (firefox, thunderbird, seamonkey) |
| CVE-2012-0477 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0478 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0479 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey) |
| CVE-2012-0507 |
| CVE-2012-0507 (jre) |
| CVE-2012-0540 |
| CVE-2012-0561 (peoplesoft_products) |
| CVE-2012-0562 (peoplesoft_products) |
| CVE-2012-0564 (peoplesoft_products) |
| CVE-2012-0584 |
| CVE-2012-0634 (itunes, webkit) |
| CVE-2012-0636 (itunes, webkit) |
| CVE-2012-0637 (itunes, webkit) |
| CVE-2012-0638 (itunes, webkit) |
| CVE-2012-0639 (itunes, webkit) |
| CVE-2012-0640 |
| CVE-2012-0647 |
| CVE-2012-0648 (itunes, webkit) |
| CVE-2012-0649 (mac_os_x, mac_os_x_server) |
| CVE-2012-0651 (mac_os_x, mac_os_x_server) |
| CVE-2012-0652 (mac_os_x) |
| CVE-2012-0654 (mac_os_x, mac_os_x_server) |
| CVE-2012-0655 (mac_os_x, mac_os_x_server) |
| CVE-2012-0656 (mac_os_x) |
| CVE-2012-0657 (mac_os_x, mac_os_x_server) |
| CVE-2012-0658 (mac_os_x, mac_os_x_server) |
| CVE-2012-0659 (mac_os_x, mac_os_x_server) |
| CVE-2012-0660 (mac_os_x, mac_os_x_server) |
| CVE-2012-0661 (mac_os_x, mac_os_x_server) |
| CVE-2012-0662 (mac_os_x, mac_os_x_server) |
| CVE-2012-0675 (mac_os_x, mac_os_x_server) |
| CVE-2012-0676 (safari) |
| CVE-2012-0677 |
| CVE-2012-0677 (itunes) |
| CVE-2012-0679 |
| CVE-2012-0680 |
| CVE-2012-0682 |
| CVE-2012-0682 (safari) |
| CVE-2012-0683 |
| CVE-2012-0683 (safari) |
| CVE-2012-0688 (silver_fabric_activematrix_service_grid_distribution, activematrix_service_bus, a...) |
| CVE-2012-0708 |
| CVE-2012-0708 (rational_clearquest) |
| CVE-2012-0709 |
| CVE-2012-0709 (db2) |
| CVE-2012-0710 |
| CVE-2012-0710 (db2) |
| CVE-2012-0711 |
| CVE-2012-0711 (db2) |
| CVE-2012-0712 |
| CVE-2012-0712 (db2) |
| CVE-2012-0715 |
| CVE-2012-0716 (websphere_application_server) |
| CVE-2012-0717 (websphere_application_server) |
| CVE-2012-0720 (websphere_application_server) |
| CVE-2012-0723 |
| CVE-2012-0723 (aix, vios) |
| CVE-2012-0724 |
| CVE-2012-0724 (chrome) |
| CVE-2012-0725 |
| CVE-2012-0725 (chrome) |
| CVE-2012-0726 |
| CVE-2012-0726 (tivoli_directory_server) |
| CVE-2012-0740 |
| CVE-2012-0740 (tivoli_directory_server) |
| CVE-2012-0742 |
| CVE-2012-0742 (tivoli_event_pump) |
| CVE-2012-0743 |
| CVE-2012-0743 (tivoli_directory_server) |
| CVE-2012-0772 (flash_player, adobe_air) |
| CVE-2012-0773 (flash_player, flash_player_for_android, adobe_air) |
| CVE-2012-0774 |
| CVE-2012-0774 (acrobat_reader) |
| CVE-2012-0775 |
| CVE-2012-0775 (acrobat_reader) |
| CVE-2012-0776 |
| CVE-2012-0776 (acrobat_reader) |
| CVE-2012-0777 |
| CVE-2012-0777 (acrobat_reader) |
| CVE-2012-0782 (wordpress) |
| CVE-2012-0792 (moodle) |
| CVE-2012-0793 (moodle) |
| CVE-2012-0794 (moodle) |
| CVE-2012-0795 (moodle) |
| CVE-2012-0796 (moodle) |
| CVE-2012-0797 (moodle) |
| CVE-2012-0798 (moodle) |
| CVE-2012-0799 (moodle) |
| CVE-2012-0800 (moodle) |
| CVE-2012-0801 (moodle) |
| CVE-2012-0802 |
| CVE-2012-0802 (spamdyke) |
| CVE-2012-0804 |
| CVE-2012-0804 (cvs) |
| CVE-2012-0805 (sqlalchemy) |
| CVE-2012-0808 |
| CVE-2012-0808 (as31) |
| CVE-2012-0809 |
| CVE-2012-0817 (samba) |
| CVE-2012-0838 |
| CVE-2012-0863 (mumble) |
| CVE-2012-0865 (cubecart) |
| CVE-2012-0866 (postgresql) |
| CVE-2012-0867 (postgresql) |
| CVE-2012-0868 (postgresql) |
| CVE-2012-0872 |
| CVE-2012-0872 (oxwall) |
| CVE-2012-0878 |
| CVE-2012-0879 (linux_kernel) |
| CVE-2012-0883 (http_server) |
| CVE-2012-0884 |
| CVE-2012-0911 |
| CVE-2012-0911 (tikiwiki, tikiwiki_cms/groupware) |
| CVE-2012-0920 (dropbear_ssh_server) |
| CVE-2012-0932 |
| CVE-2012-0933 |
| CVE-2012-0934 |
| CVE-2012-0935 |
| CVE-2012-0936 |
| CVE-2012-0937 (wordpress) |
| CVE-2012-0942 (helix_server, helix_mobile_server) |
| CVE-2012-0946 |
| CVE-2012-0946 (unix_driver) |
| CVE-2012-0948 |
| CVE-2012-0948 (ubuntu_linux, update-manager-core) |
| CVE-2012-0949 |
| CVE-2012-0950 |
| CVE-2012-0950 (ubuntu_linux) |
| CVE-2012-0954 |
| CVE-2012-0954 (apt) |
| CVE-2012-0975 (image_hosting_script_dpi) |
| CVE-2012-0976 (silverstripe) |
| CVE-2012-0977 (lurawave_jp2_activex_control) |
| CVE-2012-0985 |
| CVE-2012-0985 (smartwi_connection_utillity, vaio_easy_connect, vaio_pc_wireless_lan_wizard, vaio...) |
| CVE-2012-0993 (zenphoto) |
| CVE-2012-0994 (zenphoto) |
| CVE-2012-0995 (zenphoto) |
| CVE-2012-1012 |
| CVE-2012-1012 (kerberos) |
| CVE-2012-1013 |
| CVE-2012-1013 (kerberos) |
| CVE-2012-1014 |
| CVE-2012-1014 (kerberos) |
| CVE-2012-1015 |
| CVE-2012-1015 (kerberos) |
| CVE-2012-1037 |
| CVE-2012-1037 (glpi) |
| CVE-2012-1039 |
| CVE-2012-1039 (dotclear) |
| CVE-2012-1053 |
| CVE-2012-1053 (puppet, puppet_enterprise_users) |
| CVE-2012-1054 |
| CVE-2012-1054 (puppet, puppet_enterprise_users) |
| CVE-2012-1089 (wicket) |
| CVE-2012-1090 (linux_kernel) |
| CVE-2012-1097 (linux_kernel) |
| CVE-2012-1113 |
| CVE-2012-1113 (gallery) |
| CVE-2012-1126 (firefox_mobile, freetype) |
| CVE-2012-1127 (firefox_mobile, freetype) |
| CVE-2012-1128 (firefox_mobile, freetype) |
| CVE-2012-1129 (firefox_mobile, freetype) |
| CVE-2012-1130 (firefox_mobile, freetype) |
| CVE-2012-1131 (firefox_mobile, freetype) |
| CVE-2012-1132 (firefox_mobile, freetype) |
| CVE-2012-1145 (network_satellite) |
| CVE-2012-1146 (linux_kernel) |
| CVE-2012-1147 (expat) |
| CVE-2012-1148 (expat) |
| CVE-2012-1162 |
| CVE-2012-1162 (libzip) |
| CVE-2012-1163 |
| CVE-2012-1163 (libzip) |
| CVE-2012-1172 |
| CVE-2012-1172 (php) |
| CVE-2012-1174 |
| CVE-2012-1174 (systemd) |
| CVE-2012-1179 (linux_kernel) |
| CVE-2012-1180 |
| CVE-2012-1180 (nginx) |
| CVE-2012-1181 |
| CVE-2012-1181 (http_server) |
| CVE-2012-1182 |
| CVE-2012-1182 (samba) |
| CVE-2012-1185 (imagemagick) |
| CVE-2012-1186 (imagemagick) |
| CVE-2012-1191 (djbdns) |
| CVE-2012-1192 (unbound) |
| CVE-2012-1193 (powerdns_recursor) |
| CVE-2012-1194 (windows_server_2008) |
| CVE-2012-1195 (lenovo_thinkmanagement_console) |
| CVE-2012-1196 (lenovo_thinkmanagement_console) |
| CVE-2012-1197 (acdsee) |
| CVE-2012-1198 (basic_analysis_and_security_engine) |
| CVE-2012-1199 (basic_analysis_and_security_engine) |
| CVE-2012-1200 (nova_cms) |
| CVE-2012-1214 (yoono_desktop) |
| CVE-2012-1215 (yoono_for_firefox) |
| CVE-2012-1216 (pbboard) |
| CVE-2012-1217 (sths_v2_web_portal) |
| CVE-2012-1218 (freelancerkit) |
| CVE-2012-1219 (freelancerkit) |
| CVE-2012-1220 (gazie) |
| CVE-2012-1221 (r2/) |
| CVE-2012-1222 (r2/extreme) |
| CVE-2012-1223 (r2/extreme) |
| CVE-2012-1224 (contentlion_alpha) |
| CVE-2012-1225 (dolibarr) |
| CVE-2012-1236 |
| CVE-2012-1236 (janetter) |
| CVE-2012-1237 |
| CVE-2012-1237 (sencha_sns) |
| CVE-2012-1238 |
| CVE-2012-1238 (sencha_sns) |
| CVE-2012-1239 |
| CVE-2012-1239 (e-studio) |
| CVE-2012-1240 (dokodemo_rikunabi_2013) |
| CVE-2012-1241 |
| CVE-2012-1241 (activescriptruby) |
| CVE-2012-1243 |
| CVE-2012-1243 (twitrocker2_android) |
| CVE-2012-1246 (web_mart) |
| CVE-2012-1247 (web_mart) |
| CVE-2012-1248 (basercms) |
| CVE-2012-1249 (ilunascape_android) |
| CVE-2012-1250 |
| CVE-2012-1250 (lan-w300n/r, lan-w300n/r_firmware, lan-w300n/rs, lan-w300n/rs_firmware, lan-w300n...) |
| CVE-2012-1251 |
| CVE-2012-1251 (opera) |
| CVE-2012-1251 (opera_browser) |
| CVE-2012-1252 |
| CVE-2012-1252 (rssowl) |
| CVE-2012-1253 |
| CVE-2012-1253 (roundcube_webmail) |
| CVE-2012-1254 (segue) |
| CVE-2012-1255 (segue) |
| CVE-2012-1256 (easyvista) |
| CVE-2012-1264 |
| CVE-2012-1264 (gom_media_player) |
| CVE-2012-1297 |
| CVE-2012-1297 (contao_cms) |
| CVE-2012-1310 (ios) |
| CVE-2012-1311 (ios, ios_xe) |
| CVE-2012-1312 (ios) |
| CVE-2012-1314 (ios) |
| CVE-2012-1315 (ios) |
| CVE-2012-1324 (ios) |
| CVE-2012-1327 (ios) |
| CVE-2012-1338 |
| CVE-2012-1339 |
| CVE-2012-1340 |
| CVE-2012-1342 |
| CVE-2012-1344 |
| CVE-2012-1364 (unified_computing_system_software) |
| CVE-2012-1365 (unified_computing_system_software) |
| CVE-2012-1367 (ios) |
| CVE-2012-1370 (anyconnect_secure_mobility_client) |
| CVE-2012-1410 (kadu) |
| CVE-2012-1413 (zen_cart) |
| CVE-2012-1418 (ac700_chromebook, chrome_os, cr-48_chromebook, series_5_chromebook) |
| CVE-2012-1419 (clamav, quick_heal) |
| CVE-2012-1420 (antivirus, command_antivirus, f-prot_antivirus, fortinet_antivirus, kaspersky_ant...) |
| CVE-2012-1421 (endpoint_protection, norman_antivirus_&_antispyware, quick_heal, rising_antivirus) |
| CVE-2012-1422 (nod32_antivirus, norman_antivirus_&_antispyware, quick_heal, rising_antivirus) |
| CVE-2012-1423 (anti-malware, antivirus, command_antivirus, f-prot_antivirus, fortinet_antivirus,...) |
| CVE-2012-1424 (avl_sdk, jiangmin_antivirus, norman_antivirus_&_antispyware, pc_tools_antivirus, ...) |
| CVE-2012-1425 (anti-malware, antivir, avl_sdk, endpoint_protection, fortinet_antivirus, gateway,...) |
| CVE-2012-1426 (antivirus, command_antivirus, f-prot_antivirus, norman_antivirus_&_antispyware, q...) |
| CVE-2012-1427 (norman_antivirus_&_antispyware, quick_heal, sophos_anti-virus) |
| CVE-2012-1428 (norman_antivirus_&_antispyware, quick_heal, sophos_anti-virus) |
| CVE-2012-1429 (anti-malware, bitdefender, comodo_antivirus, esafe, f-secure_anti-virus, gateway,...) |
| CVE-2012-1464 |
| CVE-2012-1464 (netdecision) |
| CVE-2012-1465 |
| CVE-2012-1465 (netdecision) |
| CVE-2012-1466 |
| CVE-2012-1471 (ocportal) |
| CVE-2012-1472 |
| CVE-2012-1493 |
| CVE-2012-1493 (big-ip_1000, big-ip_11000, big-ip_11050, big-ip_1500, big-ip_1600, big-ip_2400, b...) |
| CVE-2012-1502 (pypam) |
| CVE-2012-1515 (esxi) |
| CVE-2012-1518 |
| CVE-2012-1518 (workstation, player, fusion, esxi) |
| CVE-2012-1520 |
| CVE-2012-1520 (safari) |
| CVE-2012-1521 (chrome) |
| CVE-2012-1522 |
| CVE-2012-1522 (internet_explorer) |
| CVE-2012-1523 |
| CVE-2012-1523 (ie) |
| CVE-2012-1524 |
| CVE-2012-1524 (internet_explorer) |
| CVE-2012-1557 |
| CVE-2012-1558 |
| CVE-2012-1569 |
| CVE-2012-1569 (gnutls, libtasn1) |
| CVE-2012-1570 (maradns) |
| CVE-2012-1571 |
| CVE-2012-1573 |
| CVE-2012-1573 (gnutls) |
| CVE-2012-1574 (hadoop, cloudera_cdh) |
| CVE-2012-1575 |
| CVE-2012-1575 (cumin) |
| CVE-2012-1583 (linux_kernel) |
| CVE-2012-1589 (drupal) |
| CVE-2012-1601 (linux_kernel) |
| CVE-2012-1602 (nextbbs) |
| CVE-2012-1603 (nextbbs) |
| CVE-2012-1610 (imagemagick) |
| CVE-2012-1620 |
| CVE-2012-1620 (slock) |
| CVE-2012-1661 (arcgis, arcmap) |
| CVE-2012-1667 (bind) |
| CVE-2012-1670 |
| CVE-2012-1670 (php_grade_book) |
| CVE-2012-1671 (phppaleo) |
| CVE-2012-1711 (jdk, jre) |
| CVE-2012-1713 (jdk, jre, javafx) |
| CVE-2012-1716 (jdk, jre) |
| CVE-2012-1728 (siebel_crm) |
| CVE-2012-1729 (hyperion) |
| CVE-2012-1730 (e-business_suite) |
| CVE-2012-1731 (siebel_crm) |
| CVE-2012-1732 (siebel_crm) |
| CVE-2012-1733 (peoplesoft_products) |
| CVE-2012-1734 (mysql) |
| CVE-2012-1735 (mysql) |
| CVE-2012-1736 (fusion_middleware) |
| CVE-2012-1737 (database_server, enterprise_manager_grid_control) |
| CVE-2012-1738 (iplanet_web_server, sun_products_suite_java_system_web_server) |
| CVE-2012-1739 (e-business_suite) |
| CVE-2012-1740 (application_express_listener) |
| CVE-2012-1741 (fusion_middleware) |
| CVE-2012-1742 (siebel_crm) |
| CVE-2012-1743 (industry_applications) |
| CVE-2012-1744 (fusion_middleware) |
| CVE-2012-1745 (database_server) |
| CVE-2012-1746 (database_server) |
| CVE-2012-1747 (database_server) |
| CVE-2012-1774 |
| CVE-2012-1792 (online_merchant) |
| CVE-2012-1798 (imagemagick) |
| CVE-2012-1799 (scalance_s_firmware, scalance_s602, scalance_s612, scalance_s613) |
| CVE-2012-1800 (scalance_s_firmware, scalance_s602, scalance_s612, scalance_s613) |
| CVE-2012-1801 (interlink_module, quickteach, robotstudio_lite, robotstudio_s4, s4_opc_server, we...) |
| CVE-2012-1802 (scalance_x414-3e, scalance_x414-3e_firmware, scalance_x308-2m, scalance_x308-2m_f...) |
| CVE-2012-1804 |
| CVE-2012-1805 |
| CVE-2012-1805 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100) |
| CVE-2012-1806 |
| CVE-2012-1806 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100) |
| CVE-2012-1807 |
| CVE-2012-1807 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100) |
| CVE-2012-1808 |
| CVE-2012-1808 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100) |
| CVE-2012-1809 |
| CVE-2012-1809 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100) |
| CVE-2012-1814 |
| CVE-2012-1814 (deltav, deltav_proessentials_scientific_graph, deltav_workstation) |
| CVE-2012-1815 |
| CVE-2012-1815 (deltav, deltav_proessentials_scientific_graph, deltav_workstation) |
| CVE-2012-1816 |
| CVE-2012-1816 (deltav, deltav_proessentials_scientific_graph, deltav_workstation) |
| CVE-2012-1817 |
| CVE-2012-1817 (deltav, deltav_proessentials_scientific_graph, deltav_workstation) |
| CVE-2012-1818 |
| CVE-2012-1818 (deltav, deltav_proessentials_scientific_graph, deltav_workstation) |
| CVE-2012-1821 |
| CVE-2012-1821 (endpoint_protection) |
| CVE-2012-1823 (php) |
| CVE-2012-1824 (scadapro_client, scadapro_server) |
| CVE-2012-1825 |
| CVE-2012-1825 (counteract) |
| CVE-2012-1826 |
| CVE-2012-1826 (dotcms) |
| CVE-2012-1827 (autoform_pdm_archive) |
| CVE-2012-1828 (autoform_pdm_archive) |
| CVE-2012-1829 (autoform_pdm_archive) |
| CVE-2012-1830 |
| CVE-2012-1830 (kingview) |
| CVE-2012-1831 |
| CVE-2012-1831 (kingview) |
| CVE-2012-1832 |
| CVE-2012-1832 (kingview) |
| CVE-2012-1849 |
| CVE-2012-1849 (lync) |
| CVE-2012-1854 |
| CVE-2012-1854 (office, visual_basic_for_applications, visual_basic_for_applications_sdk) |
| CVE-2012-1855 |
| CVE-2012-1855 (.net_framework) |
| CVE-2012-1857 |
| CVE-2012-1857 (dynamics_ax) |
| CVE-2012-1858 |
| CVE-2012-1858 (lync, office_communicator, ie) |
| CVE-2012-1859 |
| CVE-2012-1859 (office_web_apps, sharepoint_foundation, sharepoint_server) |
| CVE-2012-1860 |
| CVE-2012-1860 (office_web_apps, sharepoint_server) |
| CVE-2012-1861 |
| CVE-2012-1861 (office_web_apps, sharepoint_foundation, sharepoint_server) |
| CVE-2012-1862 |
| CVE-2012-1862 (sharepoint_server) |
| CVE-2012-1863 |
| CVE-2012-1864 |
| CVE-2012-1864 (windows_2003_server, windows_7, windows_server_2003, windows_server_2008, windows...) |
| CVE-2012-1865 |
| CVE-2012-1865 (windows_2003_server, windows_7, windows_server_2003, windows_server_2008, windows...) |
| CVE-2012-1866 |
| CVE-2012-1867 |
| CVE-2012-1868 |
| CVE-2012-1870 |
| CVE-2012-1872 |
| CVE-2012-1873 |
| CVE-2012-1874 |
| CVE-2012-1875 |
| CVE-2012-1876 |
| CVE-2012-1877 |
| CVE-2012-1890 |
| CVE-2012-1891 |
| CVE-2012-1893 |
| CVE-2012-1894 |
| CVE-2012-1902 |
| CVE-2012-1902 (phpmyadmin) |
| CVE-2012-1904 (realplayer, realplayer_sp) |
| CVE-2012-1906 |
| CVE-2012-1906 (puppet, puppet_enterprise_users) |
| CVE-2012-1907 (privawall_antivirus) |
| CVE-2012-1909 |
| CVE-2012-1909 (bitcoin-qt, bitcoind, wxbitcoin) |
| CVE-2012-1910 |
| CVE-2012-1910 (bitcoin-qt) |
| CVE-2012-1916 |
| CVE-2012-1916 (atmail_open) |
| CVE-2012-1917 |
| CVE-2012-1917 (atmail_open) |
| CVE-2012-1918 |
| CVE-2012-1918 (atmail_open) |
| CVE-2012-1919 |
| CVE-2012-1919 (atmail_open) |
| CVE-2012-1920 |
| CVE-2012-1920 (atmail_open) |
| CVE-2012-1923 (helix_server, helix_mobile_server) |
| CVE-2012-1924 |
| CVE-2012-1924 (opera) |
| CVE-2012-1925 |
| CVE-2012-1925 (opera) |
| CVE-2012-1926 |
| CVE-2012-1926 (opera) |
| CVE-2012-1927 |
| CVE-2012-1927 (opera) |
| CVE-2012-1928 |
| CVE-2012-1928 (opera) |
| CVE-2012-1929 |
| CVE-2012-1929 (opera) |
| CVE-2012-1930 |
| CVE-2012-1930 (opera) |
| CVE-2012-1931 |
| CVE-2012-1931 (opera) |
| CVE-2012-1937 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr) |
| CVE-2012-1938 (firefox, thunderbird, seamonkey) |
| CVE-2012-1939 (firefox_esr, thunderbird_esr) |
| CVE-2012-1940 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr) |
| CVE-2012-1941 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr) |
| CVE-2012-1942 (firefox, seamonkey, thunderbird) |
| CVE-2012-1968 (bugzilla) |
| CVE-2012-1969 |
| CVE-2012-1969 (bugzilla) |
| CVE-2012-1979 |
| CVE-2012-1979 (syndeocms) |
| CVE-2012-1984 (helix_server, helix_mobile_server) |
| CVE-2012-1985 (helix_server, helix_mobile_server) |
| CVE-2012-1986 |
| CVE-2012-1986 (puppet, puppet_enterprise_users) |
| CVE-2012-1987 |
| CVE-2012-1987 (puppet, puppet_enterprise_users) |
| CVE-2012-1988 |
| CVE-2012-1988 (puppet, puppet_enterprise_users) |
| CVE-2012-1989 (puppet, puppet_enterprise_users) |
| CVE-2012-1990 (3.0, 6.0) |
| CVE-2012-1993 (system_management_homepage) |
| CVE-2012-2010 (openvms) |
| CVE-2012-2011 (web_jetadmin) |
| CVE-2012-2018 |
| CVE-2012-2034 |
| CVE-2012-2034 (flash_player, air) |
| CVE-2012-2035 |
| CVE-2012-2035 (flash_player, air) |
| CVE-2012-2036 |
| CVE-2012-2036 (flash_player, air) |
| CVE-2012-2037 (flash_player, air) |
| CVE-2012-2038 (flash_player, air) |
| CVE-2012-2039 (flash_player, air) |
| CVE-2012-2040 (flash_player, air) |
| CVE-2012-2042 (illustrator, illustrator_cs5.5) |
| CVE-2012-2080 (node_limitnumber) |
| CVE-2012-2082 (chaos_tool_suite) |
| CVE-2012-2084 (print) |
| CVE-2012-2088 |
| CVE-2012-2089 |
| CVE-2012-2089 (nginx) |
| CVE-2012-2090 |
| CVE-2012-2091 |
| CVE-2012-2093 (gajim) |
| CVE-2012-2101 |
| CVE-2012-2110 |
| CVE-2012-2111 (samba) |
| CVE-2012-2113 |
| CVE-2012-2118 (x11) |
| CVE-2012-2120 (texlive-extra-utils) |
| CVE-2012-2121 (linux_kernel) |
| CVE-2012-2122 |
| CVE-2012-2122 (mysql, mariadb) |
| CVE-2012-2123 (linux_kernel) |
| CVE-2012-2131 |
| CVE-2012-2131 (openssl) |
| CVE-2012-2138 |
| CVE-2012-2138 (org.apache.sling.servlets.post) |
| CVE-2012-2139 (mail_gem) |
| CVE-2012-2140 (mail_gem) |
| CVE-2012-2143 |
| CVE-2012-2152 (dhcpcd) |
| CVE-2012-2154 (cdn2_video) |
| CVE-2012-2155 (cdn2_video) |
| CVE-2012-2159 (security_appscan_source, spss_data_collection) |
| CVE-2012-2161 (security_appscan_source, spss_data_collection) |
| CVE-2012-2162 |
| CVE-2012-2163 |
| CVE-2012-2163 (scale_out_network_attached_storage) |
| CVE-2012-2170 (websphere_application_server) |
| CVE-2012-2173 (security_appscan_source) |
| CVE-2012-2174 (lotus_notes) |
| CVE-2012-2175 (lotus_inotes) |
| CVE-2012-2176 (lotus_quickr) |
| CVE-2012-2181 (websphere_portal) |
| CVE-2012-2186 (open_source, certified_asterisk, digiumphones, business_edition) |
| CVE-2012-2188 (power_hardware_management_console_firmware, systems_director_management__console_...) |
| CVE-2012-2211 (egroupware) |
| CVE-2012-2214 (pidgin) |
| CVE-2012-2215 |
| CVE-2012-2217 |
| CVE-2012-2230 (cloudera_manager, cloudera_service_and_configuration_manager) |
| CVE-2012-2234 |
| CVE-2012-2234 (teampass) |
| CVE-2012-2235 (support_incident_tracker) |
| CVE-2012-2267 (helix_server, helix_mobile_server) |
| CVE-2012-2268 (helix_server, helix_mobile_server) |
| CVE-2012-2276 |
| CVE-2012-2277 |
| CVE-2012-2278 |
| CVE-2012-2279 |
| CVE-2012-2280 |
| CVE-2012-2281 |
| CVE-2012-2296 (rpx) |
| CVE-2012-2302 (sitedoc) |
| CVE-2012-2303 (spaces) |
| CVE-2012-2305 (node_gallery) |
| CVE-2012-2306 (drupal) |
| CVE-2012-2307 (addressbook) |
| CVE-2012-2308 (taxonomy_grid_catalog) |
| CVE-2012-2309 (glossify_internal_links_auto_seo) |
| CVE-2012-2310 (cctags) |
| CVE-2012-2311 (php) |
| CVE-2012-2314 (anaconda) |
| CVE-2012-2318 (pidgin) |
| CVE-2012-2320 (connman) |
| CVE-2012-2321 (connman) |
| CVE-2012-2322 (connman) |
| CVE-2012-2329 (php) |
| CVE-2012-2333 |
| CVE-2012-2334 |
| CVE-2012-2335 (php) |
| CVE-2012-2336 (php) |
| CVE-2012-2337 (sudo) |
| CVE-2012-2341 (take_control) |
| CVE-2012-2351 |
| CVE-2012-2351 (mahara) |
| CVE-2012-2352 |
| CVE-2012-2353 (moodle) |
| CVE-2012-2354 (moodle) |
| CVE-2012-2355 (moodle) |
| CVE-2012-2356 (moodle) |
| CVE-2012-2357 (moodle) |
| CVE-2012-2358 (moodle) |
| CVE-2012-2359 (moodle) |
| CVE-2012-2360 (moodle) |
| CVE-2012-2361 (moodle) |
| CVE-2012-2362 (moodle) |
| CVE-2012-2363 (moodle) |
| CVE-2012-2364 (moodle) |
| CVE-2012-2365 (moodle) |
| CVE-2012-2366 (moodle) |
| CVE-2012-2367 (moodle) |
| CVE-2012-2369 |
| CVE-2012-2369 (pidgin-otr) |
| CVE-2012-2374 |
| CVE-2012-2374 (tornado) |
| CVE-2012-2376 (php) |
| CVE-2012-2380 (roller) |
| CVE-2012-2381 (roller) |
| CVE-2012-2386 |
| CVE-2012-2386 (php) |
| CVE-2012-2388 (strongswan) |
| CVE-2012-2396 |
| CVE-2012-2399 (wordpress) |
| CVE-2012-2400 (wordpress) |
| CVE-2012-2401 (plupload, wordpress) |
| CVE-2012-2402 (wordpress) |
| CVE-2012-2403 (wordpress) |
| CVE-2012-2404 (wordpress) |
| CVE-2012-2405 |
| CVE-2012-2405 (gallery) |
| CVE-2012-2406 (realplayer, realplayer_sp) |
| CVE-2012-2411 (realplayer, realplayer_sp) |
| CVE-2012-2414 (open_source) |
| CVE-2012-2416 (open_source) |
| CVE-2012-2417 |
| CVE-2012-2418 (quickbooks) |
| CVE-2012-2419 (quickbooks) |
| CVE-2012-2420 (quickbooks) |
| CVE-2012-2421 (quickbooks) |
| CVE-2012-2422 (quickbooks) |
| CVE-2012-2423 (quickbooks) |
| CVE-2012-2424 (quickbooks) |
| CVE-2012-2425 (quickbooks) |
| CVE-2012-2426 (xarrow) |
| CVE-2012-2427 (xarrow) |
| CVE-2012-2428 (xarrow) |
| CVE-2012-2429 (xarrow) |
| CVE-2012-2435 (pligg_cms) |
| CVE-2012-2436 (pligg_cms) |
| CVE-2012-2442 (pc_suite) |
| CVE-2012-2446 |
| CVE-2012-2446 (netsweeper) |
| CVE-2012-2447 |
| CVE-2012-2447 (netsweeper) |
| CVE-2012-2451 (config-inifiles) |
| CVE-2012-2459 (bitcoin-qt, bitcoind) |
| CVE-2012-2486 (telepresence_multipoint_switch, telepresence_multipoint_switch_software, telepres...) |
| CVE-2012-2488 (asr_9000_rsp440_router, ios_xr, crs_performance_route_processor) |
| CVE-2012-2515 |
| CVE-2012-2515 (captiva_quickscan_pro, documentum_applicationxtender_desktop, intelligent_platfor...) |
| CVE-2012-2516 |
| CVE-2012-2516 (intelligent_platforms_proficy_batch_execution, intelligent_platforms_proficy_hist...) |
| CVE-2012-2559 |
| CVE-2012-2559 (kinghistorian) |
| CVE-2012-2560 |
| CVE-2012-2560 (kingview) |
| CVE-2012-2568 (blackarmor_nas) |
| CVE-2012-2595 (wincc) |
| CVE-2012-2596 (wincc) |
| CVE-2012-2597 (wincc) |
| CVE-2012-2598 (wincc) |
| CVE-2012-2603 (scrumworks) |
| CVE-2012-2614 (lattice_diamond_programmer) |
| CVE-2012-2626 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module) |
| CVE-2012-2627 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module) |
| CVE-2012-2630 |
| CVE-2012-2630 (madomagi-ip_android) |
| CVE-2012-2630 (puella_magi_madoka_magica) |
| CVE-2012-2632 (b1, b1_firmware, x1, x2, x86_firmware) |
| CVE-2012-2633 (wassup_plugin) |
| CVE-2012-2634 (feeddemon) |
| CVE-2012-2635 (dolphin_browser_hd, dolphin_for_pad) |
| CVE-2012-2636 |
| CVE-2012-2636 (web_patio) |
| CVE-2012-2637 |
| CVE-2012-2637 (web_patio) |
| CVE-2012-2638 |
| CVE-2012-2638 (smallpict) |
| CVE-2012-2639 (python) |
| CVE-2012-2640 |
| CVE-2012-2641 |
| CVE-2012-2642 |
| CVE-2012-2642 (mt4i) |
| CVE-2012-2643 (yy-board) |
| CVE-2012-2644 (mt4i) |
| CVE-2012-2647 (toolbar) |
| CVE-2012-2653 |
| CVE-2012-2653 (arpwatch) |
| CVE-2012-2655 (postgresql) |
| CVE-2012-2660 (ruby_on_rails) |
| CVE-2012-2661 (ruby_on_rails) |
| CVE-2012-2667 |
| CVE-2012-2668 |
| CVE-2012-2670 |
| CVE-2012-2671 |
| CVE-2012-2672 |
| CVE-2012-2673 |
| CVE-2012-2674 |
| CVE-2012-2675 |
| CVE-2012-2676 |
| CVE-2012-2677 |
| CVE-2012-2691 |
| CVE-2012-2692 |
| CVE-2012-2693 |
| CVE-2012-2694 (ruby_on_rails) |
| CVE-2012-2695 (ruby_on_rails) |
| CVE-2012-2702 |
| CVE-2012-2702 (ubercart_product_keys) |
| CVE-2012-2703 |
| CVE-2012-2703 (advertisement) |
| CVE-2012-2705 |
| CVE-2012-2705 (smart_breadcrumb) |
| CVE-2012-2706 |
| CVE-2012-2706 (post_affiliate_pro) |
| CVE-2012-2707 |
| CVE-2012-2707 (hostmaster) |
| CVE-2012-2708 |
| CVE-2012-2708 (hostmaster) |
| CVE-2012-2710 |
| CVE-2012-2710 (zen) |
| CVE-2012-2711 |
| CVE-2012-2711 (taxonomy_list) |
| CVE-2012-2712 |
| CVE-2012-2712 (search_api) |
| CVE-2012-2713 |
| CVE-2012-2713 (browserid) |
| CVE-2012-2715 |
| CVE-2012-2715 (amadou) |
| CVE-2012-2717 (mobile_tools) |
| CVE-2012-2719 |
| CVE-2012-2719 (filedepot) |
| CVE-2012-2720 |
| CVE-2012-2720 (tokenauth) |
| CVE-2012-2721 |
| CVE-2012-2721 (organic_groups) |
| CVE-2012-2722 (node_embed) |
| CVE-2012-2723 (maestro) |
| CVE-2012-2725 (6.x-1.0) |
| CVE-2012-2726 (protest) |
| CVE-2012-2727 (janrain_capture) |
| CVE-2012-2737 |
| CVE-2012-2738 |
| CVE-2012-2738 (vte) |
| CVE-2012-2742 (revelation) |
| CVE-2012-2743 (revelation) |
| CVE-2012-2747 (joomla) |
| CVE-2012-2748 (joomla!) |
| CVE-2012-2751 |
| CVE-2012-2752 (vma) |
| CVE-2012-2753 |
| CVE-2012-2759 (login_with_ajax) |
| CVE-2012-2760 |
| CVE-2012-2762 |
| CVE-2012-2763 |
| CVE-2012-2763 (gimp) |
| CVE-2012-2812 (libexif) |
| CVE-2012-2813 (libexif) |
| CVE-2012-2814 (libexif) |
| CVE-2012-2836 (libexif) |
| CVE-2012-2847 (chrome) |
| CVE-2012-2848 (chrome) |
| CVE-2012-2849 (chrome) |
| CVE-2012-2850 (chrome) |
| CVE-2012-2851 (chrome) |
| CVE-2012-2852 (chrome) |
| CVE-2012-2853 (chrome) |
| CVE-2012-2854 (chrome) |
| CVE-2012-2901 |
| CVE-2012-2901 (joomla_content_editor) |
| CVE-2012-2902 |
| CVE-2012-2902 (joomla_content_editor) |
| CVE-2012-2903 |
| CVE-2012-2903 (php_address_book) |
| CVE-2012-2904 |
| CVE-2012-2904 (jw_player) |
| CVE-2012-2905 |
| CVE-2012-2905 (artiphp_cms) |
| CVE-2012-2906 |
| CVE-2012-2906 (artiphp_cms) |
| CVE-2012-2907 |
| CVE-2012-2907 (aberdeen) |
| CVE-2012-2908 (viscacha) |
| CVE-2012-2909 (viscacha) |
| CVE-2012-2910 (phpthumb()) |
| CVE-2012-2911 (backupdb()) |
| CVE-2012-2912 (leaguemanager) |
| CVE-2012-2913 (leaflet_maps_marker_plugin) |
| CVE-2012-2914 (captcha) |
| CVE-2012-2915 (pac-designer) |
| CVE-2012-2916 (simple_anti_bot_registration_engine_plugin) |
| CVE-2012-2917 (share_and_follow) |
| CVE-2012-2927 (tempo, tempo6.3.0, tempo6.3.2) |
| CVE-2012-2928 (jira, confluence, gliffy) |
| CVE-2012-2935 (online_merchant) |
| CVE-2012-2936 (pligg_cms) |
| CVE-2012-2937 (pligg_cms) |
| CVE-2012-2938 (travelon_express) |
| CVE-2012-2939 (travelon_express) |
| CVE-2012-2940 (real-draw_pro) |
| CVE-2012-2941 (yandex.server_2010) |
| CVE-2012-2944 (nut) |
| CVE-2012-2947 |
| CVE-2012-2947 (certified_asterisk, open_source) |
| CVE-2012-2948 |
| CVE-2012-2948 (certified_asterisk, open_source) |
| CVE-2012-2949 |
| CVE-2012-2949 (score_m) |
| CVE-2012-2951 |
| CVE-2012-2951 (plogger) |
| CVE-2012-2952 |
| CVE-2012-2952 (jaow) |
| CVE-2012-2962 |
| CVE-2012-2962 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module) |
| CVE-2012-2970 |
| CVE-2012-2970 (sy-780/a_time_&_attendance_terminal) |
| CVE-2012-2974 (smc8024l2_switch) |
| CVE-2012-3003 (wincc) |
| CVE-2012-3005 (foxboro_control_software, infusion_ce/fe/scada, intouch, intouch/wonderware_appli...) |
| CVE-2012-3006 |
| CVE-2012-3006 (mguard_smart, mguard_industrial_rs, mguard_delta, mguard_pci, mguard_blade, eagle...) |
| CVE-2012-3007 |
| CVE-2012-3007 (dasabcip, daserver_runtime_components, dassidirect, intouch/wonderware_applicatio...) |
| CVE-2012-3016 (simatic_s7-400_cpu_412-2_pn, simatic_s7-400_cpu_414-3_pn/dp, simatic_s7-400_cpu_4...) |
| CVE-2012-3017 (simatic_s7-400_cpu_414-3_pn/dp, simatic_s7-400_cpu_416-3_pn/dp, simatic_s7-400_cp...) |
| CVE-2012-3018 (genesis32, bizviz) |
| CVE-2012-3073 (telepresence_multipoint_switch, telepresence_multipoint_switch_software, telepres...) |
| CVE-2012-3074 (telepresence_system_1300_65, telepresence_system_3000, telepresence_system_3010, ...) |
| CVE-2012-3075 (telepresence_system_1300_65, telepresence_system_3000, telepresence_system_3010, ...) |
| CVE-2012-3076 (telepresence_recording_server) |
| CVE-2012-3174 (jdk, jre) |
| CVE-2012-3231 (web@all) |
| CVE-2012-3238 |
| CVE-2012-3238 (security_gateway, security_gateway_software, unified_threat_management, unified_t...) |
| CVE-2012-3240 |
| CVE-2012-3241 |
| CVE-2012-3287 (md5crypt) |
| CVE-2012-3288 |
| CVE-2012-3289 |
| CVE-2012-3290 |
| CVE-2012-3291 |
| CVE-2012-3292 |
| CVE-2012-3347 (autoform_pdm_archive) |
| CVE-2012-3356 |
| CVE-2012-3357 |
| CVE-2012-3358 (openjpeg) |
| CVE-2012-3360 |
| CVE-2012-3361 |
| CVE-2012-3362 |
| CVE-2012-3368 (dtach) |
| CVE-2012-3372 (cyberoam_unified_threat_management) |
| CVE-2012-3374 (pidgin) |
| CVE-2012-3376 |
| CVE-2012-3383 |
| CVE-2012-3384 |
| CVE-2012-3385 |
| CVE-2012-3399 |
| CVE-2012-3426 (essex, horizon, keystone) |
| CVE-2012-3442 |
| CVE-2012-3443 |
| CVE-2012-3444 |
| CVE-2012-3533 (3.1.0.5, ovirt, ovirt-engine-cli) |
| CVE-2012-3553 |
| CVE-2012-3555 |
| CVE-2012-3556 |
| CVE-2012-3557 |
| CVE-2012-3558 |
| CVE-2012-3559 |
| CVE-2012-3560 |
| CVE-2012-3561 |
| CVE-2012-3562 |
| CVE-2012-3563 |
| CVE-2012-3564 |
| CVE-2012-3565 |
| CVE-2012-3577 |
| CVE-2012-3578 |
| CVE-2012-3585 |
| CVE-2012-3587 |
| CVE-2012-3588 |
| CVE-2012-3589 |
| CVE-2012-3590 |
| CVE-2012-3591 |
| CVE-2012-3592 |
| CVE-2012-3593 |
| CVE-2012-3594 |
| CVE-2012-3595 |
| CVE-2012-3596 |
| CVE-2012-3597 |
| CVE-2012-3792 |
| CVE-2012-3793 |
| CVE-2012-3794 |
| CVE-2012-3795 |
| CVE-2012-3796 |
| CVE-2012-3797 |
| CVE-2012-3802 (post_affiliate_pro) |
| CVE-2012-3805 |
| CVE-2012-3811 (ip_office_customer_call_reporter) |
| CVE-2012-3812 |
| CVE-2012-3814 (font_uploader) |
| CVE-2012-3815 (winlog_pro) |
| CVE-2012-3816 (winradius) |
| CVE-2012-3828 (joomla!) |
| CVE-2012-3847 (intouch, wonderware_application_server) |
| CVE-2012-3848 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module) |
| CVE-2012-3859 |
| CVE-2012-3863 (asterisk, asteriske, certified_asterisk, asterisk_business_edition) |
| CVE-2012-3881 |
| CVE-2012-3951 (sonicwall_scrutinizer) |
| CVE-2012-3979 (android, firefox, firefox_esr, firefox_mobile) |
| CVE-2012-4008 (cybozu_live) |
| CVE-2012-4009 (cybozu_live) |
| CVE-2012-4024 |
| CVE-2012-4025 |
| CVE-2012-4028 (niagra_ax_framework) |
| CVE-2012-4033 (zingiri_web_shop) |
| CVE-2012-4045 |
| CVE-2012-4520 (django) |
| CVE-2012-4598 (mcafee_virtual_technician, epo_mcafee_virtual_technician) |
| CVE-2012-4599 (smartfilter_administration) |
| CVE-2012-4730 (rt) |
| CVE-2012-4731 (rtfm) |
| CVE-2012-4732 (rt) |
| CVE-2012-4734 (rt) |
| CVE-2012-4824 (lotus_notes_traveler) |
| CVE-2012-4825 (lotus_notes_traveler) |
| CVE-2012-5173 (bigace) |
| CVE-2012-5220 (storage_data_protector) |
| CVE-2012-5307 (lotus_notes_traveler) |
| CVE-2012-5308 (lotus_notes_traveler) |
| CVE-2012-5309 (lotus_notes_traveler) |
| CVE-2012-5328 (mingle-forum) |
| CVE-2012-5329 (typsoft_ftp_server) |
| CVE-2012-5330 (asaancart) |
| CVE-2012-5331 (asaancart) |
| CVE-2012-5332 (reverse_proxy) |
| CVE-2012-5333 (pre_printing_press) |
| CVE-2012-5526 (cgi.pm) |
| CVE-2012-5668 (freetype) |
| CVE-2012-5669 (freetype) |
| CVE-2012-5756 (websphere_datapower_xc10_appliance) |
| CVE-2012-5758 (websphere_datapower_xc10_appliance) |
| CVE-2012-5759 (websphere_datapower_xc10_appliance) |
| CVE-2012-5861 (esolar_duo_photovoltaic_system_monitor, esolar_light_photovoltaic_system_monitor,...) |
| CVE-2012-5862 (esolar_duo_photovoltaic_system_monitor, esolar_light_photovoltaic_system_monitor,...) |
| CVE-2012-5863 (esolar_duo_photovoltaic_system_monitor, esolar_light_photovoltaic_system_monitor,...) |
| CVE-2013-0637 (flash_player, flash_player_for_android, adobe_air, adobe_air_sdk) |
| CVE-2013-0727 (global_mapper) |
| CVE-2013-0728 (erdas_apollo_ecwp) |
| CVE-2013-1178 (nexus_7000, nexus_7000_10-slot, nexus_7000_18-slot, nexus_7000_9-slot, nx-os, mds...) |
| CVE-2013-1182 (unified_computing_system_6120xp_fabric_interconnect, unified_computing_system_614...) |
| CVE-2013-1215 (5500_series_adaptive_security_appliance, adaptive_security_appliance_software, as...) |
| CVE-2013-2017 (linux_kernel) |
| CVE-2013-2306 (jigbrowser+) |
| CVE-2013-2338 |
| CVE-2013-2696 (all-in-on-webmaster) |
| CVE-2013-2783 |
| CVE-2013-3056 (joomla!) |
| CVE-2013-3057 (joomla!) |
| CVE-2013-3238 (phpmyadmin) |
| CVE-2013-3240 (phpmyadmin) |
| CVE-2013-3241 (phpmyadmin) |
| CVE-2013-3957 |
| CVE-2013-3958 |
| CVE-2013-3959 |
| CVE-2015-7547: Critical Vulnerability in glibc getaddrinfo |
| CVE-2016-2208 Symantec Antivirus Engine Malformed PE Header Parser Memory Access Violation |
| CVS/Subversion remote holes - Reporting MS vulnerabilities |
| CVSHOME.ORG back on-line |
| CyanogenMod Drops ROM Manager In Favor of OTA Updates |
| CyanogenMod is working on privacy mode for apps |
| CyanogenMod logged lockscreen swipe gestures |
| Cyber attack stops access to JPMorgan Chase site |
| Cyber attacks against media on the rise, rights group says |
| Cyber Attacks Sound Scarier When You Call Them the New Cold War |
| Cyber blaggers autoplunder bulging accounts on Euro pay network |
| Cyber Criminals Tying Up Emergency Phone Lines Through TDoS Attacks, DHS Warns |
| Cyber disputes loom large as Obama meets China's Xi |
| Cyber extortion. Podcast-style. |
| Cyber Security Awareness Month - Day 12 PCI DSS, (Fri, Oct 12th) |
| Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide, (Thu, Oct 18th) |
| Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1, (Sun, Oct 7th) |
| Cyber Security Awareness Month - Day 8 ISO 27001, (Mon, Oct 8th) |
| Cyber Security Awareness Month: Protecting Your Network From "Dave" |
| Cyber Storm Exercise |
| Cyber war trends: good, bad and scary |
| Cyber warfare in sights at government training conference |
| Cyber-attack on South Korea may not have come from China after all: regulator |
| Cyber-attack on South Korea may not have come from China after all-regulator |
| Cyber-Attacks Eclipse Terrorism in Impact, US Leaders Say |
| Cyberattacks Target Russian Broadcasters, Ustream CEO Responds |
| CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook., (Tue, Oct 16th) |
| Cyber-Conflict Escalates in Midst of North Korean Tensions |
| Cybercrime now major drag on financial services, PwC finds |
| Cybercrims dump email for irresistible Twitter, Facebook spam |
| Cyberespionage For Everyone |
| CyberLink LabelPrint Multiple Insecure Library Loading Arbitrary Code Execution Vulnerabilities |
| CyberLink PowerProducer Multiple DLL Loading Arbitrary Code Execution Vulnerabilities |
| CyberLink StreamAuthor Insecure Library Loading Multiple Arbitrary Code Execution Vulnerabilities |
| Cyber-Looting update |
| Cybersecurity Report Stresses Need for Cooperation |
| Cybersecurity report: All countries lag behind the bad guys |
| Cyber-security startup to flash major Android soft spots at RSA |
| Cyberspies send ZOMBIES to steal DRUGS from medical research firms |
| Cyberterrorism threat shouldn't be underestimated, some security experts say |
| Cyber-Terrorists Attacking U.S. Banks Are Well-Funded |
| Cyberwar! 5 key questions answered |
| Cyber-war: Just how dangerous are China's military hackers? |
| Cyclope Employee Surveillance Solution v6 SQL Injection |
| Dallas man linked to Anonymous hackers indicted |
| Dameware Traffic and mailbag |
| Dancing MODEL Links: Part III(b)-- Sample Data Representation, Revised |
| Dancing MODEL Links: Part IV - eXploring the Solution Space |
| DARPA Seeks To Secure Data With Electronics That Dissolve On Command |
| DARPA Wants Huge Holy Grail of Mobile Ad Hoc Networks |
| DARPA: New Threats Demand New Technologies |
| Dart Is Not the Language You Think It Is |
| Data Analytics without SQL Experience |
| Data breach? Virtual bounty hunters will hunt it down |
| Data Center Decision Time: Stay Or Go? |
| Data Classification For the Masses |
| Data in possible credit card breach appears to be old |
| Data Visualization,What is your Tool of Choice |
| Data, Laws, Cyber-Weapons Biggest Threats to Information Security |
| Database of 12 Million Apple UDIDs Leaked |
| Dates and numbers |
| Dating site eHarmony confirms password breach |
| David Rice introduces his course SEC 616, Defensible .NET |
| David Willetts: UK firms need to 'fess up to security boobs |
| Daylight Saving Time |
| DB2 10 and DB2 9 for z/OS Product Publication refreshes for April 2013 |
| DB2 10 and DB2 9 for z/OS Product Publications refreshes for November 2012 |
| DB2 10 HADR Multiple Standby's |
| DB2 10, DB2 9, and DB2 V8 Product Publications have been refreshed for April 2012 |
| DB2 Editions and Features |
| DB2 for LUW Continues to Mature -- MONREPORT Reporting Module |
| DB2 LUW -- Hide SQL Body with GET ROUTINE and PUT ROUTINE |
| DB2 Resource Constraint Analysis -- Continued (3) |
| DDoS Attackers, Network Defense Firms Record Banner Year |
| DDoS crooks: Do you want us to blitz those phone lines too? |
| DDOS is down, but still a concern for ISPs |
| Deadly Device Hacks May Be Coming Soon |
| Dean Kamen Invents Stomach Pump For Dieters |
| Death Knell For Righthaven In 9th Circuit Decision |
| Debian development server compromised |
| Decade Old KDE Bug Fixed |
| December 2015 Microsoft Patch Tuesday |
| December 2016 Patch Tuesday Brief and Updates |
| Declassified LBJ Tapes Accuse Richard Nixon of Treason |
| Decoding malware |
| Decoding Pseudo-Darkleech (#1) |
| Decoding Pseudo-Darkleech (Part #2) |
| Deep Rants; CYA from botnets to phisherZ ; Malware Acquisition postponed |
| Defacement Contest |
| Default ‘Do Not Track’ Is Best Choice for Internet Explorer 10 Users |
| Default Password in Cisco MARS |
| Defcon, vendor-hacker-shmoozing, and Storm Center Handlers in the Desert |
| Defeating A/V by inserting forged data |
| Defense Distributed Has 3D-Printed an Entire Gun |
| Defense chief calls cyberspace battlefront of the future |
| DefenseCode turns up Linksys zero-day |
| Defining Threat Intelligence Requirements |
| deja vu - "25 new unpackers added in one week" |
| Deja Vu - Advances in Rootkit malware |
| Deja Vu - PHP(BB) attack increase reports |
| Deja Vu - Request for W32.Pasobir Malware Sample |
| Deja Vu - Snow.A |
| Deja Vu - worm attacks Windows and Windows Mobile powered devices |
| Delays on Windows Update & the Death of SUS |
| Delhi - [ Min 26.4 °C |
| Delhi - [ Min 26.6 °C |
| Delhi - [ Min 31.4 °C |
| Dell Buys Enstratius, Extends Cloud Reach |
| Derangement with an Exclamation Mark |
| De-registering vgx.dll in an enterprise |
| Design Spec: Design Overview |
| Design Specification : Conversion Specifications |
| Design Specification : User Help Design |
| Design Spec–System Test Specifications |
| Despite new security in Galaxy S4, BlackBerry remains king |
| Detecting attacks against servers |
| Detecting BlackWorm Without Signatures |
| Detecting DNS Tunneling |
| Detecting file changes on Microsoft systems with FCIV |
| Detecting Random - Finding Algorithmically chosen DNS names (DGA) |
| Detecting XCodeGhost Activity |
| Detection and Deployment Guidance |
| Determining Sun Java Vulnerability |
| Developer wins appeal - code is not physical property |
| Development timeline key to linking Stuxnet, Flame malware |
| Device Sniffs Out Signs of Life After Disasters |
| Devs cook up 'leakproof' all-Tor untrackable platform |
| DHCP exploit publicly available (MS06-036) |
| DHCP OS Fingerprinting |
| DHS Can Seize Your Electronics Within 100 Mi.of US Border, Says DHS |
| DHS wants your comments. |
| DHS warns of vulns in hospital medical equipment |
| DHS, FBI Warn of Denial of Service Attacks on Emergency Telephone Systems |
| DHS: America's water and power utilities under daily cyber-attack |
| Diary Update for Cisco Greeting and ARCserve Exploits and Scanner; Regular Diary: Kismet / Metasploit / New Buffer overflows ARCserve/ New Nigerian Scam / Google update / PwStealers project / Power Ou |
| Diary Updates- Got WINS Packets - Brazil Welcomes You - Framed! - Mailbag |
| Dick Parry: Culture change |
| Did Internet Sales Tax Backers Bribe Congress? (Video) |
| Did Sweden Pay Cambodia For the Pirate Bay Co-founder? |
| Did Syrian hackers take over The Onion's Twitter account? |
| Did you know there was a bunch of other stuff announced last week? |
| Did you know you can make DB2 LOAD run faster? |
| Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k |
| Different strokes for different folks, spyware and browsers |
| Different ways of looking at security bugs |
| Digg Hints Its Replacement For Google Reader Will Include Social Media Content |
| Digital Citizenship Toolkit - Brochures, Factsheets & Tip Cards |
| Digital Pen Vibrates To Indicate Bad Spelling, Grammar and Penmanship |
| Director General of BBC Resigns Over "Poor Journalism" |
| Disaster Recovery Lessons You Might Have Missed |
| Disaster Recovery Starts with a Plan |
| Discourse: Next-Generation Discussion/Web Forum Software |
| Discovery of Early Human Tools Hint at Earlier Start |
| Dish on national security PR offensive against SoftBank |
| Disney sitcom says open source is insecure |
| Distributed FTP Brute Force Scans - Is radmin back? |
| Distributed FTP/Port 21 scan follow-up; Port 23 scan increases; |
| DNA barcodes leap out of the lab |
| DNS abnormalitities |
| DNS and DHCP Recon using Powershell |
| DNS cache poisoning again! |
| DNS Cache Poisoning Again; InfoCon Alert Status Calibration; NIST HIPAA Guide |
| DNS cache poisoning, again. |
| DNS Changer goes away on July 9th, 2012 |
| DNS Misbehaving |
| DNS problems at Network Solutions; Potential Problems with MS05-019; Filtering SSL |
| DNS problems? |
| DNS Reconnaissance using nmap |
| DNS Snort Signatures; Acrobat Reader Vuln;TCP Port 1025 Traffic; Excellent DNS Article |
| DNS vulnerability announced by NISCC today |
| DNSChanger Shutdown, Despite Laggards, Is a Good Thing |
| Do Extortionists Get Paid? |
| Do I have requirements for a separate business process flow |
| Do Insecure Open Source Components Threaten Your Apps? |
| Do we Know our enemy? |
| Do We Need a Longer School Year? |
| Do you find a Redbook useful? |
| Dockerized DShield SSH Honeypot |
| DoD Descends On DEFCAD |
| Does it Matter If You Cover Your Webcam? |
| Does Scientific Literacy Make People More Ethical? |
| DOJ asks FCC to delay Sprint-Softbank review |
| DOJ, MIT, JSTOR Seek Anonymity In Swartz Case |
| Dolphins Can Sleep One-half of Their Brain At a Time Say Researchers |
| Domain Hi-jacking Nightmare |
| Domain registrar attacked, customer passwords reset |
| Domaincop malpsam |
| Dominion Announces Plans To Close Kewaunee Nuclear Power Station In 2013 |
| DommJuice variant / AOL IM issue / ISC webcast / Microsoft Patches |
| Donations for Katrina victims - be careful |
| Don's Halloween Trick |
| Don't Build a Database of Ruin |
| Don't buy that security software! |
| Don't launch that file Adobe Reader! |
| Doomjuice/MyDoom.C, Sharp Increase in port 445 and 139 scans |
| DoS Exploit for MS05-053 released |
| DoS exploit publicly released for Cisco Aironet AP |
| DoS from 127.0.0.1; Server compromise at gnome.org; Netsky.P still spreading |
| Dotcom says new site legal, no revenge for Megaupload saga |
| Doubleclick DDoS'd, W32.Zindos.A Microsoft DoS, FXMYDOOM Feedback |
| Download.Ject Detection and Recovery -- New Phishing Attack Technique |
| Draft Computer Fraud and Abuse Act Update Expands Powers and Penalties |
| Dremel-Based Project Accepted As Apache Incubator |
| Dridex malspam example from January 2016 |
| Driver Trapped In Speeding Car At 125 Mph |
| Driver Update Addresses Radeon Frame Latency Issues |
| Drone security project to go open source |
| Drone Swarm Creates Star Trek Logo In London Sky |
| Dropbox gets a black eye in spam attack |
| Dropbox Phishing via Compromised Wordpress Site |
| Drupal Wishlist Module Cross Site Scripting Vulnerability |
| Drupal.org & group.drupal.org password disclosure, (Thu, May 30th) |
| Drupal.org User Accounts Compromised |
| Drupal's Creator Aims For World Domination |
| DSD's 'don't be stupid' mitigation strategies still work |
| Dshield down, Sun releases Solaris 10, Bots new?, Some links, Vuln in Skype |
| DShield is Famous |
| DSL Modem Flaw Lets Attackers Infect Millions of Computers in Brazil |
| DST Cisco Surprise |
| Dual-Booting PengPod Tablet Can Run Linux/Android |
| Duke Nuken 3D</em> Code Review |
| DUNZIP32.dll Buffer Overflow |
| Duqu malware resurfaces after five-month holiday |
| Dutch Architect Plans 3D Printed Building |
| Dutch Bill Seeks To Give Law Enforcement Hacking Powers |
| Dutch police arrest 17-year-old suspected of breaching hundreds of KPN servers |
| Dwindling Server Market? |
| Dyn.com DDoS Attack |
| Dynamic SQL Performance Tuning -- Continued (3) |
| e Equals One, Not MC-Squared |
| e H Roundup - Java vulnerability, Fedora 18 and Red October |
| EA Is the Game Company Disney Was Looking For |
| EA Makes Minor Tweaks To FIFA 12 For the Wii, Releases It As FIFA 13 |
| Early Discussions of Computer Security in the Media |
| Early vote count in Iran gives Rowhani wide lead |
| Easter Eggs FUN to find in your yard, BAD to find in your software. |
| Eavesdropping on Bluetooth Headsets |
| eBay CISO receiving security industry lifetime achievement award |
| ebay.co.uk |
| eBay/Paypal Phishing; Shame on that prophet; iframeDOLLARS; Cyber Extortion; OSX hardening; Incident Responder Analysis Tools |
| EC Software Help & Manual 'ijl15.dll' DLL Loading Arbitrary Code Execution Vulnerability |
| Educational Linux Distro Provides Tech-Bundle For Kids and Educators |
| Edward Tufte's Defense of Aaron Swartz and the "Marvelously Different" |
| EE.UU. culpa a Irán de ciberataques |
| eEye Releases Free Scanner for MS06-040 |
| eEye Upcoming Advisory - both uses and abuses Symantec security applications |
| EFF Jumps In To Defend Bloggers Being Sued By Prenda |
| EFF Resumes Accepting Bitcoin Donations After Two Year Hiatus |
| EFF Sues to Block New Internet Sex-Offender Law |
| Effective File Search (EFS) DLL Loading Arbitrary Code Execution Vulnerability |
| EFI rootkit for Macs demonstrated |
| E-Gold Scams |
| Egyptian Forces Capture 3 Divers Trying To Cut Undersea Internet Cable |
| Eight People Charged in International Cybercrime Scheme (June 12 & 13, 2013) |
| Einstein Letter Critical of Religion To Be Auctioned On EBay |
| Election poll shot down by DDoS-ers |
| Election Security Risks, Potential Voting Failures Loom |
| Eliminating 911 Misdials in Your MLTS/PBX |
| Elon Musk Lays Out His Evidence That NYT Tesla Test Drive Was Staged |
| Elon Musk Will Usher In the Era of Electric Cars |
| Email attachment vector for IE createTextRange() Remote Command Execution |
| Email From Beyond - Tell us your own Halloween stories |
| Email from Guy Rosen at Blue Security |
| Email hacks router |
| Email Ploy;Cisco Password Leak Source;Cisco CCO Password Reset Reply-To Spoof Concern;Patch Tuesday Preview;Windows 2000 SP4 Rollup 1 Re-Release |
| Emails Sent To The Handlers |
| E-mails with malicious links targeting Australia |
| Embedded systems vendors careless says Metasploit author |
| Embedded systems vendors careless says Metasploit author HD Moore |
| Embotics Tackles Virtual Machine Management With V-Commander |
| EMC IRM License Server DoS Server 4.6.1.1995 |
| EMC Navigates the IT Transformation Waters |
| EMC vuln gives mere sysadmins the power of storage admins |
| EMCworld 2013: VIPR, ONTAP, and the hidden burden of software-defined storage |
| EMET 5.5 Released |
| Empty emails? |
| Emscripten Compiler Gets Optimizations, Now Self-Hosting |
| Encryption of "data at rest" in servers |
| End of passwords' predictions are premature - Cambridge boffin |
| Energy assets in front line of cyber war |
| Energy Production Is As 'Dirty' As Ever |
| e-netprotections.su ?, (Fri, May 17th) |
| Enforcing USB Storage Policy with PowerShell |
| English May Have Retained Words From an Ice Age Language |
| Enhancing pentesting recon with nmap |
| ENISA recommends "assume all PCs are infected" |
| Ensuring that mobile applications are truly secure, part 2 |
| Enter the Trial in Steubenville, Where the Cast Is Not Merely Football Players |
| Enterprise Architecture state and causes (v) |
| Enterprise Architecture state and causes in ten points |
| Enterprise Architecture state and causes, (ii) |
| Enterprise Architecture supports business methods application rather than replaces them |
| Entertaining Bug in Microsoft Word |
| Entire Cities In World of Warcraft Dead, Hack Suspected |
| Entries Open For First Ever 24-Hour Raspberry Pi Hackathon |
| EP.net DNS Survey |
| EPA Makes a Rad Decision |
| EPA Report That Lowers Methane-Leak Estimates Further Divides Fracking Camps |
| EPA: No Single Cause For Colony Collapse Disorder |
| Epic and Mozilla Bring HTML5 OpenGL Demo To the Browser |
| Eric Cowperthwaite: Connect the dots |
| Erlang Getting Too-Big-To-Fail Process Flag |
| Ernesto domain name registrations up |
| ERP on the move |
| ERP Orchestration |
| ERP Selection and Implementation: It's All in the Timing |
| ERP Systems: Where E = Education |
| Errata, Mea Culpa, "latest" "Date released" and "Date Published" |
| Escaping the P2P-induced alert onslaught |
| Espionage - How Things Have Changed |
| E-Sports League Stuffed Bitcoin Mining Code Inside Client Software |
| Essays Related to NSA Spying Documents |
| Ethereal Advisory |
| Ethereal becomes Wireshark |
| Ethereal Security Issue |
| Ethereal Vulnerabilities / NetSky.P |
| Ethereal Vulnerability |
| Ethics / SSH brute forcing continues |
| Etsy Is Trying to Pop Silicon Valley's Meritocracy Bubble |
| Etymology; Homographic Attacks; and other BIG words |
| EU Antitrust Chief: Google "Diverting Traffic" & Will Be Forced To Change |
| EU Authorities To Demand Reversal of Google Privacy Policy |
| EU Calls for Unified Approach to Allocating "White Space" Spectrum |
| EU Court Asked To Rule On Private Copying |
| EU Data Protection Proposal Taken Word For Word From US Lobbyists |
| EU duties on Chinese solar panels losing member: state support |
| EU Passes Resolution Against ITU Asserting Control Over Internet |
| EU Privacy Watchdog To ICANN: Law Enforcement WHOIS Demands "Unlawful" |
| EU regulators side with Microsoft in IE10's 'Do Not Track controversy |
| EU says ready to launch trade dispute over China telecoms |
| EU Set To Charge Microsoft Over Ruling Breach |
| EU To Ban Neonicotinoid Insecticides |
| European Commission Launches $12 Billion Chip Support Campaign |
| European hackers suspected in Utah Medicaid files breach |
| European Parliament Decides Not To Ban Internet Porn |
| Even Windows 8 Users Prefer Windows 7 |
| Everyday is April Fools Day in your Mailbox |
| Everything old is new again - Blackhole exploit kit since November 2015 |
| Evidence for Unconscious Math, Language Processing Abilities |
| evilcode.class, (Sun, Mar 25th) |
| Evildoers can now turn all sites on a Linux server into silent hell-pits |
| Evolutions in the honeypot/honeynet arena |
| Example of Getting Analysts & Researchers Away |
| Excel Issue Scorecard |
| Excel new vuln FAQ |
| Ex-CIA Director Sees New Phase Of Warfare Where Cyberweapons Create Physical Destruction (March 4, 2012) |
| EXCLUSIVE - Microsoft, Symantec disrupt cyber ring, halt searches |
| Exclusive: Huawei CFO linked to firm that offered HP gear to Iran |
| Exclusive: Japan's Sharp cuts iPad screen output |
| Exclusive: Microsoft, FBI take aim at global cyber crime ring |
| Ex-Employee Busted For Tampering With ERP System |
| eXchange POP3 |
| Ex-Marine Detained For Facebook Posts Deemed "Terrorist in Nature" |
| Experiment Will Determine Dinosaur's Skin Color |
| Experts finger disk-wiping badness used in S Korea megahack |
| Experts: Iran and North Korea are looming cyberthreats to U.S. |
| Experts: Network security deteriorating, privacy a lost cause |
| Exploit #2 released for for Windows Services Insecure ACLs Local Privilege Escalation |
| Exploit Attempts for Drupal RESTWS .x Module Vulnerability |
| Exploit Available For Cisco IKEv1 and IKEv2 Buffer Overflow Vulnerability |
| Exploit available for MS05-011, Rumored spikes in 445 scanning |
| Exploit circulating for newly patched Oracle bug |
| Exploit Code for MS05-047 |
| Exploit code reported for CVS Vulnerability |
| Exploit for Cisco Vulnerabilities Released |
| Exploit for Snort BO available! |
| Exploit Kits are a mess, (Sun, May 13th) |
| Exploit o' the day: DROWN |
| Exploit: NCMedia Sound Editor Pro v7.5.1 SEH&DEP |
| Exploiting (pretty) blind SQL injections |
| Exploits Available For MS04-11 Vulns – **PATCH NOW** |
| Exploits for most recent Microsoft Patches |
| Exploits for new microsoft vulnerabilities. |
| Exploits in the wild for several PHP-based web apps |
| Explosive Detecting Devices Face Off With Bomb Dogs |
| Exposing the Machinery of the Resistome |
| Exposure to Backlit Displays Reduces Melatonin Production |
| Extending the range |
| Extracting Malware Transmitted Via Telnet |
| Extracting pcap from memory |
| Extracting Shellcode From JavaScript |
| EyeRing Could Help Blind People See Objects |
| Facebook acquires Face.com |
| Facebook Adds Privacy, Security Controls for Page Administrators |
| Facebook and physicians: Not good medicine |
| Facebook attacked with credential-harvesting malware |
| Facebook Banter More Memorable Than Lines From Recent Books |
| Facebook Begins Eliminating Fake Likes, Page Fan Counts Drop |
| Facebook Enables HTTPS By Default for North America |
| Facebook Faces High-Level Staff Exodus |
| Facebook gets freakier with Take This Lollypop |
| Facebook hacker comes clean on 'what really happened' |
| Facebook joins Google in warning DNSChanger victims |
| Facebook Joins Linaro Linux-on-ARM Effort |
| Facebook 'Likes' Used to Predict Personality Traits, Social Preferences |
| Facebook offers just a week of free Android AV |
| Facebook proposes more changes to privacy policy |
| Facebook Pushes Back Against Employers Wanting Passwords |
| Facebook scammers host Trojan horse extensions on the Chrome Web Store |
| Facebook SDK hole leaves accounts vulnerable |
| Facebook Sued By Rembrandt IP For Two Patent Violation |
| Facebook Switching To HTTPS By Default |
| Facebook Tests 'Want' Button To Hoard User Data, Save Its Stock Price |
| Facebook warns employers not to ask job applicants for log-in credentials |
| Facebook's Hackathons Get a Rethink |
| Factbox: Key companies in the phablet space |
| Failure Is An Option |
| Fake Adobe Flash Update OS X Malware |
| Fake Android antivirus app likely linked to Zeus banking Trojan, researchers say |
| Fake fingers fool Brazilian biometrics |
| Fake Chrome update for Android |
| Falling Windows RT Tablet Prices Signify Slow Adoption |
| False positive on sfc.dll |
| Famed Hacker Guilty of 'Stealing' iPad User Data |
| Family News Network of the ICRC - Hurricane Katrina |
| Fans Bring Back Half Life Game Series: Black Mesa Mod Launches 9/14 |
| Fantastic js1k Submissions |
| FAQ on PowerPoint 0-day |
| FAQ: Flame, the "super spy" |
| Farewell 6Bone |
| FAST MOVING EMAIL VIRUS, More IE scripting concerns |
| Fast-Food Logos Burned Into Pleasure Center of Children's Brains |
| FBI Agent's Laptop 'Hacked' To Grab 12 Million Apple IDs - UPDATED |
| FBI could be shutting down 13800 UK internet connections |
| FBI denies hackers' claims on Apple data |
| FBI denies leak of Apple codes |
| FBI frets about dumb security in smart meters |
| FBI Launches $1 Billion Nationwide Face Recognition System |
| FBI Looking Into HP's Charges Against Autonomy [REPORT] |
| FBI says Apple ID heist claim is TOTALLY FALSE |
| FBI: Cyberattacks could shove aside terrorism as No. 1 threat to US |
| FBI: Cyberattacks grow as national security menace |
| FCC asks for comments on mobile network shutdowns for public safety |
| FCC Moves To Boost Wireless Speeds |
| FCC posts Enquiry Documents on Google Wardriving , (Mon, Apr 30th) |
| FCC Seeking Public Comment on Cell Phone Blocking (March 3, 2012) |
| FCC To Review the Relative Value of Low, High, and Super-high Spectrum Licenses |
| FCC To Update 1996 Cell Phone Radiation Standard |
| FDA urges protection of medical devices from cyber threats |
| Fear and Imagination |
| February 2013 (RSU1301) service package has been tested and is now available |
| Fed says internal site breached by hackers, no critical functions affected |
| Fed says still determining extent of hacker breach, FBI probing |
| Fed still gauging extent of hacker breach, FBI on case |
| Federal Agencies and Fortune 500 Companies Eradicating DNSChanger (March 1, 2012) |
| Federal IT pros look at BYOD security, management concerns |
| Federal Reserve, DOE Confirm Hackers Breached Servers, Stole Data |
| Fedora 18 Installer: Counterintuitive and Confusing? |
| Fedora Core 4 goes into maintenance mode, FC1 and FC2 end-of-life |
| Feds Drop CFAA Charges Against 'Hacker' Who Exploited Poker Machines |
| Feds issue final 'Do Not Track' privacy recommendations |
| Feds say Megaupload user content could be deleted this week |
| Feds Warn of Cyber Threats, Seek Expanded Authority for DHS |
| Feedback On Simcity Gets User Banned From EA Forums |
| Feeding DShield with OSSEC Logs |
| Feeling a little tracked and monitored online |
| Fewer than half of Facebook and Google users understood the sites' privacy policies |
| FF/TB Updates |
| FFmpeg 0.10 "Freedom" released - Update |
| Field Day Exercise |
| Fifth Debian 6.0 "Squeeze" update released |
| Fighting TSA Harassment of Disabled Travelers |
| File-Sharing For Personal Use Declared Legal In Portugal |
| Fill out your email! |
| Final weeks of support arrive for service-pack-free Windows 7 |
| Finally, why supercomputing? |
| Financial services under more frequent DDOS attacks |
| FinCen quicknews hacked |
| Finding abuse contacts for a domain |
| Fingerprint reader reveals passwords |
| Fingerprinting Phishers |
| Finland a haven for vulnerable SCADA systems |
| Finland Hosts Mobile Phone Throwing Championships |
| Fireflies Bring Us Brighter LEDs |
| Firefox "new tab" feature tweaked following privacy concerns |
| Firefox ... |
| Firefox 1.0.1 fixes vulns; RootkitRevealer output; more on port 41523 |
| Firefox 1.0.3 Alternate Workaround; OhMyGodGoogleIsGone!, Update: IPSec vuln announced |
| Firefox 1.0.4; DNSSEC Tools; Phisher's benefit use Google link; Viewing Chat Logs; Web Browser Forensics; Gecko Based Browers HTTP Authentication Prompt Vulnerability |
| Firefox 1.5 beta 1 released |
| Firefox 1.5 Released |
| Firefox 1.5.0.3 Vulnerability Update |
| Firefox 1.5.0.6 release imminent |
| Firefox 12 released - can now update itself |
| Firefox 20 and Thunderbird 17.0.5 updates , (Wed, Apr 3rd) |
| Firefox 3.6.x approaches end of life |
| Firefox and Thunderbird 1.5.0.4 released |
| Firefox and Thunderbird Updates, (Wed, Jan 9th) |
| FireFox DoS exploit public |
| Firefox fix 1.5.0.3 / MySQL Patches |
| Firefox Is the First Browser To Pass the MathML Acid2 Test |
| Firefox patches; MS DoSed my Grandma; MS05-019 Exploit published |
| Firefox to spit out third-party cookies |
| Firefox update time |
| Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/, (Tue, Nov 20th) |
| Firefox v1.0.7 Released |
| Firefox Vulnerability |
| Firesheep's Scarier, More Muscular Half-Brother Cookie Cadger Released! Sort of. |
| First California lawsuit over mobile privacy issues crashes |
| First Evidence That Some Insects May Rely On Photosynthesis |
| First Exploit Attempts For Juniper Backdoor Against Honeypot |
| First Hurricane Matthew related Phish |
| First Impressions Inside the Project Holodeck VR Game World |
| First Known 'Social Chromosome' Found |
| First Mammals Observed Regenerating Tissue |
| First Mummies May Have Been Inspired by Field of Corpses |
| First Shift ! |
| First Vulnerability for Firefox 1.5 (released version) Announced - PoC available |
| Five Years of Storming |
| Fizzer Virus / Backdoor |
| FLAC Gets First Update In 6 Years |
| 'Flame' cyber-weapon went undiscovered for at least four years |
| Flame Malware: All You Need to Know |
| Flame spy virus gets order to vanish: experts |
| Flame worm's makers fail to collect Epic 0wnage award |
| Flamer Malware Spied on Middle East for More Than Five Years |
| Flamer Malware Spied on Middle East for More Than Five Years - Security - News & Reviews - eWeek.com |
| Flame's Windows Update hack required world-class cryptanalysis, researchers say |
| Flash Player 11.2 fixes critical vulnerabilities, adds silent updates |
| Flash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/, (Thu, Sep 20th) |
| 'Flashback' Mac Malware: One More Reason to Switch to Linux |
| Flashback Mac Trojan earned $14,000 from ad clicks, Symantec |
| Flashback numbers not going down - still over half a million |
| Flashback trojan exploits unpatched Java vulnerability |
| Flashback Trojan still on 650,000 Macs, security company discovers |
| Flavours of Pi |
| Flaw with GPG Signature Verification |
| Flaws in Checkpoint and RealOne; MyDoom Update; AntiVirus Software; Data Call |
| Follow the Bouncing EMule |
| Follow the Bouncing Malware IX: eGOLDFINGER |
| Followup on challenge "Spam, Recon or ??" |
| Fondly reminiscing the past |
| Footy lovers hit in Wembley playoff card snatch scam |
| For Android Users, 2012 Is Still the Year of Gingerbread |
| For Business Analysts and Project Managers: Creating Proper Business Requirements for Integration Projects |
| For Your Inspection: Source Code For Photoshop 1.0 |
| Ford and GM Open Car Software To Outside Developers |
| Foreign hacks in China hit with malicious emails |
| Forensic Analysis on iOS Devices |
| Forensicating Docker, Part 1 |
| Forgery FBI email / Virus W32.Bugbros / New PoC for Linux Vulnerability |
| Forget about Top Chef, Chopped, American idol… Here comes….. Be the Next Microsoft Employee |
| Forget phones, PRISM plan shows internet firms give NSA <i>everything</i> |
| Forget the word “cyberwar” says Marcus Ranum |
| Form Spam: Increasing the Attacker's work function. |
| Former FBI Agent: All Digital Communications Stored By US Gov't |
| Former GOP Staffer Derek Khanna Speaks On Intellectual Property |
| Former Hacker: Today's Hacks Are All About the Money |
| Former Tribune staffer denies giving hackers log-in credentials |
| Forms Authentication: Remember Me? Its Hard Not Too! |
| Fortinet Debuts Secure Wireless LAN Platform |
| Fortinet Targets MSSPs, Enterprises With New Security Blade |
| Four Anons cuffed in Italy |
| Four how-to's on finding stuff in your inbox |
| Four Ways ShoreTel Dock Helps Drive UC |
| Fox News Parent NewsCorp May Face Corruption Investigation |
| Foxconn Denies Plans For New US Operations |
| Foxconn International shares drop 4 percent after profit warning |
| Foxconn International surges 35 percent as Citi report lifts iPhone hopes |
| Foxconn Int'l says unaware of any reason for stock jump |
| Foxconn Sees New Source of Cheap Labor: The United States |
| Foxconn shares surge on brokerage report on iPhone orders |
| Foxconn Thinks the iPhone 5 Is a Pain |
| Foxconn Workers On Strike Over iPhone 5 Production |
| Foxit Reader 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability |
| Fox's Attempt To Block Ad-skipping TV Recorder Autohop Fails |
| F-Prot Anti-Virus Scanning Engine Bypass |
| Fragmentation Comes To iOS |
| Fragmentation Leads To Android Insecurities |
| fragmented packet challenge |
| Fraud: Evil People Doing Evil Things |
| Fraudsters nick BILLIONS from China's e-commerce Wild West |
| Fraudsters tempt Olympic fans with bogus streaming websites |
| Fred Flintstone, we'd like to help... |
| Free Font Helps People With Dyslexia |
| Free Software Quick Security Checklist |
| Free time? |
| Free tool to encrypt DNS requests released for Windows |
| Free Tools to Wipe Your Drives Securely |
| FreeBSD packet filter (pf) DoS using fragments. |
| FreeBSD Project Servers Compromised - http://www.freebsd.org/news/2012-compromise.html, (Sun, Nov 18th) |
| FreePBX Multiple Cross Site Scripting and Remote Command Execution Vulnerabilities |
| French Company Building a Mobile Internet Just For Things |
| freq.py super powers? |
| Fresh Apple Patches |
| Fresh batch of Microsoft patches next week , (Fri, Nov 9th) |
| Fresh food fans debunk anti–organic food report, get hacked |
| Friday Squid Blogging: Another Squid Comic |
| Friday Squid Blogging: Controlling Squid Chromatophores with Music |
| Friday Squid Blogging: Eating Giant Squid |
| Friday Squid Blogging: Efforts to Film a Live Giant Squid |
| Friday Squid Blogging: Giant Squid Engraving from the 1870s |
| Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid |
| Friday Squid Blogging: Squid Escape Artist |
| Friday Squid Blogging: Squid Ink as a Condiment |
| Friday Squid Blogging: Squid Insurance |
| Friday Squid Blogging: Squid Recipe |
| Friday Squid Blogging: Squid Sacrifices Arms to Avoid Predators |
| Friday Squid Blogging: Squirming Tentacle USB Drive |
| Friday Squid Blogging: The Search for the Colossal Squid |
| From a NAND Gate To Tetris |
| From Data on the Web to Data Analysis - Python Quickstart |
| From extreme to in depth |
| From 'Quantified Self' To 'Quantified Car' |
| From the mailbag - |
| Front Page Hack Update, Veritas Advisories |
| FrSIRT exploits for MS05-044, MS05-045, and MS05-048 |
| F-Secure Security Bulletin |
| F-Secure Vulnerability; More on Symantec UPX and Microsoft patch set |
| F-Secure Vulnerability; Symantec Patch/Update; Microsoft patch set; IDS Vendor Review |
| F-Secure web console buffer overflow |
| FSF Certifies Atheros-Based ThinkPenguin 802.11 N USB Adapter |
| FSF Opens Nominations For Free Software Awards 2012 |
| FTC chairman: Do-not-track law may not be needed |
| FTC issues guidelines on facial recognition technology |
| FTC Releases Google Privacy Audit, Blacks Out the Details |
| FTC settles spying charges on rent-to-own computers |
| FTC sues Wyndham Worldwide over data breaches |
| FTC: ID theft again tops consumer concerns |
| FTP Scans - Universities only? : BHODemon followup |
| FTP Vulnerability & Accompanying Activity |
| FTP-Brute Force Attacks and Password Management |
| FUD flies as Raytheon reveals social media analysis tool |
| Fujitsu trials anti-phone fraudster tech |
| Fukushima's Fallout of Fear |
| Full Packet Capture for Dummies |
| Fun - data integrity / PHP up to date ? / WINS |
| Fun With Windows Netstat |
| Further Review of Port 2525 Activity; K-OTik.com reveals new English version of Website |
| Fusion-io Buys Hybrid Startup NexGen |
| Future Enterprise- The Future of Big Data |
| Gadgets add complexity to brutal bank layoffs |
| GAIM buffer overflow, Aitel paper and more XP SP2 |
| Galaxy S 4 Dominates In Early Benchmark Testing |
| Game Closure "DevKit" For Mobile HTML5 Games Is Open Source |
| Gamification Goes To College |
| Gaming app ENSLAVES punter PCs in Bitcoin mining ring |
| GAO Finds US Military's Critical Technologies List Outdated, Useless |
| GAO Report on DHS; ezSTUB; Worm.Gibe.F; BlueTooth Security? ClamAv MACosX |
| Gartner Buzzword Tracker Says "Cloud Computing" Still on Hype Wave |
| Gartner predicts huge rise in monitoring of employees' social media use |
| Gauss Espionage Malware Stealing Banking Data in Middle East |
| Gauss Malware Detected Through Unique Palida Narrow Font |
| GD DoS |
| GDI Attacks via Email; Natural Disasters and Data Recovery / Data Security |
| GDI Scanner Released |
| GDI Vulnerabilities : An open letter to Microsoft |
| GDI+ exploit mutation lessons and How to (not) report an attack to a large organization |
| Geeks On a Plane Proposed To Solve Global Tech Skills Crisis |
| Gene Therapy May Protect Against Flu |
| Genesco Sues Visa Over PCI Noncompliance Fines |
| Genetically Modified Plants To Produce Natural Lighting |
| Genuine TCP Port 0 activity; Osama was not caught, but some Windows users were; New RBOT variants using SQL & IIS |
| Georgia Tech and Udacity Partner for Online M.S. in Computer Science |
| Georgian police chiefs cuffed in cyber spy plot |
| German Court Rejects Apple's Privacy Policy |
| German Court: ISPs Must Hand Over File Sharer Info |
| German Federal Court Rules That Internet Connection Is Crucial To Everyday Life |
| German Government: Stay Away From Internet Explorer |
| German Police Stop Man With Mobile Office In Car |
| German Researchers Hit 40 Gbps On Wireless Link |
| German Spam (concise version); MS05-021 and Snort Signatures; Is it a security problem? |
| German spam source found, Real services vulnerability |
| German Spam...Maybe?; Academia Security Awareness |
| Get a 40% discount on your hotel room!, (Thu, Nov 8th) |
| Get up to speed with modern data bases/data stores quickly (SQL and NoSQL) |
| Get your fresh Firefox updates |
| Get Zapped While Playing Video Games |
| Getting Better Transparency From Oil Refineries |
| Getting out in front of BYOD |
| Getting Ready for Badlock |
| Getting Ready for macOS Sierra: Upgrade Securely |
| Getting Ready for the Holidays |
| Getting spamfiltered? |
| Getting viruses out of the AVG virus vault |
| GFI Scoops up MDM Technology From VizualMobile - Mobile and Wireless - News & Reviews - eWeek.com |
| Ghost of Christmas Botnets? |
| Ghoulies and Ghosties |
| GCHQ attempts to downplay amazing plaintext password blunder |
| Gift card from Marriott? |
| Giving Your Computer Interface the Finger |
| Glasses That Hack Around Colorblindness |
| Glenn Beck Reports CIA Plot Between Embassy Killing and Something Awful |
| Global action takes down tech support scam |
| Global Arrests And Charges Against Members of Lulzsec Hacking Group (March 6, 2012) |
| Global DNS cache poisoning attack?; Update... |
| Global telecoms giant ZTE sees gold in Chinese roots |
| Global Warming Felt By Space Junk and Satellites |
| Global Warming Has Made the North Greener |
| globalSCAPE CuteZIP Stack Buffer Overflow |
| Gmail javascript vulnerability (fixed) |
| Gmail SSL Cert Expiration |
| GNOME 3.8 To Scrap Fallback Mode |
| GnuPG (GPG) 2.1.9 release announced |
| GnuPG 1.4.5 released - remote execution possible |
| GnuPG new versions-upgrade now |
| Godzilla wreaks revenge on Pakistani government web sites |
| Going Up? |
| Gold Artifact To Orbit Earth In Hope of Alien Retrieval |
| Good Cop; Bad Cop; Domain Cop? |
| Goodyear's 'On TheGo' Self Inflating Tire |
| Google $22.5 Settlement With FTC Over Privacy Criticized by Industry Group |
| Google Apps for Business receives ISO 27001 certification |
| Google Backs Down On Maps Redirect |
| Google Bad and Google Good |
| Google Betting Its Google+ Systems Know What's Best For You |
| Google Blocks Author's Ads For Offering Torrent Of His Own Book |
| Google Blogger: Vietnamese HS Students Excelling At CS |
| Google Bolsters Email Security Defenses Against Hackers, Spammers |
| Google Desktop Has New Features |
| Google Developer Competition Aims at Chrome OS Security |
| Google Develops Context-Aware Voice Search For TV |
| Google Doubts Apple Will Approve Its New Maps Application |
| Google Fiber Draws Startups To Kansas City |
| Google Fiber turned Kansas City into a magnet for tech startups |
| Google Fined $22.5M Over Safari Privacy Violation |
| Google Formally Puts Palestine On Virtual Map |
| Google Gets Into Politics With Civic Info API |
| Google Gives 15,000 Raspberry Pis To UK Schools |
| Google Go language gets used: For file-scrambling trojan, though |
| Google Grants for summer of code |
| Google Hiccup, CGI Email Script Scanning, New NIST Doc, SANSFIRE |
| Google hit by building automation security FAIL |
| Google Chrome 25 Will Serve Searches Over SSL From the Omnibox For All Users |
| Google Chrome 27 Is Out: 5% Faster Page Loads |
| Google Chrome can pin web links to the taskbar |
| Google Chrome Introduces Do Not Track |
| Google increases vulnerability bounties to $20,000 |
| Google Invests $1 Billion To Build New London HQ |
| Google launches privacy plan amid protests |
| Google offers exploit bounties for Pwn2Own and Pwnium |
| Google Offers Help, Advice for Hacked Website Owners |
| Google Ordered Back To UK Parliament To "Explain Itself" Following Investigation |
| Google patches 9 Chrome bugs, pays more to top researchers |
| Google patches Chrome for second time in eight days |
| Google Patches Chrome, Changes Mixed Content Warnings |
| Google pays $40K to 'Pinkie Pie' for partial hack of Chrome OS |
| Google plonks reCAPTCHA on Street View, makes users ID your house |
| Google ploughs ahead with privacy changes, as EU concerns remain |
| Google Privacy Director Alma Whitten Leaving |
| Google Privacy Policies Assailed by EU: Report |
| Google Pulls Access To Unsupported But Popular Weather API |
| Google puts $1M on the line for Chrome exploit rewards |
| Google raises ante for next Chrome hacking contest to $2M |
| Google Reader Being Retired |
| Google readying on-device malware scanner for Android |
| Google Reconnaissance, Sprinter-style |
| Google Redesigns Image Search, Raises Copyright and Hosting Concerns |
| Google Releases Glass Factory System Image, Rooted Bootloader |
| Google Reports Government Surveillance Requests Continue to Rise |
| Google Search Appliance Vulnerability |
| Google Security Engineer Issues Sophos Warning |
| Google Snaps Up Security Firm VirusTotal |
| Google Strangeness: Is It New?; Filthy Minkey; New phpBB; FTBM VII: Afterglow |
| Google Takes Street View To the Galapagos Islands |
| Google Talks About the Dangers of User Content |
| Google Tests White Space Spectrum For School Broadband In South Africa |
| Google to double encryption key lengths for SSL certs by year's end |
| Google to face fresh ICO scrutiny over WiFi snooping |
| Google Unveils New Search Features, Including iOS Voice Search |
| Google Updates Chrome (March 5, 2012) |
| Google ups bug bounty to $20,000 per flaw |
| Google ups the ante in cloud storage–15GB |
| Google warns 20,000 websites they could be infected with malware |
| Google Web Accelerator continued; phpBB 2.0.15 released; Backdoors more popular than Viruses?; Anti-Spyware poll results; Google.com DNS glitch; SQL server 2000 SP4 |
| Google Web Accelerator; Snort with ClamAV; RSA SecurID WebAgent Overflow |
| Google Wins FTC Award for Robocall Prevention Technology |
| Google, Facebook May See Tougher Data Use Rules in Europe |
| Google, Microsoft butt heads over IE privacy skirting |
| Google, Oracle Deny Direct Payments To Media |
| Google: BadNews Malware Wasn't Really Bad, After All |
| Google's new privacy policy breaches European law, say data regulators |
| Google's Nexus Q Successor Hits the FCC |
| Google's Pwnium ends with no winners |
| Google's reCAPTCHA briefly cracked |
| Google's Self-Driving Cars: 300,000 Miles Logged, Not a Single Accident |
| Google's trap for Chrome exploit writers leads to crashes for users |
| GOP Brief Attacks Current Copyright Law |
| GOP Senators revise cybersecurity bill |
| Got packets? Interested in TCP/8909, TCP/6666, TCP/9415, TCP/27977 and UDP/7, (Mon, May 14th) |
| Government admits seizing two months of AP phone records |
| Government Agencies, Utilities Among Targets in ‘VOHO’ Cyber-Spy Attack |
| Government, business, military are internet security threats |
| Governments should invest more in catching cybercriminals, researchers say |
| GPL Nessus Forks (1 Comments) |
| Grampa's backup |
| GRCC Student placed 3rd in a CTF contest at GrrCON 2012 |
| Great Firewall architects fingered for GitHub attack |
| Greatfire Keeps Tabs On Chinese Censorship, Automatically |
| Green Party Releases International Joint Statement Criticizing the TPP |
| Greetings awareness - Awareness greetings ? |
| Grisoft AVG False Positive |
| Group Behind 'Aurora' Attack on Google Still Active |
| Group files FTC complaint against Google for privacy changes |
| Group questions Google government contract claims |
| GTK+ 3.8 Released With Support For Wayland |
| Guest Diary: Linux Capabilities - A friend and foe |
| Guest Diary: Xavier Mertens - Integrating VirusTotal within ELK |
| Guide to Finding Safe Online Merchants |
| Guided Tour of the Clearwater HIPAA Privacy and Breach Notification Assessment Software |
| Gunman takes potshots at Dell HQ, chopper search ensues |
| H&R Block Software Glitch To Delay 600,000 U.S. Tax Refunds |
| h00d IRC bot, localhost port 80 traffic |
| Hack Bill Challenge Winners Announced |
| Hack on Saudi Aramco hit 30,000 workstations, oil firm admits |
| Hacked BitCoin Exchange Sued By Customers |
| Hacker Activity |
| Hacker Bypasses Windows 7/8 Address Space Layout Randomization |
| Hacker Grabs 150k Adobe User Accounts Via SQL Injection |
| Hacker jailed for stealing identities of 8 million UK citizens |
| Hacker leaks source code of old VMware software |
| Hacker vs. Counter-Hacker — a Legal Debate |
| Hacker warns of zombies on 2 Mich. TV broadcasts |
| Hackers breached security firm Bit9, then attacked its customers |
| Hackers claim 12 million Apple IDs from FBI *new! |
| Hackers claim 12-M Apple IDs |
| Hackers claim to have "confidential" IAEA information |
| Hackers claim to have Mitt Romney's tax records |
| Hackers deface Indonesian president’s website |
| Hackers Dump Millions of Records From Banks, Politicians |
| Hackers get into Utah health department records |
| Hackers hit Major League Baseball teams' Facebook sites |
| Hackers chop down UN eco-agency, release rare data into wild |
| Hackers infect WordPress 3.2.1 blogs to distribute TDSS rootkit |
| Hackers now pick tools from script kiddies' toybox –Âreport |
| Hackers Stole Michael Jackson's Entire Catalog From Sony (March 5, 2012) |
| Hackers target Israel government websites |
| Hackers topple Huawei routers |
| Hackers Turned Defense Contractor QinetiQ Into Intelligence Playground |
| Hacking breach made us stronger says RSA |
| Hacking by the Syrian Government |
| Hacking the Emergency Alert System Is Funny Until It's Not |
| Hacking Tor, the anonymity onion routing network |
| Hacking Wireless Drivers for Fun and Profit |
| Hactivism: A Growing Concern for Network Security |
| Haiku OS Ported To Intel 64-Bit Architecture |
| Half of Ex-Employees Walk Off with Corporate Data: Symantec Survey Findings |
| Hallo Steffi! German spyware developers try their hand at humour |
| Hancitor Maldoc Bypasses Application Whitelisting |
| Hancitor Maldoc Videos |
| Hancitor/Pony/Vawtrak malspam |
| Handheld Black Hornet Nano Drones Issued To UK Soldiers |
| Handler Candy |
| Handlers - Down and Out in the Magic Kingdom |
| Handlers in Orlando |
| Handlers in Vegas - Slow Diary Day |
| Handlers On Duty |
| Handling Malware Samples |
| Handling phishing attack (2 Comments) |
| Hands On With Virtual Reality's Greatest Hope |
| Handset makers scurry to join Year of the Phablet |
| Hands-On With Intel's "Next Unit of Computing" Mini PC |
| Happy birthday, disk drive |
| Happy Father's Day |
| Happy Independence Day; Impending Storm; Spam Challenge Protocol Pros and Cons |
| Happy Mother's Day |
| Happy New Year |
| Happy now? Mobiles, cloud, big data now 'a growing security risk' |
| Happy Thanksgiving |
| Happy turkey day |
| Happy Valentines Day and Black Tuesday |
| Happy Valentine's Day; ARCserve probes?; OWA issue; new Opera version |
| Harris kills hosted cloud service program |
| Harvard Creates Cyborg Tissues |
| Has CES Lost Its Star Appeal? |
| hashcat and oclHashcat are now open source |
| Have you noticed a decline in the amount of Spam? This could be the reason! |
| Hawaii connectivity |
| Haxdoor Incident Details at Honeyblog.Org |
| Haxdoor.KI Deja Vu |
| Heads Up: new flaw in McAfee |
| Healthcare CRM in the Cloud |
| Healthcare in the Cloud - My Office Visit and ObamaCare |
| Healthcare industry group builds cybersecurity threat center |
| Heap overflow vulnerability in Opera 9.0, 9.01 |
| Help eliminate unquoted path vulnerabilities, (Wed, Nov 7th) |
| Help us out with a Christmas story |
| Help Wanted: Please help test our experimental PFSense Client |
| Helpdesk outsourcing quagmire at heart of whistleblower lawsuit |
| Helpful Tips For Successful CRM Implementation |
| Here are some technology predictions that didn’t quite hit the mark (or the side of a barn either) |
| Here are some useful tools (free) to help out IT Pros (and others) |
| Here it is -- Your turn to be heard |
| Here’s an update on my “If you have a laptop with a fingerprint reader, beware…” post |
| Here’s another tip on customizing Outlook. Changing some defaults |
| Here's What China Thinks of Ed Snowden and the NSA |
| Here's your opportunity to learn more about DB2 for z/OS and WLM |
| 'Heroes' creator Tim Kring working on conspiracy thriller with interactive elements |
| Hexing MAC address reveals Wifi passwords |
| Hidden IFrame Remains Popular With Browse-By Exploit Authors |
| Hidden Viral Gene Discovered In GMO Crops |
| Higgs boson exists |
| High End Graphics Cards Tested At 4K Resolutions |
| High Security Animal Disease Lab Faces Uncertain Future |
| High Tech Vending Machines Transform IT Support At Facebook |
| Highlights from the 2016 HPE Annual Cyber Threat Report |
| High-Risk SAP HANA Vulnerabilities Patched |
| High-Voltage Fences For Zapping Would-Be Copper Thieves |
| HIPAA and HITECH January 2013 eNewsletter Published |
| HIPAA log clarification; Mozilla/Firefox/Thunderbird vuln reported & fixed |
| Hiring Developers By Algorithm |
| HITRUST Backs 'Community Defense' Approach to Health Care Cyber-Security |
| HIV Vaccine Safe Enough To Pass Phase 1 Human Trials |
| Hobbyist Builds Working Replica of Iron Man's Laser Gauntlet |
| 'Holey code, Batman!' Microsoft to patch 12 vulns on Tuesday |
| Hollywood studios pushing for secure, next-generation "digital home library" |
| Homeland Security Level Raised to Orange, increase in DameWare (port 6129) scans and exploit, Microsoft Retires Products (Including Windows 98), And Earthlink Users Being Targeted by Scam Using IE bug |
| Hon Hai, Mozilla to launch mobile device running on Firefox |
| Honda's "Micro Commuter" Features Swappable Bodies |
| Honeyd 1.5 Released |
| Honeynet looks to trap USB malware |
| Honeyports, powershell script |
| Honeypot Abnormality |
| Honeypot Mirroring .edu domains under .eu / Active Threat |
| Hong Kong web host jailed for DDoS stunt |
| Horde exploit attempts in the wild |
| Horde exploit downloading Perl/Shellbot |
| Hosting Provider Automatically Fixes Vulnerabilities In Customers' Websites |
| Hotfix for MSIE problem related to MS06-042 |
| Hotmail and MSN problems |
| Hotmail seeing some temporary access issues, (Wed, Jan 9th) |
| Hounded By Recruiters, Coders Put Themselves Up For Auction |
| House Approves Extending the Warrantless Wiretapping Act |
| House Subcommittee Holds Hearing On TSA's "Scanner Shuffle" |
| Housewives On Trial In China For Smuggling In iPhones |
| How a 'Catch-22' Turns into a 'Shame on You' |
| How Apple's Story Is Like <em>Breaking Bad</em> |
| How Beer Gave Us Civilization |
| How Big Data Became So Big |
| How big of a deal is the new Benghazi testimony? |
| How CIOs Can Learn to Catch Insider Crime |
| How Cosmological Supercomputers Evolve the Universe All Over Again |
| How Do We Protect Ourselves from our Frienemies? |
| How do you deploy? |
| How Do You Spot a Genius? |
| How Does the Tiny Waterbear Survive In Outer Space? |
| How EVE Online</em> Dealt With a 3,000-Player Battle |
| How Facebook Will Power Graph Search |
| How Free Speech Died On Campus |
| How Google and Apple exposed their Achilles heels this week |
| How Hair Can be Used To Track Where You've Been |
| How China's Top Digital Spies Got Outed by Facebook and Twitter |
| How long until Skynet? |
| How many ?Epoch? times? Epocalypse.py timestamp converter |
| How Million-Dollar Frauds Turned Photo Conservation Into a Mature Science |
| How Mobile Devices Kill Your Creativity |
| How Much Beef Is In Your Burger? |
| How Newegg Saved Online Retail |
| How Noah Kagan Got Fired From Facebook and Lost $100 Million |
| How Not To Launch a Gadget |
| How online black markets work |
| How Open Source Could Benefit Academic Research |
| How Red Hat Hires |
| How Secure Is the Cloud? IT Pros Speak Up |
| How Stolen iOS Devices Are Unlocked |
| How Technology Might Avert an Apocalypse |
| How That 'Extra </nobr>.9%' Could Ward Off a Zombie Apocalypse |
| How the Critics of the Apollo Program Were Proven Wrong |
| How the Super Bowl Will Reach US Submarines |
| How the Syrian Electronic Army Hacked The Onion |
| How To Communicate Faster-Than-Light |
| How To Conduct a Bona Fide HIPAA Security Risk Analysis.... |
| How to contribute your data to DShield / ISC |
| How to create an e-book |
| How to Create Governance Policies in InfoSphere Business Glossary 9.1 |
| How to deal with Oracle patches? |
| How to Elegantly Neglect Explain Plans and Radically Transform SQL |
| How to Fix America's Harmful Hacking Laws |
| how to get published plus life, parenting, and dogs catching Frisbee |
| How to hack |
| How To Hack Twitter's Two-Factor Authentication |
| How to Meet Instant Demands for Business Analytics? |
| How To Promote Stage Comedy In a Geeky Way? |
| How to Recover Pictures from Corrupt Memory Card |
| How to Remove Duplicate Emails from 'Sent Items' Folder of MS Outlook 2007 |
| How To Report A BotNet, Glitch In The Matrix?, Bouncing Malware -IS- In The Works |
| How To Safeguard Loose Nukes |
| How to Set Up Your Own Malware Trap |
| How to setup penetration testing exercises. |
| How to Stop the Next Viral Facebook Post Outbreak |
| How To Talk Like a CIO |
| How Will Amazon, Barnes & Noble Survive the iPad Mini? |
| How you can help; Strange Spam Update; port 3001 update |
| How Your #Naked Pictures Ended Up on the Internet |
| How your Webhosting Account is Getting Abused, (Tue, Mar 26th) |
| How Your Webhosting Account is Getting Hacked, (Mon, Mar 25th) |
| How's business? |
| How-to Build Your Own Custom Integration Components |
| HP Discontinue OpenVMS |
| HP EVI vs. Cisco OTV: A Technical Look |
| HP Hires Ex-Nokia Exec, Spins Off WebOS, Reportedly Returning To Tablets |
| HP JetDirect Vulnerabilities Discussed, (Sun, Jan 27th) |
| HP Offers that “Cloud Thing” |
| HP ProCurve switches shipped with malware |
| HP Upgrades Mobile Thin Clients |
| HP's "System Management Homepage" web interface vulnerable |
| HTTP Public Key Pinning: How to do it right |
| Huawei CEO breaks silence, claims company isn’t a threat to U.S. security |
| Huawei denies spying, calls for global security standards |
| Huawei doesn’t expect to gain any ground in the U.S. this year |
| Huawei founder gives first ever media interview |
| Huawei checking claims of vulnerabilities in its routers |
| Huawei is betting big with a new metal smartphone |
| Huawei is now the world’s third largest smartphone vendor, but still far behind Samsung and Apple |
| Huawei says U.S. probe unlikely to affect other business |
| Huawei says U.S. probe unlikely to affect other overseas business |
| Huawei says US stance is “protectionism” |
| Huawei says US stance is 'protectionism' |
| Huawei to continue talking with government over network issue - CEO |
| Huawei to continue talking with UK government over network issue: CEO |
| Huawei told not to apply for Australian broadband project |
| Huawei USB modems vulnerable |
| Huawei: 'trust us, we are being transparent' |
| Huawei’s Ascend W1 Windows Phone 8 smartphone revealed in leaked photos |
| Hubble Discovers 'Planetary Graveyard' Around White Dwarf |
| Huge amount of Visa and Mastercard information hacked |
| Huge cyber bank theft spans 27 countries |
| Hugo Awards Live Stream Cut By Copyright Enforcement Bot |
| Human Rights Watch proposes new laws of robotics |
| Hunting for Executable Code in Windows Environments |
| Hunting for IOC's with ioc-parser |
| Hunting for Juicy Information |
| Hurricane Katrina Follow-UP |
| Hurricane Katrina Preparations; Broken Mytob? |
| Hurricane Katrina; ShellBOT/awstats; Long Registry Value Names |
| Hurricane Rita Scams ALREADY! |
| HyTrust Adds �Secondary Approval` Security to Protect Virtual Environments |
| Challenge Update |
| Challenge: What can you do with Funky Directory Names (Part 2), (Mon, Apr 16th) |
| Changed Infocon status to Yellow, re: Windows Internet Explorer vulnerability |
| Changing Profile Picture in Lync 2013 |
| Changing Threat Models |
| Chat Logs Location; Microsoft Security Advisories |
| Cheap Four-fingered Robot Hand Edges Closer To Human Dexterity |
| Check Point harnesses cloud security to deter botnet infections in enterprise |
| Check Point Outbound Traffic Mystery |
| Checking for .wmf Vulnerabilities |
| Checking Media Type from Python |
| Chernobyl Plus 7 Years |
| Chief's Picks: Videos from BlackHat Briefings USA 2012 |
| China calls U.S. the "real hacking empire" after Pentagon report |
| China companies plan to step up Europe investment |
| China cracks down on mail servers |
| China derides U.S. "Cold War mentality" towards telecoms firm Huawei |
| China fingered for Coca Cola hack - report |
| China Hacked the New York Times for Four Months Straight |
| China is world's most malware-ridden nation |
| China options limited as U.S. panel outcasts Huawei, ZTE |
| China rechaza acusaciones de EEUU contra firmas telecomunicación |
| China's Alibaba To Outsell Amazon, eBay Combined |
| China's Android users warned of giant botnet |
| China's Huawai criticizes US security complaints |
| China's Huawei criticizes US security complaints as trade protectionism, promises transparency |
| China's Huawei says it has done poor job communicating |
| China's Huawei says will increase transparency |
| China's Huawei vows to become more transparent |
| China's internet security giant Qihoo planning global domination |
| China's Radical New Space Drive |
| China's Wanda in talks with "well-known" hotels for U.S. buys |
| China's Yearly Budget For High-Speed Rail: $100 Billion |
| China's ZTE slumps to quarterly loss, margins bleed |
| Chinese Android trojan buys applications |
| Chinese arrest 9,000 cyber-crims |
| Chinese arrests 9,000 cyber-crims |
| 'Chinese' attack sucks secrets from US defence contractor |
| Chinese Automaker Launches Remote-Control Family Car |
| Chinese Blogger Becomes Celebrity Exposing Corruption |
| Chinese Cyber-Spying Shows Why U.S. Must Bolster Network Defenses |
| Chinese diplomat accused of spying on Japanese military |
| 'Chinese hack' scoops plan to Oz spook HQ |
| Chinese Hackers Compromise NY Times, WSJ to Steal Sources |
| Chinese Hackers Infiltrate US Army Database, Compromise Safety of Dams |
| Chinese Hackers Spied on the 2008 Elections, Too |
| Chinese hacktivists launch cyber attack on Japan |
| Chinese Man Builds His Own Prosthetic Hands |
| Chinese man on trial for smuggling hi-tech military secrets |
| Chinese Man Pleads Guilty To $100M Piracy Operation |
| Chinese military contractor hits back at hacktivist Hardcore Charlie |
| Chinese PLA unit 'masterminds cyber-espionage Cold War' |
| Chinese residents charged with selling $100M worth of pirated software |
| Chinese Students Say They Are Being Forced To Build Your Next iPhone |
| Chinese Supplier Gets Dumped By Apple For Fraudulently Using Underage Labor |
| Chip and Pin "Weakness" Exposed By Cambridge Researchers |
| Christmas . exe is making the rounds |
| Christmas Botnet Follow-up |
| Chrome 24.0.1312.52 has been updated for Windows, Mac, Linux, and Chrome Frame, (Wed, May 22nd) |
| Chrome extensions malware hijacks Facebook profiles |
| Chrome, Thunderbird updates |
| I might look again at Java 8 |
| I Wear The Chain I Forged in Life, I Made It Link by Link |
| I would pay more for open source |
| IaaS Is a Stepping-Stone on the Path to PaaS |
| Iberdrola awarded a 2012 European SCADA Security Innovation Award |
| Ibex Virtual Reality Desktop Beta For Mac Released |
| IBM makes QRadar security event management product more intelligent |
| IBM open sources new approach to crypto |
| IBM Slides on Gartner Magic Quadrant for Data Quality Tools 2012 |
| IBM Takes System/z To the Cloud With COBOL Update |
| IBM Tivoli Storage Manager Buffer Overflow Vulns and Patches |
| IBM websphere: Last Call |
| IBM/ISS protection suites - content update problem |
| IBM: Role of Chief Security Officer is Evolving |
| IBM's Watson Gets a Swear Filter After Learning the Urban Dictionary |
| ICANN To Replace 'Digital Archery' Program With Raffle |
| ICMP - call for packets ? |
| ICMP Echo/HTTP Pattern, HP Mystery Patch Explained, DNS Reflector Attack(?) |
| ICQ/MSN Messenger Fraud |
| ICQ-Based Bizex Worm, MyDoom.F, Checking Your Server Logs |
| I'd rather go to the dentist than do a performance review |
| Identity Theft: Accounts Stolen vs Accounts Used - Reader Input |
| IDS Trolling - Anything new?, (Sat, Jun 2nd) |
| IE + WMF security advisory released by Microsoft (913333) |
| IE 10 Almost Finished For Windows 7 With Final Preview |
| IE 6 SP1 and Direct X downloads |
| IE Exploit Email; DNS Vulnerability; Microsoft Patch Day |
| IE exploit on the loose, going to yellow |
| IE Fixes Available, (Thu, Sep 20th) |
| IE Changes Due: What You Can Expect |
| IE IFRAME Exploit, Sun Java Web Proxy Buffer Overflow, SSH Scanning Continues, Yesterday's Diary |
| IE Standardization Fading Fast |
| IE unspecified remote code execution vulnerability |
| IE URL Bug; Phishing Attacks; Port 6129 Remains High; Proper Incident Response |
| IE vulnerability / MS Patches issues / Cisco CatOS vulnerabilities |
| IE7 to hit the streets |
| IEEE data breach exposes 100,000 plain text passwords |
| IETF Starts Work On Next-Generation HTTP Standards |
| If DDOS Attacks are Natural Disasters, is it Time to Update your DR Plan? |
| If IE Suddenly Says "Se Habla Espanol" ... |
| If It Sounds Too Good To Be True..., Don't Let This Happen To You, Updated MS04-039 |
| If it's Free, YOU are the Product |
| If it's May it must be Madness |
| If MS05-054 doesn't apply correctly... |
| If you are having trouble resetting your Apple ID over the phone, read on… |
| If you buy a computer between June 2, 2012 and January 31, 2013, You can upgrade to Windows 8 for $15 |
| If you have migrated to a WIndows 8 computer, here’s some tips on using it more effectively |
| If you own an Android smart phone, read on. |
| If you saw Armageddon, sorry, it couldn’t have worked |
| If you see 'URGENT tax rebate download' in an inbox, kill it with fire |
| If you Skype, be careful what you write! |
| If you use Microsoft Live Mesh, read on before installing Windows Essentials 2012 |
| If you wanted to have a bootable Windows 7 USB stick, read on |
| If You're a Foreigner Using GPS In China, You Could Be a Spy |
| iframeDOLLARS.biz redux ; P2P == Prepare to Patch ; I'm the MAP ; Remote Malware Acquisition |
| IIS 5.1 DoS exploit released |
| IIS Exploit released / Gagobot.XZ |
| Ilfak Guilfanov's website, Hexblog.com back again |
| Illinois Prof Calls for a Federal Law To Safeguard Digital Afterlives |
| IllumiRoom To Take Gaming Visuals Outside the Box and Onto the Living Room |
| Illusions of security |
| Illusions of Security: wrap-up for Mac OS X |
| IM and Malware |
| I'm In Love - With Logstalgia |
| ImageTragick: Another Vulnerability, Another Nickname |
| IMAP scans, password protected image, database update, sco hack, cdi east. |
| Impact of Leadership on Innovation Culture in an organisation |
| impad4d Vulnerability & Patch Released |
| Impending CA Sales Tax Sparks Amazon Buying Frenzy |
| Implant Translates Written Words To Braille, Right On the Retina |
| Important Clam AV Update |
| Important RH kernel security advisory |
| Improving Bash Forensics Capabilities |
| In Australia, secure your Wi-Fi -- or face a visit from the police |
| In Calculator Arms Race, Casio Fires Back: Color Touchscreen ClassPad |
| In letter to Congress, Google defends privacy changes |
| In Malaysia, online election battles take a nasty turn |
| In Need of a OTP Manager Soon? |
| Incident Handling: Home Heating 101 |
| Incident Response and Malware investigations via SecCheck |
| Incidents Report: Web Application Exploit |
| Increase in HTTP PUT Requests; DDoS Against Authorize.net; More JPEG Comments |
| Increase in ICMP scans |
| Increase in Port 1025 scan |
| Increase in port 2525; Ethereal released new version; New phishing attack trend |
| Increase in Port 6101 Activity |
| Increase in Protocol 47 denys |
| Increase in TCP 5554 activity; Fragmented IP traffic towards port 16191; Please patch your Symantec/Norton firewall products |
| Increase in udp/24585 Activity |
| Increased activity on TCP port 5250 |
| Increased SSL Activity; Exploits for MS04-022; Mailbag |
| Incredible New Photographs of Live Coelacanths |
| Index Savant, Part II: Usability of Auto-Created Index Partitions |
| India Bars ZTE, Huawei, Others From Sensitive Government Projects |
| India introduces Central Monitoring System |
| India joins list of nations vetting Huawei, ZTE |
| India overtakes U.S. as the world's top email spam source |
| India To Develop Military Robots For Warfare |
| India To Develop Miltary Robots For Warfare |
| India: We DO have the BlackBerry encryption keys |
| Indian 'attacks' Norwegian telco to get at Pakistan, China |
| Indian Government Mulls Giving Away Mobile Phones To the Poor |
| Indian Minister Says Telecom Companies Should Only Charge For Data |
| Indian Prime Minister Formally Announces Mars Mission |
| Indian School Textbook Says Meat-Eaters Lie and Commit Sex Crimes |
| Indian Supreme Court Denies Novartis Cancer Drug Patent |
| India's tough new security plan: a brochure with every device |
| Indonesia to build crack IT-trained military unit to deflect attacks |
| Indonesian hackers protest hacker's arrest ... by hacking |
| Industry on Cybersecurity Act of 2012: Not so fast |
| INetSim as a Basic Honeypot |
| Infocon back to green |
| INFOCON back to GREEN; Cisco "device" Zotob & Rbot problems, Spanish Zotob description, Sun LPD remote exploit; More about Msdds.dll issue |
| Infocon gone yellow; Patch available for Internet Explorer (.Net) 0day Exploit; Open letter; OS-X Patches; 1433 scans after Zotob; Zotob MSRT updated |
| Infocon Changes; Remote DOS |
| InfoCon Returning to Green |
| Infocon Yellow: Juniper Backdoor (CVE-2015-7755 and CVE-2015-7756) |
| Infocon Yellow: Snort BO Vulnerability |
| Infocon Yellow; Windows and Backup Exec exploits are out, where are the exploits, NIST drafts, Snort signatures |
| Infocon: green |
| INFOCUS: Education and the JDE Alliance |
| Information to Help Track Down Infections From WGAREG.EXE |
| InfoSec 2012: IBM launches new threat analytics engine |
| Innovation Reigns at Wireless Expo |
| Insecure SCADA kit has hidden factory account, password |
| Inserting Parent/Child Relationships in EF 4 |
| Inside an Amazon Warehouse |
| Inside SANS Institute; Conference Links from Reader Submissions |
| Inside the Eastern European Cybercrime Network That Brought Down NASA |
| Insider threat study, and Fun in the trenches, Windows surprise update, Why is change control a good idea? |
| insidious botnets, MSN phishing, the honor of thieves. |
| Insight: Experts hope to shield cars from computer viruses |
| Insight: Lockheed's F-35 logistics system revolutionary but risky |
| Installing a Patch Silently |
| Insurer Measures Driver Safety With Smartphone App To Calculate Premiums |
| Integer Overflow Bug Leads To Diablo III</em> Gold Duping |
| Intel CEO Paul Otellini Retiring |
| Intel Demos McAfee Social Protection |
| Intel Details Power Management Advancements in Haswell |
| Intel Embraces Oil Immersion Cooling For Servers |
| Intel Gets Go-Ahead For $4 Billion Chip Plant In Ireland |
| Intel LAN Driver Buffer Overflow Local Privilege Escalation |
| Intel launches cloud-based single sign-on service |
| Intel Predicts Ubiquitous, Almost-Zero-Energy Computing By 2020 |
| Intel To Debut Limited-Run Ivy Bridge Processor |
| Intel To Help Stephen Hawking Communicate Faster |
| Intel To Launch Paid Web TV Service With Set-Top Box |
| Intel Unveils 10-Watt Haswell Chip |
| Intellectual Ventures Tied To 1,300 Shell Companies |
| Intel-McAfee developing cloud-security strategy |
| Intel's Haswell Moves Voltage Regulator On-Die |
| Intel's Linux OpenGL Driver Faster Than Apple's OS X Driver |
| Interesting Potential Attack Vector |
| Interesting reads for Friday 18 JAN 2013, (Fri, Jan 18th) |
| Internal Security Audits Play Critical Role in Preventing Breaches: PwC |
| International Challenge To Computationally Interpret Protein Function |
| Internet blackout looms for thousands |
| Internet Brands Sues People For Forking Under CC BY-SA |
| Internet Explorer 7.0 High Priority Update |
| Internet Explorer becomes Korean election issue |
| Internet Explorer Shines in NSS Labs Browser Security Test |
| Internet Explorer XML Vulnerability |
| Internet Explorer Zero-Day Attack Targets Nuclear Researchers |
| Internet security better but foul exploits grow, IBM says |
| Internet Systems Consortium BIND Denial of Service Vulnerabilities |
| Internet ultrarrápida atrae empresas a Kansas |
| Internet Wide Scanners Wanted |
| Interop: Open Compute Project To Tackle Network Switching |
| Interviews: Ask Derek Khanna About Government Regulations and Technology |
| Inventor of OpenFlow SDN Admits Most SDN Today Is Hype |
| Invision Board being exploited |
| Invision Power Board Vulnerability |
| Inviting papers and presentations to workshop on architectures for knowledge discovery |
| IOD 2012 - Day 1 (3 more to go) |
| iOS 6 Security Roundup, (Fri, Sep 21st) |
| iOS 6.1.3 Beta 2 Patches evasi0n Jailbreak |
| iOS 6.x hack allows personal data export, free calls |
| IP Addresses Triage |
| iPad beats 'e-trespassing' rap |
| iPhone 5 and the Enterprise: How to Make the Best Business Decision - Mobile and Wireless - News & Reviews - eWeek.com |
| iPhone 5 GeekBench Results |
| iPhone 5's Passbook Is Apple's NFC Alternative - Mobile and Wireless - News & Reviews - eWeek.com |
| iPhone Bug Allows SMS Spoofing |
| iPhone growth stalls as Android continues to nip away at Apple’s market share |
| iPhone, iPad Popularity Could Threaten Enterprise Security: Zscaler |
| iPhones now 'safe' for Restricted UK.gov info, but not Secret |
| iPod Engineer Tony Fadell On the Unique Nature of Apple's Design Process |
| IPSEC / ISAKMP Vulnerability wrapup |
| IPsec vulnerability and more public Ethereal exploits! |
| Ipswitch iMail LDAP Exploit Correlation, Port 3991 activity request |
| IPv6 and Security |
| IPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability, (Wed, Mar 13th) |
| Iran and North Korea Team Up To Fight State-Sponsored Malware |
| Iran fingered for attacks on US power firms |
| Iran identifies 'hidden agenda' behind oil terminal cyberattack |
| Iran rejects US accusations after hacker attack |
| Iran says its infosec defences foiled oil hack |
| Iran swipe at Web brings angry reply |
| Iran's discovery of Flame malware turning into political hot potato |
| Iran's News Agency Picks Up Onion Story |
| IRC Botnet Update / Windows Rootkit Detection / Port 23/ ICQ Virus Messages / ISC Contact Form / 2004 SANS Top-20 |
| IRC Botnet, Solaris in.named Vulnerability, Information about SuckIT Rootkit |
| Irish Google, Yahoo Domains Taken Offline Briefly After Security Breach |
| 'Iron Man,' 'Star Trek' Movies Used as Scam Bait |
| IRS criticized by federal government watchdog agency for lax IT security |
| Is "2 out of 3" good enough for Anti-Malware? |
| Is a Computer Science Degree Worth Getting Anymore? |
| Is an International Nuclear Fuelbank a Good Idea? |
| Is Anonymous meddling in the North Korea standoff? |
| Is anyone seeing an increase in port 143 (IMAP) scans? |
| Is Application Security the Glaring Hole in Your Defense? |
| Is Buying an Extended Warranty Ever a Good Idea? |
| Is Facebook use in the enterprise too risky to allow? |
| Is hurricane Wilma affecting you? |
| Is iPhone Battery Usefulness On the Decline? |
| Is it a SIP Recon scan or something else |
| Is it Really an Attack?, (Sun, Feb 3rd) |
| Is it Spam or Is it Malware?, (Fri, Feb 8th) |
| Is MySQL Slowly Turning Closed Source? |
| Is Non-Prescription ADHD Medication Use Ever Ethical? |
| Is Sexual Harassment Part of Hacker Culture? |
| Is someone watching your internet traffic or telephone calls? |
| Is that a truncheon in your trousers, officer, or ... an antenna, you say? |
| Is the CIO Dead? |
| Is the cloud really ready for prime time? |
| Is the Concept of 'Cyberspace' Stupid? |
| Is the Era of Groundbreaking Science Over? |
| Is there an epidemic of typo squatting?, (Tue, May 7th) |
| Is your banks Online security policy making it more of a target for Phisher's? |
| ISC Briefing: Large DDoS Attack Against Dyn |
| ISC DHCP Multiple Denial of Service Vulnerabilities |
| ISC DHCPD buffer overflow exploit code produced in the lab |
| ISC Diary and Infocon change E-Mail Notification service (BETA) |
| ISC Feature of the Week: Diary/Infocon/Event Notifications, (Wed, Apr 4th) |
| ISC Feature of the Week: Handler Select News Feed, (Sat, Aug 4th) |
| ISC Reader's Diary, PHP Include Worm, Trojan in wild that exploits new IE bug , Pacific Earthquake & Tsunami |
| ISC returning to Green; Comcast Problems; Microsoft Update Spoof |
| ISC StormCast for Friday, August 10th 2012 http://isc.sans.edu/podcastdetail.html?id=2728, (Fri, Aug 10th) |
| ISC StormCast for Friday, August 17th 2012 http://isc.sans.edu/podcastdetail.html?id=2743, (Fri, Aug 17th) |
| ISC StormCast for Friday, August 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2758, (Fri, Aug 24th) |
| ISC StormCast for Friday, February 15th 2013 http://isc.sans.edu/podcastdetail.html?id=3127, (Fri, Feb 15th) |
| ISC StormCast for Friday, February 1st 2013 http://isc.sans.edu/podcastdetail.html?id=3094, (Fri, Feb 1st) |
| ISC StormCast for Friday, February 8th 2013 http://isc.sans.edu/podcastdetail.html?id=3109, (Fri, Feb 8th) |
| ISC StormCast for Friday, January 11th 2013 http://isc.sans.edu/podcastdetail.html?id=3046, (Fri, Jan 11th) |
| ISC StormCast for Friday, January 25th 2013 http://isc.sans.edu/podcastdetail.html?id=3079, (Fri, Jan 25th) |
| ISC StormCast for Friday, January 4th 2013 http://isc.sans.edu/podcastdetail.html?id=3028, (Fri, Jan 4th) |
| ISC StormCast for Friday, June 14th 2013 http://isc.sans.edu/podcastdetail.html?id=3368, (Fri, Jun 14th) |
| ISC StormCast for Friday, June 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3353, (Fri, Jun 7th) |
| ISC StormCast for Friday, March 15th 2013 http://isc.sans.edu/podcastdetail.html?id=3187, (Fri, Mar 15th) |
| ISC StormCast for Friday, May 10th 2013 http://isc.sans.edu/podcastdetail.html?id=3299, (Fri, May 10th) |
| ISC StormCast for Friday, May 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2527, (Fri, May 11th) |
| ISC StormCast for Friday, May 17th 2013 http://isc.sans.edu/podcastdetail.html?id=3314, (Fri, May 17th) |
| ISC StormCast for Friday, May 3rd 2013 http://isc.sans.edu/podcastdetail.html?id=3284, (Fri, May 3rd) |
| ISC StormCast for Friday, November 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2950, (Fri, Nov 16th) |
| ISC StormCast for Friday, November 9th 2012 http://isc.sans.edu/podcastdetail.html?id=2929, (Fri, Nov 9th) |
| ISC StormCast for Friday, October 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2869, (Fri, Oct 12th) |
| ISC StormCast for Friday, October 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2884, (Fri, Oct 19th) |
| ISC StormCast for Friday, October 5th 2012 http://isc.sans.edu/podcastdetail.html?id=2851, (Fri, Oct 5th) |
| ISC StormCast for Friday, September 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2806, (Fri, Sep 14th) |
| ISC StormCast for Friday, September 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2821, (Fri, Sep 21st) |
| ISC StormCast for Friday, September 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2836, (Fri, Sep 28th) |
| ISC StormCast for Friday, September 7th 2012 http://isc.sans.edu/podcastdetail.html?id=2785, (Fri, Sep 7th) |
| ISC StormCast for Monday, April 23rd 2012 http://isc.sans.edu/podcastdetail.html?id=2482, (Mon, Apr 23rd) |
| ISC StormCast for Monday, April 29th 2013 http://isc.sans.edu/podcastdetail.html?id=3272, (Mon, Apr 29th) |
| ISC StormCast for Monday, April 2nd 2012 http://isc.sans.edu/podcastdetail.html?id=2437, (Mon, Apr 2nd) |
| ISC StormCast for Monday, April 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2500, (Mon, Apr 30th) |
| ISC StormCast for Monday, August 13th 2012 http://isc.sans.edu/podcastdetail.html?id=2731, (Mon, Aug 13th) |
| ISC StormCast for Monday, August 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2746, (Mon, Aug 20th) |
| ISC StormCast for Monday, August 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2761, (Mon, Aug 27th) |
| ISC StormCast for Monday, August 6th 2012 http://isc.sans.edu/podcastdetail.html?id=2716, (Mon, Aug 6th) |
| ISC StormCast for Monday, December 3rd 2012 http://isc.sans.edu/podcastdetail.html?id=2977, (Mon, Dec 3rd) |
| ISC StormCast for Monday, February 11th 2013 http://isc.sans.edu/podcastdetail.html?id=3112, (Mon, Feb 11th) |
| ISC StormCast for Monday, February 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2338, (Mon, Feb 20th) |
| ISC StormCast for Monday, February 25th 2013 http://isc.sans.edu/podcastdetail.html?id=3145, (Mon, Feb 25th) |
| ISC StormCast for Monday, February 4th 2013 http://isc.sans.edu/podcastdetail.html?id=3097, (Mon, Feb 4th) |
| ISC StormCast for Monday, January 14th 2013 Part 2 http://isc.sans.edu/podcastdetail.html?id=3052, (Mon, Jan 14th) |
| ISC StormCast for Monday, January 21st 2013 http://isc.sans.edu/podcastdetail.html?id=3067, (Mon, Jan 21st) |
| ISC StormCast for Monday, January 28th 2013 http://isc.sans.edu/podcastdetail.html?id=3082, (Mon, Jan 28th) |
| ISC StormCast for Monday, January 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3031, (Mon, Jan 7th) |
| ISC StormCast for Monday, July 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2665, (Mon, Jul 16th) |
| ISC StormCast for Monday, July 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2698, (Mon, Jul 30th) |
| ISC StormCast for Monday, July 9th 2012 http://isc.sans.edu/podcastdetail.html?id=2650, (Mon, Jul 9th) |
| ISC StormCast for Monday, June 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2590, (Mon, Jun 11th) |
| ISC StormCast for Monday, June 18th 2012 http://isc.sans.edu/podcastdetail.html?id=2608, (Mon, Jun 18th) |
| ISC StormCast for Monday, June 25th 2012 http://isc.sans.edu/podcastdetail.html?id=2623, (Mon, Jun 25th) |
| ISC StormCast for Monday, June 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2575, (Mon, Jun 4th) |
| ISC StormCast for Monday, March 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2389, (Sun, Mar 11th) |
| ISC StormCast for Monday, March 18th 2013 http://isc.sans.edu/podcastdetail.html?id=3190, (Mon, Mar 18th) |
| ISC StormCast for Monday, March 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2404, (Mon, Mar 19th) |
| ISC StormCast for Monday, March 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2422, (Mon, Mar 26th) |
| ISC StormCast for Monday, March 26th 2013 http://isc.sans.edu/podcastdetail.html?id=3205, (Mon, Mar 25th) |
| ISC StormCast for Monday, May 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2530, (Mon, May 14th) |
| ISC StormCast for Monday, May 20th 2013 http://isc.sans.edu/podcastdetail.html?id=3317, (Mon, May 20th) |
| ISC StormCast for Monday, May 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2548, (Mon, May 21st) |
| ISC StormCast for Monday, May 27th 2013 http://isc.sans.edu/podcastdetail.html?id=3329, (Sun, May 26th) |
| ISC StormCast for Monday, May 7th 2012 http://isc.sans.edu/podcastdetail.html?id=2515, (Mon, May 7th) |
| ISC StormCast for Monday, November 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2932, (Mon, Nov 12th) |
| ISC StormCast for Monday, November 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2953, (Mon, Nov 19th) |
| ISC StormCast for Monday, November 5th 2012 http://isc.sans.edu/podcastdetail.html?id=2917, (Mon, Nov 5th) |
| ISC StormCast for Monday, October 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2872, (Mon, Oct 15th) |
| ISC StormCast for Monday, October 1st 2012 http://isc.sans.edu/podcastdetail.html?id=2839, (Mon, Oct 1st) |
| ISC StormCast for Monday, October 8th 2012 http://isc.sans.edu/podcastdetail.html?id=2854, (Mon, Oct 8th) |
| ISC StormCast for Monday, September 10th 2012 http://isc.sans.edu/podcastdetail.html?id=2788, (Mon, Sep 10th) |
| ISC StormCast for Monday, September 17th 2012 http://isc.sans.edu/podcastdetail.html?id=2809, (Mon, Sep 17th) |
| ISC StormCast for Monday, September 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2824, (Mon, Sep 24th) |
| ISC StormCast for Sunday, April 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2467, (Sun, Apr 15th) |
| ISC StormCast for Sunday, March 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2368, (Sun, Mar 4th) |
| ISC StormCast for Sunday, May 5th 2013 http://isc.sans.edu/podcastdetail.html?id=3287, (Mon, May 6th) |
| ISC StormCast for Thursday, April 4th 2013 http://isc.sans.edu/podcastdetail.html?id=3226, (Thu, Apr 4th) |
| ISC StormCast for Thursday, August 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2740, (Thu, Aug 16th) |
| ISC StormCast for Thursday, August 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2770, (Thu, Aug 30th) |
| ISC StormCast for Thursday, August 9th 2012 http://isc.sans.edu/podcastdetail.html?id=2725, (Thu, Aug 9th) |
| ISC StormCast for Thursday, February 21st 2013 http://isc.sans.edu/podcastdetail.html?id=3139, (Thu, Feb 21st) |
| ISC StormCast for Thursday, February 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3106, (Thu, Feb 7th) |
| ISC StormCast for Thursday, January 10th 2013 http://isc.sans.edu/podcastdetail.html?id=3040, (Thu, Jan 10th) |
| ISC StormCast for Thursday, January 24th 2013 http://isc.sans.edu/podcastdetail.html?id=3076, (Thu, Jan 24th) |
| ISC StormCast for Thursday, June 13th 2013 http://isc.sans.edu/podcastdetail.html?id=3365, (Thu, Jun 13th) |
| ISC StormCast for Thursday, June 6th 2013 http://isc.sans.edu/podcastdetail.html?id=3350, (Thu, Jun 6th) |
| ISC StormCast for Thursday, March 14th 2013 http://isc.sans.edu/podcastdetail.html?id=3184, (Thu, Mar 14th) |
| ISC StormCast for Thursday, March 28th 2013 http://isc.sans.edu/podcastdetail.html?id=3211, (Thu, Mar 28th) |
| ISC StormCast for Thursday, May 23rd 2013 http://isc.sans.edu/podcastdetail.html?id=3326, (Thu, May 23rd) |
| ISC StormCast for Thursday, May 2nd 2013 http://isc.sans.edu/podcastdetail.html?id=3281, (Thu, May 2nd) |
| ISC StormCast for Thursday, May 9th 2013 http://isc.sans.edu/podcastdetail.html?id=3296, (Thu, May 9th) |
| ISC StormCast for Thursday, November 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2947, (Thu, Nov 15th) |
| ISC StormCast for Thursday, November 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2971, (Thu, Nov 29th) |
| ISC StormCast for Thursday, November 8th 2012 http://isc.sans.edu/podcastdetail.html?id=2926, (Thu, Nov 8th) |
| ISC StormCast for Thursday, October 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2866, (Thu, Oct 11th) |
| ISC StormCast for Thursday, October 18th 2012 http://isc.sans.edu/podcastdetail.html?id=2881, (Thu, Oct 18th) |
| ISC StormCast for Thursday, October 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2848, (Thu, Oct 4th) |
| ISC StormCast for Thursday, September 13th 2012 http://isc.sans.edu/podcastdetail.html?id=2797, (Thu, Sep 13th) |
| ISC StormCast for Thursday, September 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2818, (Thu, Sep 20th) |
| ISC StormCast for Thursday, September 6th 2012 http://isc.sans.edu/podcastdetail.html?id=2782, (Thu, Sep 6th) |
| ISC StormCast for Tuesday, April 2nd 2013 http://isc.sans.edu/podcastdetail.html?id=3220, (Tue, Apr 2nd) |
| ISC StormCast for Tuesday, April 30th 2013 http://isc.sans.edu/podcastdetail.html?id=3275, (Tue, Apr 30th) |
| ISC StormCast for Tuesday, August 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2734, (Tue, Aug 14th) |
| ISC StormCast for Tuesday, August 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2749, (Tue, Aug 21st) |
| ISC StormCast for Tuesday, August 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2764, (Tue, Aug 28th) |
| ISC StormCast for Tuesday, February 12th 2013 http://isc.sans.edu/podcastdetail.html?id=3115, (Tue, Feb 12th) |
| ISC StormCast for Tuesday, February 26th 2013 http://isc.sans.edu/podcastdetail.html?id=3148, (Tue, Feb 26th) |
| ISC StormCast for Tuesday, February 5th 2013 http://isc.sans.edu/podcastdetail.html?id=3100, (Tue, Feb 5th) |
| ISC StormCast for Tuesday, January 22nd 2013 http://isc.sans.edu/podcastdetail.html?id=3070, (Tue, Jan 22nd) |
| ISC StormCast for Tuesday, June 11th 2013 http://isc.sans.edu/podcastdetail.html?id=3359, (Tue, Jun 11th) |
| ISC StormCast for Tuesday, March 12th 2013 http://isc.sans.edu/podcastdetail.html?id=3178, (Tue, Mar 12th) |
| ISC StormCast for Tuesday, May 14th 2013 http://isc.sans.edu/podcastdetail.html?id=3305, (Tue, May 14th) |
| ISC StormCast for Tuesday, May 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2533, (Tue, May 15th) |
| ISC StormCast for Tuesday, May 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3290, (Tue, May 7th) |
| ISC StormCast for Tuesday, November 13th 2012 http://isc.sans.edu/podcastdetail.html?id=2935, (Tue, Nov 13th) |
| ISC StormCast for Tuesday, November 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2956, (Tue, Nov 20th) |
| ISC StormCast for Tuesday, November 6th 2012 http://isc.sans.edu/podcastdetail.html?id=2920, (Tue, Nov 6th) |
| ISC StormCast for Tuesday, October 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2875, (Tue, Oct 16th) |
| ISC StormCast for Tuesday, October 2nd 2012 http://isc.sans.edu/podcastdetail.html?id=2842, (Tue, Oct 2nd) |
| ISC StormCast for Tuesday, September 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2791, (Tue, Sep 11th) |
| ISC StormCast for Tuesday, September 18th 2012 http://isc.sans.edu/podcastdetail.html?id=2812, (Tue, Sep 18th) |
| ISC StormCast for Tuesday, September 25th 2012 http://isc.sans.edu/podcastdetail.html?id=2827, (Tue, Sep 25th) |
| ISC StormCast for Tuesday, September 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2776, (Tue, Sep 4th) |
| ISC StormCast for Wednesday, April 3rd 2013 http://isc.sans.edu/podcastdetail.html?id=3223, (Wed, Apr 3rd) |
| ISC StormCast for Wednesday, August 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2737, (Wed, Aug 15th) |
| ISC StormCast for Wednesday, August 22nd 2012 http://isc.sans.edu/podcastdetail.html?id=2752, (Wed, Aug 22nd) |
| ISC StormCast for Wednesday, August 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2767, (Wed, Aug 29th) |
| ISC StormCast for Wednesday, February 13th 2013 http://isc.sans.edu/podcastdetail.html?id=3118, (Wed, Feb 13th) |
| ISC StormCast for Wednesday, February 6th 2013 http://isc.sans.edu/podcastdetail.html?id=3103, (Wed, Feb 6th) |
| ISC StormCast for Wednesday, January 16th 2013 http://isc.sans.edu/podcastdetail.html?id=3061, (Wed, Jan 16th) |
| ISC StormCast for Wednesday, January 23rd 2013 http://isc.sans.edu/podcastdetail.html?id=3073, (Wed, Jan 23rd) |
| ISC StormCast for Wednesday, January 30th 2013 http://isc.sans.edu/podcastdetail.html?id=3088, (Wed, Jan 30th) |
| ISC StormCast for Wednesday, March 13th 2013 http://isc.sans.edu/podcastdetail.html?id=3181, (Wed, Mar 13th) |
| ISC StormCast for Wednesday, May 1st 2013 http://isc.sans.edu/podcastdetail.html?id=3278, (Wed, May 1st) |
| ISC StormCast for Wednesday, May 22nd 2013 http://isc.sans.edu/podcastdetail.html?id=3323, (Wed, May 22nd) |
| ISC StormCast for Wednesday, May 8th 2013 http://isc.sans.edu/podcastdetail.html?id=3293, (Wed, May 8th) |
| ISC StormCast for Wednesday, November 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2941, (Wed, Nov 14th) |
| ISC StormCast for Wednesday, November 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2959, (Wed, Nov 21st) |
| ISC StormCast for Wednesday, November 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2968, (Wed, Nov 28th) |
| ISC StormCast for Wednesday, November 7th 2012 http://isc.sans.edu/podcastdetail.html?id=2923, (Wed, Nov 7th) |
| ISC StormCast for Wednesday, October 10th 2012 http://isc.sans.edu/podcastdetail.html?id=2860, (Wed, Oct 10th) |
| ISC StormCast for Wednesday, October 17th 2012 http://isc.sans.edu/podcastdetail.html?id=2878, (Wed, Oct 17th) |
| ISC StormCast for Wednesday, October 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2893, (Wed, Oct 24th) |
| ISC StormCast for Wednesday, October 3rd 2012 http://isc.sans.edu/podcastdetail.html?id=2845, (Wed, Oct 3rd) |
| ISC StormCast for Wednesday, September 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2794, (Wed, Sep 12th) |
| ISC StormCast for Wednesday, September 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2815, (Wed, Sep 19th) |
| ISC StormCast for Wednesday, September 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2830, (Wed, Sep 26th) |
| ISC StormCast for Wednesday, September 5th 2012 http://isc.sans.edu/podcastdetail.html?id=2779, (Wed, Sep 5th) |
| ISC Two Factor Authentication Update |
| isc.org provides attack mitigation |
| ISC/DShield Network Downtime |
| ISCAlert Update |
| ISPs and Egress Filtering, Bad News for Reverse Engineers, Broken Spam Message |
| Israeli Army Retweeting 1967 War As It Happened |
| Israeli deputy PM's social media hacked by pro-Palestine group |
| Israeli government websites under mass hacking attack |
| Israeli, Hamas Conflict Attracts Anonymous |
| ISS Default Misconfiguration, New Bagel.U, and a couple 'witty' notes |
| Issue with MySQL-PHP-Apache |
| Issues on MS patches? |
| Issues with e-mail notifier |
| Issues with MS04-032 patch / Phishings, Spams and Virus story |
| IT execs must shift security approaches |
| IT Help for Katrina victims; More Katrina Malware; Gas shortage hoax e-mail; MS05-043 exploits in the wild?; Scanning for old Cisco vulnerabilities |
| IT Industry Presidential Poll: 'Not Sure' Beats Both Obama and Romney |
| It is all about the risk. |
| It is already Feb 3rd! |
| IT Managers Worried About Network Monitoring, Security - IT Management - News & Reviews - eWeek.com |
| IT security problems shift as data moves to 'cloud' |
| IT security pros failing on risk strategies |
| IT Support Essentials |
| It’s A Solid-State Symposium |
| It's baaaaaaaack... |
| It's Easy To Steal Identities (Of Corporations) |
| It's not meant to be hard |
| It's that time again! |
| It's Time To Start Taking Stolen Phones Seriously |
| iTunes < 6.0.5 vulnerability & patch released |
| Ivan Sutherland Wins Kyoto Prize |
| J.J. Abrams To Direct Star Wars VII |
| J2SE Runtime Environment (JRE) & Java SE Developer Kit (JDK) Update 8 |
| Jabber.Org r00t discovered, Vulnerabilities affect Koffice, Kdegraphics, xpdf viewer, Gpdf, Cups, and Tetex |
| Jack Jones: Numbers game |
| January 2016 Microsoft Patch Tuesday |
| January 2017 Microsoft Patch Tuesday |
| Japan Considers '911' Calls From Twitter, Social Networks |
| Japan forgot data wipe on ship sold to Pyongyang |
| Japan government investigating small Web breaches after Anonymous attack threats |
| Japan Launches Two New Spy Satellites |
| Japan proposes NSA-style agency and new snooping laws |
| Japanese cops cuff cat carrying remote control virus |
| Japanese gov builds APT database to study targeted attack info |
| Japanese Probe Finds Miswiring of Boeing 787 Battery |
| Java applets run wild inside Notes |
| Java Trojan/Bot |
| Java Zero-Day Attack Threats Widening, Security Experts Warn |
| JavaScript Deobfuscation Tool |
| javascript file upload entry |
| Javascript/AJAX/Worm Like Behavior |
| JBoss CVE-2012-1167 Security Bypass Vulnerability |
| JBoss Enterprise Application Platform Cross Site Request Forgery Vulnerability |
| JBoss Enterprise Application Platform CVE-2011-4605 Security Bypass Vulnerability |
| JBoss Enterprise BRMS Platform JGroups Diagnostics Service Information Disclosure Vulnerability |
| JD Edwards and mCommerce Integration |
| Jill Stein and Gary Johnson Debate Online Tonight |
| John McAfee's Belize Home Burns To Ground |
| Join the Live Windows 8 Launch Event |
| Joker.com confirms DDOS Attack on Nameservers |
| Jonathan Coulton Offers Some Gleeful Turnabout |
| Jonathan Coulton Song Used By Glee</em> Without Permission |
| Joomla Kunena 'id' Parameter SQL Injection Vulnerability |
| Joomla! 2.5.4 closes more security holes |
| Journal of PhD research |
| Journalist's lawyer: Prank doesn't merit prison |
| JPEG exploit toolkit , JPEG Hacktool, GDIScan Tool, In search of the Botnet - Lessons learned |
| JPMorgan Chase customers see zero balances after technical glitch |
| Judge Orders Child Porn Suspect To Decrypt His Hard Drives |
| Judge Orders Piracy Trial To Test IP Address Evidence |
| Julian Assange: "Online Totalitarianism Is Near, Entire Nations Are Intercepted" |
| July 2015 Microsoft Patch Tuesday |
| Jump List Files Are OLE Files |
| Juniper buys web security company for $80 million |
| Juniper IPv6 vulnerability |
| Juniper packs 30 new features into Web security software |
| Juniper's SDN Strategy Looks Beyond OpenFlow |
| Just Added - Trend Micro Advisory; Update on PHP worm spreading, Update on Meeneemee.exe, more on RootKitReveal |
| Just In Time for the Holidays, Nintendo Wii U Gets Its US Release |
| Just When I Thought I'd Heard it All.. |
| Kasparov Arrested By Russian Police |
| Kaspersky Anti-Virus Products Remote Heap Overflow Vulnerability |
| Kaspersky Lab Developing Secure OS for Industrial Control Systems |
| Kaspersky Lab suspends Flashback-fighting tool |
| Kaspersky plans source code reveal to avoid Huawei's fate |
| Kaspersky says SabPub is an 'Advanced Persistent Threat' |
| Kaspersky slips server security into PC software as attackers get crafty |
| Kaspersky spots Zeus for BlackBerry |
| kaspersky.com, are you awake? |
| Kaspersky's Exploit-Proof OS Leaves Security Experts Skeptical |
| Katrina Malware; Katrina Donation Scams (now with domain name list); Dameware |
| Katrina; MSIE Clipboard; Exchange Security Logs |
| KbHook.dll is Not Always Spyware |
| KDE 4.10 Beta1 Released |
| KDE kjs encodeuri/decodeuri heap overflow vulnerability |
| Keccak is SHA-3 |
| Keep Old Apps Private, Make New Apps Public |
| Kernel crimps make Windows 8 a hacker hassle |
| Khan Academy: the Future of Taxpayer Reeducation? |
| Kids Build Pill Dispenser To Win Raspberry Pi Award |
| Killbit apps for current IE exploit |
| Killing IE becomes Korean election issue |
| Kim Dotcom mounts freedom campaign |
| Kim Dotcom Raid - What Really Happened |
| Kim Dotcom seizures "null and void" |
| Kim Dotcom's Mega Claims 1 Million Users Within 24 Hours |
| Kim Dotcom's Next Venture: Free Broadband To New Zealand |
| Kinectasploit: Hack Tools Meet Kinect |
| Knight Trading Losses Attributed To Old, Dormant Software |
| Known ?Good? DNS, An Observation |
| Known Issues for the MS06-025 |
| Korean Mozilla and Thunderbird Distro Site Woes |
| Kristin Lovejoy: Enabling innovation |
| Kurzweil: The Cloud Will Expand Human Brain Capacity |
| LA Times hack: Security breach or harmless prank? |
| Lab Rats Given "Sixth Sense" |
| LAN Airlines scam - Social Engineering Attacks still happening and will keep happening ..., (Sun, Mar 18th) |
| Lance Armstrong and the Science of Drug Testing |
| LAND Attack Update; DNS Poisoning Update; ssh attacks; IM Malware; Brazilian Honeynet |
| LAND attacks against network devices |
| Landsat 8 Satellite Successfully Launches Into Orbit |
| Large Bitcoin Ponzi Scheme Collapses With a Loss of $5.6 Million |
| Large botnet in the Netherlands taken down |
| Large Child porn Arrest and how to report it. |
| Larger Power Outage in Los Angeles |
| Largest Moon Rock Ever Auctioned Expected To Sell For $380,000 |
| Largest-Ever DDoS Campaign Demonstrates Danger of New Attack Method |
| Largest-Known Spiral Galaxy Discovered |
| Larry Page: You Worry Too Much About Medical Privacy |
| LASER STRIKES against US planes on the rise |
| Last Week for IBM IOD 2012 Early Bird Discount |
| Late Night Paranoia |
| Latest Viruses, SSL Exploit, Juniper Update, New ISC Features |
| Latvian Police Raid Teacher's Home for Uploading $4.00 Textbook |
| Law Enforcement Shuts Down Dridex Operation |
| Law firms see big money in healthcare breach cases |
| Law, spam, and 4899/tcp |
| Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns |
| Lawmaker: Cyberattacks against US getting worse |
| Lawmakers to introduce new bill to punish cyber theft |
| LDAP Scan increase. Win98 ASN.1 patch, MyDoom Remover, Win98 free update CD |
| Leadership Lessons from Scott Thompson's short tenure at Yahoo! |
| Leaked Apple IDs came from a publishing company, not the FBI |
| Leaked exploit prompts researcher to publish blueprint for critical RDP vulnerability |
| Leaked Photo Shows Touch-Screen BlackBerry 10 Phone |
| 'LeakedIn' Web app checks for compromised LinkedIn passwords |
| Leap Second |
| Leap second: when time stands still |
| Learn how to use Wordpress |
| Legal battle over LinkedIn breach could be costly |
| Legal Issues within Corporate "Bring Your Own Device" Programs |
| Legitimate eBook Lending Community Closed After Copyright Complaints |
| Lenovo, PayPal, launch post-password plan |
| Let Them Eat Teslas |
| Let's take a closer look at a few DB2 DDF and thread messages |
| LibertyReserve.com Shuttered, Founder Arrested In Spain |
| Libpng and putty vulnerabilities announced today |
| Libpng exploit / XP SP2 yet / New MyDoom? / More phishing / ISC Webcast / Corporate Policy |
| Libraries and Dependencies - It Really is Turtles All The Way Down! |
| Library Journal Board Resigns On "Crisis of Conscience" After Swartz Death |
| LibreOffice vulnerable to multiple buffer overflows |
| License File Changes in IBM Information Server and DataStage v9.1 |
| License File Changes in InfoSphere Business Glossary v9.1 and BIE v9.1 |
| License Changes, Backup Software, Spin out: VMware Rumors Settled next Week |
| LightSquared Wants To Share Weather-Balloon Frequencies for LTE |
| Linguistics Identifies Anonymous Users |
| Link to 'a new Microsoft patch' being spammed |
| LinkedIn Offers Information, Apology for Security Breach |
| LinkedIn sheds more light on security breach |
| LinkedIn snarfing contacts from Exchange |
| Linksys Router Local DoS - Tripwire Privilege Escalation |
| Linux kernel 2.6 ICMP bug resulting in remote DoS |
| Linux Kernel DRM 'drivers/gpu/drm/crm_crtc.c' IOCTL Local Privilege Escalation Vulnerability |
| Linux Kernel IPv6 'nf_ct_frag6_reasm()' Remote Denial of Service Vulnerability |
| Linux kernel local DoS - Yahoo/Google (Akamai?) problems |
| Linux kernel PRCTL local privilege escalation |
| Linux Kernel Reliable Datagram Sockets (RDS) CVE-2012-2372 Local Denial of Service Vulnerability |
| Linux Kernel UDF Filesystem Local Buffer Overflow Vulnerability |
| Linux Kernel Vulnerability, Ethereal Patches |
| Linux Mint 14 Is Out |
| Linux On the TI-Nspire Graphing Calculator |
| LinuxDevices.com Vanishes From the Web |
| LIOs Lie |
| Live Tweeting the Symphony? |
| Lizard Named For Jim Morrison |
| LLNL/RPI Supercomputer Smashes Simulation Speed Record |
| LLSSRV; The end of the Internet; DNS Cache Poisoning; New Handler |
| loadadv.exe |
| Local Emergency Alert System Hacked, Warns Dead Rising From Graves |
| Local Leaks Tipsters Allege Steubenville Victim Was Drugged |
| Lockheed says cyber attacks up sharply, suppliers targeted |
| Locking Down Facebook, Twitter, Google+ and LinkedIn Accounts - A Guide for Friends and Family |
| Locky: JavaScript Deobfuscation |
| Log analysis and marketing decisions don't mix |
| Log analysis follow up |
| Log Analysis tips? |
| Logitech Releases Washable Keyboard |
| London bombing trojan, update on system monitoring attempts, Updates from Microsoft coming |
| London, .us TLD, ... |
| Long Range Systems Plan Document |
| Looking back at "Read-only Switching" |
| Looking for clues in the secret art work of George W. Bush |
| Looking for samples of W32.Kiman.A |
| Looking for some emails |
| Looking for the insider: Forensic Artifacts on iOS Messaging App |
| Looks like Android is starting to be a major target for Malware |
| Looks like Microsoft is getting ready to fix random Windows Phon8 reboots |
| 'Looming menace' of evil browser extensions to be demo'd this week |
| Los Alamos National Labs Has Working Hub-and-Spoke Quantum Network |
| Losses Claimed By Online Fraud Hit $182 Million |
| Lost+Found: Cracked CAPTCHAs and lost ISS codes |
| Lost+Found: Virus pick 'n' mix, worm plays AC/DC, Flame secrets revealed |
| Lotus Notes Vulnerable to WMF 0-Day Exploit |
| LSASS exploit, SSL PCT exploits, port 559 (tcp) proxy hunter, Bagle.Z |
| LTSI Linux Kernel 3.4 Released |
| LulzSec hackers sentenced for attacking Sony, News Corp and the CIA |
| Lulzsec Member Raynaldo Rivera Pleads Guilty To Sony Pictures Breach |
| LulzSec trial: sentence handed down for UK hackers |
| Lulzsec's Topiary and Ni plead guilty to DDoS attacks |
| Lynn's Cat is Out of The Bag; Cisco IPv6 Advisory; Log Juggling Courtesy of US Congress |
| Lynx user? Upgrade it! |
| Mac malware found with valid developer ID at freedom conference |
| Mac OS X Apple UDIF Disk Image Kernel Memory Corruption |
| Mac OS X Bluetooth Worm |
| Mac OS X Mountain Lion's Gatekeeper Not Enough to Fight Malware |
| Mac OS X security updates |
| Mac OS X trojan - OSX/Leap |
| Mac security software sales jump after Flashback infections make news |
| Mac Security; Anonymity with Tor; Web Vandals v. Phishers; Paypal Phish Conditioning |
| Mac users 'just as easily duped by cybercriminals' as Windows users |
| MacOS X Java patches |
| MacOS X Security Update, more MS04-040 information |
| Macromedia Flash Player Vulnerability |
| Macromedia, XML-RPC, and Internet Crime |
| Macs more likely to carry Windows malware than Mac malware, study finds |
| Macs under attack, who is safe? |
| Magellan Telescope First Mega-Mirror Polished and Ready |
| Magic Finger Turns Any Surface Into a Touch Interface |
| Magic: the Gathering Is Turing Complete |
| Machine Learning Allows Actors To Create Games That Understand Body Language |
| Mail Call Time: More Sony Info and Snort Signatures |
| Mailbag - Malware Everywhere, IE Unauthorized Printing |
| Mailbag and DShield items generate a post VNC exploitation fun question |
| Mailbag Detect info |
| Mailbag grab |
| Mailbag Items for Ports 1433 and 113 |
| Mailbag Q&A concerning MS Desktop Search add-on vulnerabilities |
| Mailbag Question, ZoneAlarm failure update, Michael Jackson Malware analysis, More on HIDS, IM Name Game submissions |
| MailBag Response info about yhoo32-explr, IM malware |
| Mailbag |
| Mailbag; Upgrade Mozilla Products; Reading Corner |
| Major Cisco IOS Vulnerability Announced |
| Major Cogent outage |
| Major New Trends in Call Centre Software |
| Major Web Sites Tagged With Malware Notice After Ad Distributor Hacked |
| Make Your Own LEGO Curiosity Rover |
| MAKE's 2nd International Maker Meetup: Raspberry Pi |
| Making our users unlearn what we taught them |
| Making Robots Mimic the Human Hand |
| Making sense of mobile device, app, and information management |
| Making Sure Interviews Don't Turn Into Free Consulting |
| Malaysia Stages Internet Blackout To Protest New Censorship Law |
| Malaysian election sparks web blocking/DDoS claims |
| Maldoc Social Engineering Trick |
| Maldoc VBA Anti-Analysis |
| Maldoc VBA Anti-Analysis: Video |
| Male Scientists More Prone To Misconduct |
| Malformed MIMEs can bypass AV |
| Malfunctioning Malware |
| Malicious Code Regularly Dodging Defenses, Palo Alto Finds |
| Malicious RTF Files |
| Malicious Script; Phish, Bots and What-Nots |
| Malicious spam - Subject: RE: Bill |
| Malicious spam continues to serve zip archives of javascript files |
| Malicious spam with links to CryptoWall 3.0 - Subject: Domain [name] Suspension Notice |
| Malicious spam with Word document |
| Malicious spam with zip attachments containing .js files |
| Malicious Trojan poses as McAfee alert |
| Malicious VBS Script; Mailbag |
| Malspam delivers NanoCore RAT |
| Malware Analysis Project: Tools of the Trade |
| Malware Analysis Quiz 5 results |
| Malware Analysis Quiz 5 |
| Malware Analysis Quiz 6 results |
| Malware Analysis Quiz 6 |
| Malware Analysis Quiz 7! |
| Malware Analysis Quiz IV |
| Malware analysts rejoice! A public submission interface for the CWSandox |
| Malware authors expand use of domain generation algorithms to evade detection |
| Malware Delivered via '.pub' Files |
| Malware from China; Googkle is gone; IM Worm/Botnet going in circles |
| Malware increasingly uses DNS as command and control channel to avoid detection, experts say |
| Malware Infects US Power Facilities Through USB Drives |
| Malware propagation information from microsoft. |
| Malware quiz |
| Malware sample submissions to Microsoft |
| Malware samples |
| Malware URLs. |
| Malware with new features |
| Malware |
| Malware, eBay, and You. |
| Malware: When <!-- comments --> become commands |
| Malwares |
| Mambo Exploit Confirmed in the Wild |
| Mambo exploit making the rounds |
| Man arrested for hacking into billing provider |
| Man facing charges linked to SpyEye virus |
| Man Pays For Cross-Country Trip Using Bacon As Currency |
| Manager's Briefing for Microsoft Security Bulletins, MS04-036 Exploit Code, VERITAS Security Patch, Comxt Alternate Data Stream Trojan |
| Managing a BYOD Infrastructure |
| Managing Project Team - Dos & Dont's |
| Many pcAnywhere systems still sitting ducks |
| Many vulnerable SAP systems exposed to the internet |
| Mapping Attack Methodology to Controls |
| March Microsoft Security Bulletins Released |
| MariaDB 5.5.23 arrives with performance improvements |
| Marketing to Operations: The Organizational Shift for the Small Food Processor |
| Marlinspike demos MS-CHAPv2 crack |
| Mars One Contracts Paragon To Investigate Life Support Systems |
| Mars' Reull Vallis: a River Ran Through It |
| Mars Rover Solves Metallic Object Mystery, Unearths Another |
| Massive Amount of Malware Targets Older Java Flaws |
| Massive Cyber-Espionage Network Targets Valuable Data: Kaspersky |
| Massive Email Crash Hits Canadian ISP Shaw |
| Mathematical Breakthrough Sets Out Rules For More Effective Teleportation |
| Matousec and their Challenge |
| Matthew Garrett Has a Fix To Prevent Bricked UEFI Linux Laptops |
| Matthew Keys Has Anonymous-Friendly Lawyers Calling Out 'Crazy Overreach' |
| MauDweeb: Database Architects of Dune, Chapter 1 |
| MaxForum v1.0.0 Local File Inclusion |
| Maxmind.com (Ab)used As Anti-Analysis Technique |
| May 2013 (RSU1304) service package has been tested and is now available |
| May Microsoft Patches Available |
| Maybe don't install that groovy pirated Android keyboard |
| Maybe With Help From Google and Adobe, Microsoft Can Kill Windows XP |
| Mayor seguridad por violación en escuela de Ohio |
| McAfee 4715 DAT False Positive Deletion Reports Follow-up |
| McAfee Antivirus vulnerability; Java WebStart vulnerability; pwsteal.bank trojan clarification; 18905/tcp scanning |
| McAfee DAT 4715 clean up tool available |
| McAfee dumps signatures and proclaims an (almost) end to botnets |
| McAfee EPO fix |
| McAfee May Have Been Captured |
| McAfee/NAI rolls bad pattern |
| McAfee's Top 10 Predictions for 2007 |
| MD5 Checksum Updated / MD5 Tools for Win32 / Botnets reports |
| MEASURING ERP SUCCESS IS LIKE GROWING A GARDEN |
| Media groups, Filipinos protest tough cyber law |
| Media groups, Filipinos step up calls for repeal of tough new law against online crimes |
| Media sanitization NIST website |
| Media sanitization |
| MediaFire Restores Virus Researcher's Account But Not Individual Files |
| Medical Firm Sues IRS For 4th Amendment Violation In Records Seizure |
| Meet "Ophelia," Dell's Plan To Reinvent Itself |
| Meet Drone Shield, an Ambitious Idea For a $70 Drone Detection System |
| Meet the 23-Ton X-Wing, the World's Largest Lego Model |
| Meet the Very First Rover To Land On Mars |
| Mega Vulnerability Reward Program Starts Payouts: 7 Bugs Fixed In First Week |
| Melb IT tells ICANN to clear up its clearinghouse act |
| Merry Christmas to All! |
| Merry Christmas to All; More Details on Recent Vulnerabilities |
| Merry Christmas |
| Merry X-Mas ransomware from Sunday 2017-01-08 |
| Met Police staff guilty of stealing stolen electronic goods |
| Metasploit Framework 2.6 Released |
| Metrics have been enhanced for DB2 stored procedures and UDFs |
| Mice, Newts Retrieved After a Month Orbiting Earth At 345 Miles Up |
| Microbes Likely Abundant Hundreds of Meters Below Sea Floor |
| Micromotors Race About By Turning Water Into Hydrogen Gas |
| Microservers Take Aim at the Data Center |
| Microsoft Adds .NET Core, ASP.NET to Bug Bounty Program |
| Microsoft Advance Notice Out - 11 Patches |
| Microsoft advanced bulletin |
| Microsoft Advisory |
| Microsoft Altering ActiveX in Next Set of Patches |
| Microsoft and FBI storm ramparts of Citadel botnets |
| Microsoft ASP.NET vulnerability, URL obfuscation, more MD5 |
| Microsoft attacks Zombi Masters. |
| Microsoft August 2006 Patches: STATUS |
| Microsoft awards $250,000 prize for new mitigation features |
| Microsoft BITS Used to Download Payloads |
| Microsoft Black Tuesday - December 2006 overview |
| Microsoft black tuesday - October 2006 STATUS |
| Microsoft Black Tuesday Overview |
| Microsoft Black Tuesday Patches |
| Microsoft blames security info-sharing program for attack code leak |
| Microsoft borks botnet takedown in Citadel snafu |
| Microsoft Buffer Overrun in RPC |
| Microsoft Buys Cloud Gateway Provider StorSimple |
| Microsoft censors Pirate Bay links from IM |
| Microsoft December advance patch notification |
| Microsoft December Patches |
| Microsoft denies Windows 8 app spying via SmartScreen |
| Microsoft douses "Flame" |
| Microsoft Emergency Bulletin: Unauthorized Certificate used in "Flame" , (Mon, Jun 4th) |
| Microsoft Ends Lawsuit as Chinese Botnet Host Settles |
| Microsoft Essentials protection is declining |
| Microsoft exploits on Reboot Wednesday |
| Microsoft February 2016 Patch Tuesday |
| Microsoft February Patch Tuesday Advance Notification, (Fri, Feb 8th) |
| Microsoft 'fesses credit cards exposed by Indian store hack |
| Microsoft Files Dispute Against Current Owner of XboxOne.com |
| Microsoft Fixes 19 Security Flaws in November Patch Tuesday Update |
| Microsoft has reissued Service Pack 2 for Office for Mac 2011 |
| Microsoft helps you choose “good passwords”. |
| Microsoft India warns hackers may have compromised customer financial data |
| Microsoft installs Skype without consent |
| Microsoft Issues XSS Patches, but Security Researchers Focus on Oct. Update |
| Microsoft July Security Bulletin Review |
| Microsoft latest to 'fess up to Java-based Mac attack |
| Microsoft leads seizure of Zeus-related cybercrime servers |
| Microsoft Makes Direct X 11.1 a Windows 8 Exclusive |
| Microsoft Makes Millions Renting Campus Space to Vendors |
| Microsoft May Acquire Nook Tablet Business From Barnes and Noble |
| Microsoft May Be Seeking Protection From Linux With Dell Loan |
| Microsoft may have leaked attack code for critical Windows bug, says researcher |
| Microsoft May Replace Xbox Live Chat With Skype |
| Microsoft non-patch; 8181 TCP; Safer Internet Day |
| Microsoft November Bulletins |
| Microsoft October Patch Pre-Announcement, (Thu, Oct 4th) |
| Microsoft October Security Bulletin Advanced Notification |
| Microsoft offers workarounds for IE bug |
| Microsoft Office 2004 - Mac OS X updated |
| Microsoft Out of Cycle Patch: IE http://technet.microsoft.com/en-us/security/bulletin/ms13-jan, (Mon, Jan 14th) |
| Microsoft patch day |
| Microsoft patch problems |
| Microsoft patch troubles ? |
| Microsoft Patch Tuesday Addresses 57 Security Vulnerabilities |
| Microsoft Patch Tuesday Advance Notice |
| Microsoft Patch Tuesday Analysis |
| Microsoft Patch Tuesday brings four critical updates |
| Microsoft Patch Tuesday followup: KB3097877 re-issued! |
| Microsoft patch tuesday problem with Symantec Cloud Endpoint protection? |
| Microsoft Patch Tuesday Summary for April 2016 |
| Microsoft Patch Tuesday Summary for May 2016 |
| Microsoft Patch Tuesday, August 2016 |
| Microsoft Patch Tuesday: Expected Exchange patch problems. |
| Microsoft patches are out; Port 80 spike; Mail bag; Firefox 1.0.5 released; Oracle and Apple too! |
| Microsoft Patches Internet Explorer Zero-Day Flaw in Security Update - Security - News & Reviews - eWeek.com |
| Microsoft Patches Released |
| Microsoft patches released; H.323 vulnerabilities; Anti-virus engine vulnerabilities; Citibank anti-fraud measures |
| Microsoft Patching Observations |
| Microsoft pays big to strengthen software defense |
| Microsoft Phases Out XNA and DirectX? |
| Microsoft Powerpoint Security Advisory Released |
| Microsoft Prepares Rethink On Windows 8 |
| Microsoft promises two-step IE fix |
| Microsoft Release 2007 Time Zone Update for Windows Operating Systems |
| Microsoft Releases 3 Critical Patches - Hilarity Does Not Ensue; MS Patches Reset Settings in Program Defaults? |
| Microsoft Releases Fix It Tool to Fight IE Zero-Day Flaw |
| Microsoft Releases Fix It Tool to Fight IE Zero-Day Flaw - Security - News & Reviews - eWeek.com |
| Microsoft Releases IE Cumulative Patch (MS04-004) |
| Microsoft Releases Updates (1 - Critical, 2 - Important) |
| Microsoft Releases Updates |
| Microsoft Reportedly Working On Xbox TV Device |
| Microsoft Retiring Messenger, Replacing It With Skype |
| Microsoft RPCSS Vulnerability |
| Microsoft rushes Explorer 8 patch release |
| Microsoft says don't use PPTP and MS-CHAP |
| Microsoft Security Advance Bulletin (7 updates, at least 2 Critical) |
| Microsoft Security Advisory (917077) |
| Microsoft Security Advisory (927892) |
| Microsoft Security Bulletin Advanced Notification |
| Microsoft Security Bulletin MS06-037 |
| Microsoft Security Bulletin MS06-038 |
| Microsoft Security Bulletin MS06-052 |
| Microsoft Security Bulletin MS06-053 |
| Microsoft Security Bulletin MS06-054 |
| Microsoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE |
| Microsoft Security Bulletins / You got a Postcard! |
| Microsoft Security Bulletins Released for April, ISC Webcast on Wednesday |
| Microsoft Security Bulletins |
| Microsoft security patches for September 2006 |
| Microsoft Security Patches, VBS/Inor Trojan Variant, Phrack 62 Release, BHODemon Mirror |
| Microsoft Sept Patches and Weblogic vulnerability |
| Microsoft slams Google over iPhone, Mac privacy boner |
| Microsoft Surface Pro Arrives Feb. 9 |
| Microsoft SUS not playing well |
| Microsoft takes Bing Streetside offline in Germany after privacy complaints |
| Microsoft takes down ZeuS botnets |
| Microsoft time (cont.); Firefox exploits; PAWS exploit; port 445 |
| Microsoft To Abandon Windows Phone? |
| Microsoft to close critical IE hole with a temporary Fix-it |
| Microsoft to devs: Bug users about security … <i>now!</i> |
| Microsoft to devs: Bug users about security … <i>now</i>! |
| Microsoft to Patch Adobe Flash Player in Windows 8 'Shortly' |
| Microsoft to release fixes for latest IE security exposure |
| Microsoft unleashes Windows attack tool |
| Microsoft Upcoming Bulletins Release |
| Microsoft Update on Windows 98, Microsoft Outlook |
| Microsoft Updated Security Advisory (917077) and APWG Report released |
| Microsoft updates - overview |
| Microsoft urges customers to install security tool |
| Microsoft Urges Users to Patch Internet Explorer Flaw - Security - News & Reviews - eWeek.com |
| Microsoft Urging Safari Users To Use Bing |
| Microsoft warns on Internet Explorer security flaw |
| Microsoft Windows RPCSS Vulnerability Update |
| Microsoft Windows Update Errors |
| Microsoft Word Vulnerability |
| Microsoft XP SP2 blocker tool expiration ; Microsoft JetDB Engine DB File Buffer Overflow ; (Unintentional) DNS Cache poisoning ; Are you a spambot? |
| Microsoft XP SP2 wireless hotfix |
| Microsoft, FBI Takedown Citadel Botnet |
| Microsoft, Oracle Patch Serious Security Flaws Targeted by Attackers |
| Microsoft: Pirates at high risk of malware infection |
| Microsoft-Built Smartphone Could Irritate Hardware Partners, Harm Nokia |
| Microsoft's September Updates |
| Microsoft's Surprise Box / Port 42 and 8634 / My personal poll |
| Middle Management kills a lot of leaders? |
| Michigan Physicians Benefit From HIPAA Compliant E-Prescribing |
| Mikko Hypponen's Malware Odyssey |
| Military Dolphins Discover 1800s Torpedo |
| MIMAIL/MyDoom/Novarg Email Virus Continues; H.323 Problems in Firewalls |
| Minecraft now available for free on the Raspberry Pi |
| Mirai - now with DGA |
| Mirai Scanning for Port 6789 Looking for New Victims |
| Misc. Items |
| Miscellaneous news |
| MISP - Malware Information Sharing Platform |
| Missile Test Creates Huge Expanding Halo of Light Over Hawaii |
| Missouri Legislation Redefines Science, Pushes Intelligent Design |
| Missouri Republican Wants Violent Video Game Tax |
| Mistakes over GCHQ codebreaker's death crippled inquiry |
| MIT Research Tweaks Smartphone Amplifier Voltage To Gain Battery Life |
| MIT Researchers Show Dash Font Choice Affects Distraction |
| MIT To End Open-Network Policy In Response To Recent Attacks |
| MIT Warned of a JSTOR Death Sentence Due To Swartz |
| Mitglieder hell |
| Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting |
| Mixed bag for a quiet Sunday |
| Mixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong |
| Mobile CRM for on-the-go |
| Mobile dev site: We never knew about Facebook, Apple hacks |
| Mobile device management: Getting started |
| Mobile Devices Will Outnumber People By 2017 |
| Mobile location data identifies individuals |
| Mobile Operator Grabs 4G Lead In UK — But Will Anything Work On It? |
| Mobile Recruitment on the Move? |
| MobileCartly 1.0 Remote File Upload Vulnerability |
| Mobiles susceptible to radio hacks |
| Mobility, cloud computing, security issues to dominate Interop |
| Modeling Color Spaces With Blender |
| Modified Malware for the IE Expoit |
| Mojang Releases Minecraft: Pi Edition</em> For the Raspberry Pi |
| Monitoring Network Traffic for Android Devices |
| Monitoring your kids on Facebook? That's so 2009. |
| Monthly Threat Update Webcast |
| Moore's Law Is Becoming Irrelevant, Says ARM's Boss |
| Moore's Law leaves mobile networks ripe for attack |
| More .wmf Woes |
| More 802.11 soup |
| More about the host based firewall on Windows XP SP2 |
| More agobot/phatbot/polybot variants, cPanel resetpass exploit |
| More Brute-Force PW Scans, Opteron Exposed, Follow the Bouncing Malware - Part I |
| More CA BrightStor ARCserve Backup... Is your IDS/IPS Dead?... And Persistent Netcat Listener with While Loop |
| More Cisco/Blackhat |
| More CVS woes |
| More DNS Tricks |
| More Email Tips |
| More Fragmentation; What is Normal Part II |
| More From Canonical Employee On: "Why Mir?" |
| more https scanning reports |
| More IFRAME, phishing and BHOs; Java Security |
| More Malicious JavaScript Obfuscation |
| More MS06-042 woes |
| More Multi-Architecture IoT Malware |
| More on Blackmal/Grew/Nyxem (file deletion payload) |
| More on blue security DDOS - DDOS response |
| More on encoded malware |
| More on hunting rogue access points |
| More on MS04-007 |
| More on Nyxem |
| More on Outlook Anti-Phishing Feature |
| More on Protocol 47 denys |
| More on Registry Concealment; suspected Zotob author arrested |
| More on Symantec vulnerabilities |
| More patch tuesday: adobe released security update for adobe flash player |
| More patches! This time from Apple to Safari, OS X and OS X server |
| more phpBB 2.0.12 fun; Identity theft; alternative browser java exploit |
| More RPC DCOM - SDBot News |
| More Sober Variants |
| More SoBig comments, and Whack-A-Scam, Ultr@VNC Vulnerability |
| More spam for your inbox |
| More tools, Google summer of code |
| More Veritas Backup Exec fun / The search for open relays continues / Santy still running around making trouble / Mailbag |
| More WMF Signatures |
| Most Companies Will Require You To Bring Your Own Mobile Device By 2017 |
| Most SSDs Now Under a Dollar Per Gigabyte |
| Most UK GPs Have Prescribed Placebos |
| 'Most US banks' were DDoSed last year - survey |
| Most webmasters don't know how their websites got hacked, report says |
| Mostly Quiet Weekend -- Educating Users on Mass Mailing Viruses |
| Mother Nature - Please Help Us Cool Our Server Room |
| Move Over Apple - Samsung Files For a Patent On Page Turn |
| Move to Yellow, Potential PCT worm, No Osama has NOT been captured, New Virus, Symantec Firewall Vulnerability |
| Moving Precautions for the Security Paranoid Types |
| Mozilla blocklists Java on older Mac OS X systems |
| Mozilla Combines Social API and WebRTC |
| Mozilla Firefox 1.5.0.8 and Thunderbird 1.5.0.8 Released |
| Mozilla Firefox 2 officially released |
| Mozilla Firefox vulnerabilities and upgrade |
| Mozilla Foundation Security Advisory 2015-112 |
| Mozilla gives CAs a chance to come clean about certificate policy violations |
| Mozilla Launches Firefox OS 3.0 Simulator |
| Mozilla Thunderbird 1.5 Release |
| Mozilla's Firefox update fixes three critical holes |
| MP Seeking To Outlaw Written Accounts of Child Abuse |
| MplayerX Leaving Mac App Store |
| MS 06-034 Update |
| MS 06-034 woes? |
| MS Advisory on the Vulnerability in RDP; Port 3389; FormMail Attempts |
| MS Black Tuesday? |
| MS Desktop Search add-on vulnerabilities - Trustworty Computing gone too far |
| MS genuinely surprised 250,000 unique systems infected with Alcan.B |
| MS Help For SP2 Setup Problems, The Phishin' Hole, Follow the Bouncing Malware, Part II |
| MS Monthly Updates Released |
| MS November Security Bulletin Advance Notification |
| MS Office 2013 - New Macro Controls - Sorta ... |
| MS Office buffer overflow vuln, still more botnets, and don't be a baddie, be a goodie!, 2004 SANS Top 20 List |
| MS Office vulnerabilities (-058, -059, -060, -062) |
| MS Patch Tuesday Advance Notice |
| MS Responds to IE Vulnerabilites With Patch |
| MS Security Alert Advanced Notice, Cisco PIX Source Code Reported Stolen, Open Letter to Anti-Virus Software Companies |
| MS SMB zero-day? |
| MS to Release Update on Jan 10 |
| MS tool to help ensure that your application does not have administrator access as a dependency |
| MS Update to MS06-015 and a Separate Fix for AEC.SYS Issue |
| MS Windows Memory Allocation Denial of Service Via RPC |
| MS04-007 Exploit released |
| MS04-009 Upgraded to Critical, Disable Outlook HTML Parser, 'Phatbot', NetSky Day |
| MS04-028 PoCs and Exploits released / UPDATE: Snort Rules |
| MS04-028 Proof of Concept Rumors; Beyond Patching; Mailbag |
| MS04-028 Public Exploit Attempts, VENDORS TAKE NOTE, Contacting ISC |
| MS05-019 update troubleshooting; Practicing safe forwarding in BIND; 9999/TCP spike;TCPDump Buffer Overflows; MS05-020 POC Released;Spyware Lawsuit |
| MS05-036 Color Management Exploit Code in Wild; mod_jrun exploit scanning from Europe; Insecure by Design |
| MS05-039 Worm in the wild |
| MS05-044 Folder View for FTP Sites - mailbag item |
| MS05-044 Windows FTP Client File Transfer Location Tampering |
| MS05-045: Network connection Manager DoS |
| MS05-046 Client Service for NetWare Vulnerability |
| MS05-047 Vulnerability in PnP Could Allow Remote Code Execution |
| MS05-048 CDO Object Remote Code Execution |
| MS05-049 Windows Shell Vulnerability |
| MS05-050 Vulnerability in DirectShow |
| MS05-051 (MSDTC) Malware / Port 1025 |
| MS05-051 exploit info and rumors |
| MS05-051 exploit spotted |
| MS05-051 POC Exploit |
| MS05-051 Vulnerabilities in MSDTC and COM+ |
| MS05-052 Cumulative Security Update for Internet Explorer (896688) |
| MS05-053 - More Graphic Rendering Buffer Overflow Vulnerabilities |
| MS06-005 proof of concept exploit released |
| MS06-011 Updated |
| MS06-015 will not provide patch for windows 98 and ME. |
| MS06-021: Internet Explorer patch |
| MS06-022: buffer overflow in ART image rendering library |
| MS06-023: Microsoft's JScript remote code execution |
| MS06-024: buffer overflow in windows media player |
| MS06-025: RRAS arbitrary code execution |
| MS06-026: Graphics Rendering Engine / Remote Code Execution |
| MS06-027: MS Word object pointer / Remote Code Execution |
| MS06-028: PowerPoint malformed record / Remote Code Execution |
| MS06-029: Script injection through Exchange/OWA |
| MS06-030: Microsoft SMB Vulnerabilities |
| MS06-031: RPC Mutual Authentication Vulnerability |
| MS06-032: Source routing buffer overflow |
| MS06-034 - unchecked IIS buffer vulnerability in ASP files processing |
| MS06-035 - Patch now! |
| MS06-036 - unchecked buffer Vulnerability in DHCP Client Service Could Allow Remote Code Execution (914388) |
| MS06-039: vulnerabilities in Microsoft Office GIF and PNG parsers |
| MS06-040 and MS06-042 updates |
| MS06-040 exploit(s) publicly available |
| MS06-040 wgareg / wgavm update |
| MS06-040 Worm |
| MS06-040: BOLO -- Be On the LookOut |
| MS06-040: Server Service |
| MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683) |
| MS06-042 and CA Unicenter Service Desk |
| MS06-042 and IE 6.0 SP1 issues |
| MS06-042: Internet Explorer Rollup Patch |
| MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution (920214) |
| MS06-044: Microsoft Management Console Cross Site Scripting. |
| MS06-045: Windows Explorer Remote Code Excution Vulnerability |
| MS06-046: HTML Help Remote Code Execution |
| MS06-047: Office & Visual Basic for Application |
| MS06-048: Microsoft Office Remote Code Execution Vulnerabilities |
| MS06-049 re-release |
| MS06-049: W2k Kernel Bug |
| MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670) |
| MS06-051: Vulnerability in Windows Kernel |
| MS06-053 revisited ? |
| MS06-056: ASP.NET XSS Information Disclosure Vulnerability (moderate) |
| MS06-057: Vulnerability in Windows Shell Could Allow Remote Code Execution (926043) |
| MS06-061 |
| MS06-061: XSLT/MSXML Buffer Overflow Code Execution Vulnerability (moderate) |
| MS06-063: Mailslot DoS (Server service) |
| MS06-064: Vulnerabilities in IPv6 |
| MS06-065: Remote Code Excution in Windows Object Packager |
| MS06-066: Netware Client Service Buffer Overflow |
| MS06-067: Internet Explorer DirectAnimation and HTML Rendering Vulnerability |
| MS06-068: Microsoft Agent |
| MS06-069: Adobe Flash Player |
| MS06-070 Remote Exploit |
| MS06-070: Workstation service |
| MS06-071 is available via SUS 1.0 |
| MS06-071: MSXML Core Services |
| MS06-072: Cumulative Security Update for Internet Explorer (925454) |
| MS06-073: WMI Object Broker Vulnerability (CVE-2006-4704) |
| MS06-074: SNMP Buffer Overflow (CVE2006-5583) |
| MS06-075: csrss local privilege escalation (CVE-2006-5585) |
| MS06-076: Windows Address Book Contact Record flaw (CVE-2006-2386) |
| MS06-077: Remote Installation Service (RIS) remote exploit |
| MS06-078: 2 Windows Media Format Vulnerabilities (CVE-2006-4702, CVE-2006-6134) |
| MS12-045 - Critical : Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (2698365) - Version: 1.2 |
| MS12-052 - Critical : Cumulative Security Update for Internet Explorer (2722913) - Version: 1.1 |
| MS12-060 - Critical : Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573) - Version: 1.1 |
| MS12-062 - Important : Vulnerability in System Center Configuration Manager Could Allow Elevation of Privilege (2741528) - Version: 1.1 |
| MS12-066 - Important : Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517) - Version: 1.2 |
| MS12-069 - Important : Vulnerability in Kerberos Could Allow Denial of Service (2743555) - Version: 1.1 |
| MS12-072 - Critical : Vulnerabilities in Windows Shell Could Allow Remote Code Execution (2727528) - Version: 1.1 |
| MS12-073 - Moderate : Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure (2733829) - Version: 2.0 |
| MS13-004 - Important : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2769324) - Version: 2.0 |
| MS13-005 - Important : Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Version: 1.1 |
| MS13-005 - Important : Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Version: 1.2 |
| MS13-006 - Important : Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) - Version: 1.1 |
| MS13-009 - Critical : Cumulative Security Update for Internet Explorer (2792100) - Version: 1.1 |
| MS13-010 - Critical : Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2797052) - Version: 1.1 |
| MS13-038 - Critical : Security Update for Internet Explorer (2847204) - Version: 1.1 |
| MS13-040 - Important : Vulnerabilities in .NET Framework Could Allow Spoofing (2836440) - Version: 1.1 |
| MS13-044 - Important : Vulnerability in Microsoft Visio Could Allow Information Disclosure (2834692) - Version: 1.1 |
| MS13-048 - Important : Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229) - Version: 1.1 |
| MSFT Patches / DrudgeReport headline - ...huge computer attack... |
| MSFT Reaches Out To Hackers: 'Do Epic $#!+' |
| MSIE DirectAnimation ActiveX 0-day update |
| MSIE IE7 Popup Address Bar Spoofing Vulnerability |
| MSIE 'Sploit du Jour |
| MSIE: One patched, one pops up again (setslice) |
| MSN Messenger; Notable Activity on Port 903, 1063, 1978; Steps to Beat Phishing |
| MSN-Worms exploit MS pif filter vulnerability |
| MSRC Blog Entry about POC of MS06-035 |
| MSXML 4.0 exploit in the wild |
| MTBF Blues |
| Multinationals in China fear IP theft by local staff |
| Multi-platform spyware penetrates smartphones and VMs |
| MultiPlatform/MultiBrowser Java Vuln, Yo! Microsoft!, Open Letter To Anti-Virus Software Companies - A Response, No Bounce |
| Multiple anti-virus software evasion |
| Multiple Cisco Products affected by IKEv1 Vulnerability |
| Multiple DoS Vulnerabilities in Wireshark |
| Multiple Exploits Avaliable for MS06-005 and MS06-006 |
| Multiple Exploits targeting Microsoft MS-04-011 vulnerabilities threaten networks. |
| Multiple Greeting Card scams; MSFT time server; Sober next Monday; Netscape 8.01; Pharming |
| Multiple Linksys WRT54G Vulnerabilities |
| Multiple security vulnerabilities in Secure Elements Class 5 AVR (EVM) |
| Multiple Studies Show Used Electronics Exports To Third World Mostly Good |
| Multiple vulnerabilities fixed in Firefox, Thunderbird and Seamonkey |
| Multiple vulnerabilities in Symantec Veritas NetBackup |
| Multi-Tenancy Revisited |
| Multitenant Architectures Must Balance Security, Availability |
| Musings and More WMF Information |
| Musings on the Internet Explorer 0-day vulnerability |
| Mwcollect and Nepenthes merging (1 Comments) |
| My book got a bad review... and a good one |
| My Information Governance presentations at IBM IOD 2012 |
| MyDoom Details, ssh password brute forcing. |
| MyDoom.A Timeline, MyDoom.B DDoS a Non-Event |
| MyDoom.B Update |
| MyDoom-O hits search engines hard. |
| MySpace QuickTime Worm |
| MySQL MERGE Table Privilege Revoke Bypass |
| Mystery port 3072 and MS04-22 Exploit code available |
| Nagios vulnerability |
| Nachia B Worm, Microsoft XML |
| Nachia Decline; Increased Activity on Port 1026 |
| Name.com Resets All Passwords Following Security Breach |
| named/bind error messages - solved |
| Nameserver dynamic DNS abuse attack trend, |
| Nanoscale 3D Printer Now Commercially Available |
| NASA "Mohawk Guy" To Host Radio Show |
| NASA and CSA Begin Testing Satellite Refueling On the ISS |
| NASA Cancels Nanosat Challenge |
| NASA Craft To Leave Vesta Heads For Dwarf Planet Ceres |
| NASA Fires Up Experimental Space Internet For Robot Control |
| NASA IG Paints Bleak Picture For Agency Projects |
| NASA Morpheus Lander Test Ends In Explosion |
| NASA Mulling Earth-Moon L2 Point for Mars Staging Station |
| NASA Planes Fly Over Bay Area To Measure Air Pollution Levels |
| NASA Pondering L2 Outpost, Return To Moon |
| NASA Releases Orbital Photos of Beijing's Air Pollution |
| NASA Says Asteroid Will Buzz Earth Closer Than Many Satellites |
| NASA Suffered Intrusion at Jet Propulsion Lab (March 1, 2 & 5, 2012) |
| NASA Teams With LEGO To Offer Model Competition |
| NASA TESS Observatory Will Hunt For Alien Life On "Super-Earth" Exoplanets |
| NASA Testing Supersonic X-51A Jet Tomorrow |
| NASA To Face $1.3 Billion Cut Next Year Under Sequestration |
| NASA Trailer To Be Shown Before Star Trek: Into Darkness</em> |
| NASA Wants New Space Net To Sustain Big Data Dumps; Moon and Mars Trips |
| NASA: Mission Accomplished, Kepler – Now Look Harder Still |
| NASA's Fermi Spacecraft Dodged a Defunct Russian Satellite |
| Nasty Games of Hide and Seek in the Registry; Nepenthes |
| Nate Silver, Microsoft Research Predict the Oscars |
| National Security Letters Ruled Unconstitutional, Banned |
| NATO Holds Annual Cyber Defense Exercise |
| 'Natural health' website apparently hacked by sinister forces |
| Nature Lover Vladimir Putin Flies With the Cranes |
| NBN Co hoses down 'scary Russian crackers' report |
| Nearest Alien Planet Gets New Name |
| Nebraska Sheriff Wardriving, Sending Letters About Unsecured Wi-Fi |
| Nebula Debuts 'Cloud Computer' Based On OpenStack |
| Neil deGrasse Tyson Pinpoints Superman's Home Star System |
| Nessus and Powershell is like Chocolate and Peanut Butter! |
| Net Neutrality and Information Security |
| Netcraft Report - HostGator servers exploited via cPanel, allowing redirection & VML exploitation |
| Netflix Gives Data Center Tools To Fail |
| Netflix Using HTML5 Video For ARM Chromebook |
| Netscape URL Domain Name Buffer Overflow |
| Netsky.b Virus / Win98 ASN.1 patch / new Mremap PoC |
| Netsky.P Triggered, MSVC++ Constructed ISAPI Applications DoS |
| NetSol Worldnic DNS server issues |
| Network Engineering Q&A Site Launched |
| Networked Cars: Good For Safety, Bad For Privacy |
| NetworkSolutions Down Again - Not a DoS Attack |
| NetworkSolutions down |
| Neutrino exploit kit sends Cerber ransomware |
| New {Phat|Ago|Gao}bot Variant(s) ? - Followup on port 1981 increase |
| New Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/, (Wed, Oct 17th) |
| New Adobe vulnerability |
| New AIM worm |
| New and Improved Honeynet Tools availability |
| New app from Finland takes crime fighting to phone screen |
| New approaches to combat 'sources of evil' and other security issues |
| New AV Updates; TEMPEST makes a comeback |
| New backdoor - Trojan.Kaht - exploits WebDav vulnerability |
| New Bagle in Encrypted Zip File Attachments |
| New Bagle Making the Rounds? |
| New Bagle Variant Spreading |
| New Bagle variant |
| New Bagle variants |
| New Bagle/Beagle Variants, Fragmentation Attacks, Gmail XSS Hole |
| New Bagle; RECon REPort; DC702 Summit |
| New Beagle on the war path |
| New Beagle/Bagle-Related Malware Variants; A Note from David Litchfield |
| New Botnet? |
| New Burp Feature - ClickBandit |
| New Camera Sensor Filter Allows Twice As Much Light |
| New critical Java flaw claimed |
| New Data Center Modeled After a Space Station |
| New Data Retention Rules Effective Today |
| New Device Sniffs Out Black Powder Explosives |
| New Diary Format |
| New DNS modifying malcode |
| New DRM-Free Label Announced |
| New DVD Training - Learning Oracle 11g |
| New email virus making the rounds |
| New Ethereal released; A different Kind of Storm Center |
| New Excel 0day (Are we evolving or going in circles?) |
| New Exploit for HTML Help Workshop vulnerability |
| New Exploits and Vulnerabilities; tcp/445 Wrap-up; 40 Million Credit Cards; HP .gif; Geek Wall Art |
| New feature at isc.sans.org |
| New Features for Microsoft Patch Data |
| New Federal Mobile IT Strategy Must Address Security |
| New Firefox Vulnerability |
| New Firefox Vulnerability(?) |
| New Flat Lens Focuses Without Distortion |
| New Fraudulent email from MS; e-voting software co. compromised |
| New FTP Brute Force? - German publisher DOSed |
| New Hacker Challenge |
| New HAL Exoskeleton: A Brain-Controlled Full Body Suit To Be Used In Fukushima |
| New Handler Pages Are Here! |
| New Handler: Mohammed Haron |
| new Haxdoor |
| New Honeynet Forensics Challenge! Deadline is Feb 15 2013. Check https://www.honeynet.org/challenges/2012_13_message_picture, (Thu, Jan 3rd) |
| New Challenge: Hack Bill! |
| New I.E Exploit Security Advisiory Released |
| New IE 0-Day Drag-N-Drop-N-PopUnder-N-GrabFocus-N-DoTheHokeyPokey Vuln. |
| New IE 0-Day Exploit in Wild |
| New IE Exploit PoC; phpBB notes; new book |
| New IE Vulnerability |
| New IM Worm Exploiting WMF Vulnerability |
| New Information from Symantec regarding the NSIS false positive |
| New Internet Explorer and an old vulnerability |
| New ISC PGP Key |
| New ISC Poll - Are you currently using a Security Information and Event Management (SIEM) solution to collect security logs?, (Sun, Jul 15th) |
| New Jersey lawmakers want copier hard drives wiped to prevent ID theft |
| New LAND Attack on Windows XP and 2003 Server; Instant Messenger Malware |
| New Linux/Unix Backdoor; Another Windows Backdoor |
| New list of Trendnet Web Cams posted on paste bin - bonus you get a Google map too |
| New LSASS RPC exploit; Port 443; The Week Ahead |
| New Malware for MS06-047 |
| New Mambo, Joomla releases fix security vulnerabilities |
| New mass mailer spreading (Blackmal/Grew/Nyxem) |
| New Mass Mailing Virus |
| New MassMailing Virus - Sober.C; Limit Exposure During Breaks; Upcoming Repeat Virus Outbreaks |
| New Microsoft Updates |
| New Monster Phish Bait |
| New Mydoom / Hurricanes |
| New MyDoom In The Wild |
| New MyDoom Variant uses unpatched exploit, Phishing tip, AV False Positive, Virus Naming |
| New mydoom variant; ARCserve exploitation has begun... got Port 41523 TCP packets? |
| New MyDoom Variation; SHA1; an increase in port scanning on ports 137 and 445; port 41523 captures |
| New Netsky Variant |
| New old virus; Apple patches; Corporations at large |
| New OpenFlow Controller, Virtual Switch Debut from NEC |
| New OS X PoC virus |
| New Phishing Technique / Vulnerability Data Base Resource |
| New Poll: Top 5 Unresolved Security Problems of 2012, (Tue, Nov 20th) |
| New poll; DNS spikes; Witty worm analysis; LISTSERV vuln; ZoneAlarm clarification |
| New PostgreSQL versions released (SQL injection issue with multi-byte encodings) |
| New release of PCI DSS (version 3.2) is available |
| New release of snort is available Snort 2.9.4.5, details on www.snort.org (thanks Bill) , (Wed, Apr 3rd) |
| New Sasser Worm FTP exploit and Java DOS |
| New Skype vulnerabilities |
| New Snort signature for SSL Bomb DoS; Continued MS Exploit Development; Port 905 Slight Increase |
| New Sober variant in the wild |
| New Sober Variant, Compromised Servers Deliver Spy/Adware?, Phishing Reports, No Honor Among Thieves II |
| New Study Shows Universe Still Expanding On Schedule |
| New Switchvox Products Highlight Role of Hardware |
| New target for 419 fraudsters: Struggling 'weak' banks |
| New tool to diagnose and repair .NET Framework 4 |
| New tool: docker-mount.py |
| New UrSnif/Haxdoor Variant |
| New variant of CryptoWall - Is it right to call it 4.0? |
| New variant of mambo exploit making the rounds |
| New Veritas Exploit on the wild / Geek Wall art summary / Portuguese Language Community |
| New Version of MYTOB is causing an escalation of Risk Alert |
| New version of Netsky |
| New version of OSX available |
| New Version of PHP, Cisco Advisory, BurstNET DoS'd |
| New version of QuickTime (7.0.3) |
| New Virus Behavior / GDIScan Questions |
| New Virus Masquerades as Microsoft Support (Palyh) |
| New virus, exploits, and old tricks. |
| New Viruses This Week; Possible Decrease in Phishing emails; This Handler's observation |
| New Vulnerability Announcement and patches from Apple |
| New WiFi Protocol Boosts Congested Wireless Network Throughput By 700% |
| New Windows Kernel Issue (MoKB) |
| new Windows RPC issue (race condition), RANDEX.Q virus |
| New Windows service ACL security advisory released (914457) |
| New Windows update; Katrina information still flowing |
| New Workflows using Your Tablet |
| New Year's Resolution: Build Your Own Malware Lab? |
| New Years Resolutions |
| New York Times says Chinese hackers hit its networks as paper investigated leader's wealth |
| New York Times says targeted by China hackers after Wen report |
| New Zealand Draft Patent Law Rewritten After Microsoft Meeting |
| New Zealand's internet bad boy wants to see top lawman |
| New Zealand's internet bad boy wants to see top U.S. lawman |
| Newly Spotted Comet May Shine Among Brightest In History |
| News From Microsoft |
| News Roundup: UC, Storage and Security |
| News Summary: Brand new laptop has malware |
| Next Mars Mission Selected For Funding |
| NHTSA and DOT Want Your Car To Be Able To Disable Your Cellphone Functions |
| NIMH Distances Itself From DSM Categories, Shifts Funding To New Approaches |
| Nintendo Power To Shut Down |
| Nintendo Wii U Teardown Reveals Simple Design |
| Nissan Develops Emergency Auto-Steering System |
| Nissan says hackers stole user IDs, hashed passwords |
| NIST Publishes Draft Guidelines For Server BIOS Protection |
| NKorea accuses US, SKorea of cyberattacks |
| NMAP + XML + PERL = Fun |
| nmap 4.00 released |
| nmap 6.01 released - http://nmap.org/download.html, (Sun, Jun 24th) |
| Nmap 7.00 is out! |
| nmap-4.20 released |
| No Bomb Powerful Enough To Destroy an On-Rushing Asteroid, Sorry Bruce Willis |
| No DVD playback in Windows 8 (unless you want to pay for it) |
| No GPS in the iPad Mini Wi-Fi: People are right to criticise |
| No microsoft patches are available at www.NOT-A-Microsoft-security-site.com |
| No Microsoft patches for December |
| No More "Asperger's Syndrome" |
| No more Bagel, Bagle, Beagle |
| No more WIndows Home Server |
| No partisan fight over cybersecurity bill, GOP senator says |
| No Skype traffic released to cops or spooks, insists Microsoft |
| No Wi-Fi Around Huge Radio Telescope |
| Nokia "Suspends" Its Free Developer Program |
| Nokia Bets Big On Mapping |
| Nokia Claims a Memory Card Slot Would Have "Defiled" New Phone |
| Nokia decrypts browser traffic, assures public not to worry |
| Nokia determined to win race to the bottom with dirt-cheap $20 handset |
| Nokia Receives $1.35B Grant To Develop Graphene Tech |
| Nokia Siemens Networks to tap markets for 700 million euros: FT |
| Nokia Spinning Featurephones as Smartphones |
| Non-Microsoft Patch available for IE bug |
| Non-standard Incident Prediction |
| Non-Volatile DIMMs To Ship This Year |
| NORKS says USA attack took it offline ... as if anyone could tell |
| Norman Sandbox under DDoS Attack |
| North Korea Declares a State of War |
| North Korean crackers hit South Korean hacks |
| Norwegian Study: Global Warming Less Severe Than Feared |
| Norwegian teens arrested over SOCA DDoS attack |
| NOT a Quiet Day |
| Not done yet: Oracle to ship revised Java fix on February 19 |
| 'Not guilty' plea in Utah cop site hacking case |
| Notable quotes from RSA 2012 |
| Notable Tidbits |
| Notepad++ web site compromised |
| Notes from the DShield Forum |
| Notification UI Overhauled in KDE 4.10 (And a Plan For Modernized Notifications) |
| Novel method for slowing down Locky on Samba server using fail2ban |
| Novell ZENworks Asset Management Remote Execution |
| November 2015 Microsoft Patch Tuesday |
| November 2016 Microsoft Patch Day |
| NSA Documents on 'PerfectCitizen' Program Raise Many More Questions |
| NSA chief asks hackers at Defcon for help securing cyberspace |
| NSA PRISM-gate: Relax, GCHQ spooks 'keep us safe', says Cameron |
| NSA security expert worries about mobility, cloud |
| NSA: 'Dozens of attacks' prevented by our snooping |
| NSA: 'Dozens of attacks' prevented by snooping |
| NSW Information Commissioner sends email to wrong list |
| NT 4.0 Protection |
| NT botnet submitted |
| Nuclear Arms Cuts, Supported By 56% of Americans, Would Make the World Safer |
| Nuclear EK traffic patterns in August 2015 |
| Nuclear plant safety report on USB stick lost by official |
| Nuclear Rocket Petition On White House Website |
| Nuevo virus informático ataca a venezolanos |
| 'Nuke-busting' Stuxnet BOOSTED Iran nuke effort, says brainiac |
| 'Nuke-busting' Stuxnet HELPED Iranian nuke project, says boffin |
| Number Theory |
| Number-munching clouds are godsend for cybercrooks - experts |
| Numbers Spam Solved |
| NVIDIA and AMD Launch New High-End Workstation, Virtualization, and HPC GPUs |
| NVIDIA GeForce GTX TITAN Uses 7.1 Billion Transistor GK110 GPU |
| NVIDIA Launches GeForce 700M Mobile GPUs With Improved Power Management |
| NY Attorney General Subpoena's Craigslist For Post-Sandy Price Gougers |
| NY Times' Broder Responds To Tesla's Elon Musk |
| NY Times says Chinese hacked paper's computers |
| NY wife: Officer wanted to kill me, eat others |
| NYC wife: Officer wanted to kill me, eat others |
| NYPD: iPhone thefts rising ten times rate of other crimes |
| NZ Broke the Law Spying On Kim Dotcom, PM Apologizes |
| NZ To Investigate Illegally Intercepted Data In Dotcom Case |
| OAuth 2.0 editor resigns and takes name off spec |
| Obama Announces Open Data Policy With Executive Order |
| Obama considers Twitter lawyer Wong as Internet, privacy adviser |
| Obama executive order seeks better defense against cyber attacks |
| Obama Is Now America's Hacker in Chief |
| Obama may issue order Wednesday on defense against cyber attacks: sources |
| Obama's State of the Union speech |
| Obfuscated MIME Files |
| Observations on the Family System Administrator |
| October 2015 Microsoft Patch Tuesday |
| October Microsoft Security Bulletins |
| Oculus Rift Guillotine Simulation |
| Odd behavior after MS-SQL scan |
| Odd DNS Traffic. Large scale name server finger printing? |
| Odd DNS TXT Record. Anybody Seen This Before? |
| Odd Packet: Any ideas where this comes from? |
| Odd Packets |
| Of the Love of Oldtimers - Dusting Off a Sun Fire V1280 Server |
| Offensive Countermeasures against stolen passswords |
| Office Printers Succumb To Virus |
| Official: US blames Iran hackers for cyberattacks |
| Officials: Cyberattack suspect had bunker in Spain |
| Offline Microsoft Patching |
| Off-Site Backup for Home Users |
| Oh Yeah....I forgot about that |
| Oi, missile boffins! Stop ogling web filth at work - Pentagon |
| OLAP Revolutionary: From Train to Car |
| Old Cisco exploit tries to make a return: |
| Old Inkjet Becomes New Bio-Materials Printer |
| Old Webmin bug still being exploited |
| Oldest infected .wmf? |
| OLPC To Sell 7-Inch XO Tablet In Wal-Mart |
| Omnistar Mailer v7.2 Multiple Vulnerabilities |
| On Dasher |
| On Second Thought, Polaris Really Does Seem 434 Light Years Away |
| On the Heels of Wheezy, Aptosid Releases 2013-01 |
| On the surface |
| One in four don't clean their stinky old browsers - especially Firefoxers |
| One In Six Amazon S3 Storage Buckets Are Ripe For Data-Plundering |
| One Musician's Demand From Pandora: Mandatory Analytics |
| One Piece of Advice for Every Laptop Owner: Plan for Trouble |
| One Step Toward a Babel Fish: Real-Time Voice Translation For Phones |
| One, if by email, and two, if by EK: The Cerbers are coming! |
| One-click-fraud apps go from PC to Android |
| Ongoing Flash Vulnerabilities |
| Ongoing IMAP Scan, Anyone Else? |
| Ongoing Scans Below the Radar |
| Online backup strategy |
| Online electronics retailer has successful trial with bitcoin-only transactions |
| Online Security Scanner from Microsoft - Windows Live Safety Center |
| OnLive Acquires OnLive |
| Only English <em>Final Fantasy 2</em> NES Cartridge On Sale for $50K |
| Open Compute Hardware Adapted For Colo Centers |
| Open Compute Wants To Make Biodegradable Servers |
| Open source code libraries seen as rife with vulnerabilities |
| Open Source ExFAT File System Reaches 1.0 Status |
| Open Source Raspberry Pi WebIDE Alpha Released |
| Open Source Software Licenses Versus Business Models |
| OpenDNS Research Used to Predict Threat |
| OpenOffice.org Vulnerabilities |
| openrbl.org is back; hackiis6.com is down? ; ezArmor upgrade issue; Memorial Day |
| Open-Source Movements Bicker Over Logo |
| Open-source Newsbits |
| OpenSSH 3.9 has just been released, Rumors of new Download.Ject Worm, SEC Warning about Telephone Fraud Scam, My Favorite Quote of the Day |
| OpenSSH 4.4 (and 4.4p1) released |
| OpenSSH 7.1p2 released with security fix for CVE-2016-0777 |
| OpenSSH Protocol Mismatch In Response to SSL Client Hello |
| OpenSSH scp Issue |
| OpenSSH Vulnerability (New) |
| Openssl patches ASN.1 flaw |
| OpenSSL Security Update Planned for 1 March Release |
| OPENSSL update fixes Certificate Verification issue |
| OpenSSL Update Released |
| OpenSSL Vulnerabilities |
| OpenStack: An Overview |
| OpenStreetMap Adds Easier Reporting of Map Problems |
| Opera 12 update closes important security holes |
| Opera 9 long href PoC |
| Opera 9.0 released |
| Opera Confirms It Will Follow Google and Ditch WebKit For Blink |
| Opera Fix/Safari Work-around for Window Injection Vuln, APB: UDP Fragment Data, Reading Room |
| Opera updates, too |
| Operation of Risk Terminator in SAP GRC AC 10.0 |
| Operations management still growing |
| Opportunity Begins 10th Year on Mars |
| Oracle - Multiple Vulnerabilities/ XP SP2 Forum / VNC Brute Force / Web Hacking |
| Oracle Application Server Web Cache Vulnerabilities; Port 65506 |
| Oracle CPU note; Google != Googkle; Obligatory Wireles Factoid |
| Oracle Critical Patch Update and Security Alert |
| Oracle Critical Patch Update for Q1 2015 (Includes Java Updates) |
| Oracle Critical Patch Update October, (Wed, Oct 17th) |
| Oracle critical updates released |
| Oracle databases vulnerable to injected listeners |
| Oracle EBusiness Suite Vulnerabilities; Netgear WG602 Accesspoint Vulnerability; Harry Potter and the Worm of Doom |
| Oracle Java SE CVE-2012-1718 Remote Java Runtime Environment Vulnerability |
| Oracle July 2012 Critical Patch Pre-Release Announcement, (Sun, Jul 15th) |
| Oracle knew about critical Java flaws since April |
| Oracle Latest Java Update Comes With Security Holes, Researchers Say |
| Oracle Patches Database Security Flaw Disclosed at Black Hat |
| Oracle patches Java 0-day, goes to Defcon 2 |
| Oracle Patches |
| Oracle Quarterly Critical Patch Update (Oct 2006) |
| Oracle quarterly patch update |
| Oracle quarterly patches |
| Oracle says Java is fixed; feds maintain warning |
| Oracle Security Alert for CVE-2012-3132, (Sun, Aug 12th) |
| Oracle Ships Java 7 Update 11 With Vulnerability Fixes |
| Oracle to change Java version numbers |
| Oracle to issue 14 patches for Java SE |
| Oracle to patch 14 critical Java SE holes on Tuesday |
| Oracle updates Java, security experts say bugs remain |
| Oracle WebLogic Server: CVE-2015-4852 patched |
| Oracle Worm Proof-of-concept |
| Oracle: DBMS Market Share Or Market Domination? |
| Oracle's Sparc T5 Chip Evidently Pushed Back to 2013 |
| ORDB Shutting down |
| Oreans Technologies Themida TMD File Buffer Overflow Vulnerability |
| Oreans WinLicense Unspecified Memory Corruption Vulnerability |
| Oregon Lawmakers Propose Mileage Tax On Fuel Efficient Vehicles |
| Original Batmobile Sells For $4.2 Million |
| Original Motorola DROID made relevant again with unofficial Jelly Bean update [video] |
| OS X 10.11.1 (El Capitan) File System Deep Directory Buffer Overflow |
| OS X is clearly on the radar of exploit-developers. |
| OS X Software Update to 10.4.5, and now I wonder if I missed one? |
| OS X VPN vuln; XSS from unexpected places; some ramblings on storage |
| Oslo Needs Your Garbage |
| OSU's Microbial Fuel Cell Could Make Waste Treatment an Energy Source |
| OSX Ransomware Spread via a Rogue BitTorrent Client Installer |
| Other Microsoft Updates Released |
| OTN Interview on Youtube |
| Our future cyberdefenders set to face off |
| Our Solar System: Rare Species In Cosmic Zoo |
| Out of cycle oracle patch part II |
| Out of cycle Oracle patch? |
| Out Share! Now it's up to you. |
| Outage on Verio and Level3 |
| Outlook Client Vulnerability and Spring Cleaning |
| Outlook Express Weakness / Solaris Apache Bug / Winamp Exploitation / Translations / End of Internet / Social Engineering Story |
| Out-of Order Java Update |
| Out-of-Band iOS Patch Fixes 0-Day Vulnerabilities |
| Outrage In India Over Arrests For Facebook Posts |
| Out-Share or Die! |
| Over $24 billion Dollars at Risk of Theft from Spyware in US Alone |
| 'Over half' of Android devices have unpatched holes |
| Over the Antarctic, the Smallest Ozone Hole In a Decade |
| Overview of the WMF related articles at the ISC |
| Oxy-morons |
| Oz gov cyber-safety unit mislays user information |
| Oz states count cars using Bluetooth |
| Pacemakers, defibrillators open to attack |
| Packet Analysis Challenge |
| Packet Analysis Challenge: The Solution |
| Packet Capture Options |
| Packet Challenge: Fragments and a Blast from the Past |
| PacketFence 3.5.0 adds new web-based configurator |
| Packet-Filtering Malware;XMLRPC Vulnerabilities;phpBB highlight vulnerability;Fake MS Bulletins |
| Pain reliever with serious side effects |
| Pakistan Boycotting Call of Duty</em>, Medal of Honor</em> Games |
| Palo Alto Networks courts investors with $175 million IPO |
| Palo Alto Networks expands product range, partners with VMware |
| Panic Storm Over MS04-028 Reaches Category 4, Mozilla Responds With Vulnerabilites Of It's Own! |
| Panix DNS Hijack; tcp/3306 Increase; Osama Captured SPAM;Wireless Thoughts |
| Paragon Software releases a free image backup software for Windows 8 and Server 2012. |
| Parallella: an Open Multi-Core CPU Architecture |
| Parcel Sensor Knows When Your Delivery Has Been Dropped |
| Parents and Computers |
| Parents withdraw from inquiry into death of U.S. engineer Shane Todd |
| parishilton.scr |
| Parliamentary report details German police snoop-spend |
| Particle Physicists Confirm Arrow of Time Using B Meson Measurements |
| Partisan Food Fight Erupts Over NASA, Commercial Space |
| Passive OS Fingerprinting Update |
| Password Buddies: A Better Way To Reset Passwords |
| Password Reuse Remains a Danger After Living Social Breach |
| 'Password' Tops List of Worst Passwords of 2012 [VIDEO] |
| Patent System Not Broken, Argues IBM's Chief Patent Counsel |
| Patent Troll Goes After Facebook, Apple, Microsoft, Yahoo, IBM, Others |
| Path iOS app now hashes address book data |
| Path-conversion weakness in major AV products reported |
| Patch day fallout minor, Sun Java updates, and What to do about Windows NT? |
| Patch management still big stumbling block in risk management, survey shows |
| Patch Mozilla ASAP |
| Patch often: Cyber-crim toolkits love stinky old gaping holes |
| Patch Refresher; MS05-038 Issues |
| Patch reminder |
| Patch Tuesday deja vu: Adobe patches Flash ... again |
| Patch Tuesday Fallout |
| Patch Tuesday' is tomorrow - Continued FTP Scans |
| Patch Tuesday Warmup: Internet Explorer Sunset and Windows XP Embedded End of Support |
| Patching in 2 days? - "tell him he's dreaming" |
| Paul Ryan's Record On Science and Government |
| Paypal Phishing landing pages hosted at HostGator |
| Paypal scam site using SSL spotted |
| PayPal To Replace VMware With OpenStack |
| PayPal Unveils New Android SDK, Available To US Developers May 15 |
| PCI Compliance |
| PDF + maldoc1 = maldoc2 |
| PDF vulnerabilities |
| Pedagogical Bundle Lets You Pay What You Want For Educational Software |
| Pedro's Malware Analysis Quiz |
| peercast update and exploit |
| Pentagon nod shows Android can be as secure as BlackBerry |
| Pentest Time Machine: NMAP + Powershell + whatever tool is next |
| People - Greatest Asset and Biggest Vulnerability |
| Peppers Seem To Protect Against Parkinson's |
| Performing network forensics with Dshell. Part 1: Basic usage |
| Periodic reminder of best practices for cleaning up after infection. |
| Perl bot exploiting vulnerabilities in Joomla and Mambo components |
| Perl/Exploit SQLinject; Increased Activity on Port 1039 |
| Persistent router botnets on the horizon, researcher says at Defcon |
| Personal Disaster Recovery |
| Pervasive Wireless Means Persistent Frustrations |
| PETA Wants To Sue Anonymous HuffPo Commenters |
| Petition For Metric In US Halfway To Requiring Response From the White House |
| Pharming and Phishing Attack; Mailbag |
| Phatbot and stealthy polymorphic Alphabot Soup, ISS Product ICQ parsing vuln. |
| PhatBot exploiting LSASS? |
| Phatbot/Agobot/Gaobot; More on MS SSL exploit; Mailbag |
| Phederal Phishing Offenses (FBI and a Census report) |
| Phil Zimmermann's New App Protects Smartphones From Prying Ears |
| Philippines accuses 16 Taiwanese of retiree scam |
| Phishers Don't Like Monday |
| Phishers use urlencoding to obfuscate hostnames |
| Phishes, Phlaws and Phurther Network Phollies |
| Phishing and Spamming via IM (SPIM) |
| Phishing arms race |
| Phishing by proxy |
| Phishing for Payroll with unpatched Java, (Sun, Aug 5th) |
| Phishing Messages May Include Highly-Personalized Information |
| Phishing via NFC |
| Phishing/spam via SMS, (Wed, Aug 22nd) |
| Phishing: Saudi style |
| Phlooding newest marketing phabrication; Call for ph-words |
| Phollow the Phlopping Phish |
| Phone, phablet and tablet. Whats next? |
| Phony version of Bad Piggies installs malware; 82,000 victims so far |
| php - a defacement file information request |
| PHP - shared hosters, take note. |
| PHP 5.1 update with several security fixes |
| PHP 5.1.1 released |
| PHP 5.x Security Updates |
| PHP and phpBB releases |
| php boxing continues |
| php icalendar vulnerability |
| PHP Notes |
| PHP patches - see http://www.php.net/ChangeLog-5.php - fixes CVE2013-2110, (Fri, Jun 7th) |
| PHP Security Update |
| PHP security: the scene might change |
| PHP Vulnerabilities |
| PHP Worm, Winace exploit, new toys |
| PHP |
| PHP/BackDoor.gen |
| PHP: time to upgrade! |
| phpAdsNew log items, vulnerabilities, fix and patch information |
| phpBB <= 2.0.17 exploit code in the wild |
| phpbb 0 day worm or just too many unpatched boxes? |
| phpBB 2.0.19 released |
| phpBB 2.0.20 upgrade time |
| phpBB 2.0.21 |
| phpBB 2.0.22 - upgrade time |
| phpBB bots/worms |
| Phpbb include vuln scanning, via Google, generating new IRC botnet |
| phpBB Problems Continue, Ethereal Update Released, FTC Shuts Down Fake Anti-Spyware Vendor |
| PHPbb Scanning; Information Leaks; Usenix Paper |
| phpBB Update; Potential IE Vulnerability; Update Rollup for Win2k; Updated Package Installer for WinXP |
| phpBB worms continued; Phishing; Spyware from the developers point of view; New server |
| phpMyChat scan |
| Phpworm and awstats yet... / Bright Tuesday / Last diary personal poll |
| Physicists Attempting To Test 'Time Crystals' |
| Physicists Create Quantum Link Between Photons That Don't Exist At the Same Time |
| Physicists Propose "Perpetual Motion" Time Crystals |
| Piecemeal patches from QNAP |
| Ping floods at multiple sites |
| Pinging All The Way |
| Pirate Bay Documentary Film Now Available On TPB |
| Pirate Bay site sinks, Swedish police raid its ISP |
| Pirates and Patches blackhat censorship? IPsec vulnerabilies adding up; Ethereal vulerabilities; Who's SAPing you |
| Pirates of the Caribbean: the Pirate Bay Moves To Island of Sint Maarten |
| Piriform Asks BleachBit To Remove Winapp2.ini Importer |
| PlaceRaider Builds a Model of Your World With Smartphone Photos |
| Planetary Resources To Build Crowdfunded Public Space Telescope |
| Plans For Widespread Monitoring of Communication In Europe Revealed |
| Plaxo online address book service warns of security breach |
| Play time: Built a DB2 Wordle |
| Playing With Sandboxes Like a Boss |
| Please enter a headline here, (Tue, Oct 16th) |
| Plesk 0-day: Real or not?, (Fri, Jun 7th) |
| Pligg CMS 'status' Parameter SQL Injection Vulnerability |
| Plugin auto-installation a good thing? |
| Plug-in pwning challenge brings Pwn2Own prizes to $US560k |
| PnP Worm out; More on the current Veritas vuln; Microsoft Update and Win 2K3 w/o SP1; new gaim version |
| PoC for local elevation of privilege on Windows 2000 SP4 upwards |
| Pod2g Confirms IOS 6, IOS 6.1 Beta 4 Untethered Jailbreak |
| Podcast Interview with Marty Roesch |
| Poetry attack? |
| Poking Holes In Samsung's Android Security |
| Police agency: 3,600 crime gangs active in EU |
| Police arrest suspect in BIGGEST DDoS ATTACK IN HISTORY |
| Police Raid Home of 9-Year-Old Pirate Bay User, Seize "Winnie the Pooh" Laptop |
| Poll-Based System Predicts U.S. Election Results For President, Senate |
| Poor training blamed for hospital losing unencrypted USB sticks |
| PopAdStop.com Scanning Component |
| Popular Android Anti-Virus Software Fooled By Trivial Techniques |
| Popular Android ROM Accused of GPL Violation |
| Porn is Evil; Workarounds vs Patching; Hopster; SSH Scans; phpBB Issue; Darwin was Right |
| Porn portal's user database open and accessible on the net |
| Port 10 traffic; 139 &1433 report; DCE RPC Vectors |
| Port 10000; ssh brute forcing; yet another bagle? |
| Port 1025 increase, MS04-11 update problems |
| Port 1025/6000 Action (Part II) |
| Port 1026-1031 increase |
| Port 1026-1031 update |
| Port 1070, Dumaru Worm, Email Disguised as Microsoft Patch |
| Port 1080, 3127 and 3128; Apache-SSL Optional Client Certificate Vulnerability |
| Port 113 - Korgo worm variants |
| Port 12345 / NAT fingerprint |
| port 135 spikes, Lovegate, Welchia.K, Mailbag, Unix Security |
| Port 135 Traffic Increase Due To Bobax.C |
| Port 13701 spikes |
| Port 13722 hacktool log scan report- NetBackup clients and servers - Did You Patch? |
| Port 1433 TCP scanning is up!; Firefox 1.0.6 available - Critical Update; MySQL patches zlib remote vuln; Glitch in The Matrix - Port 2100; One RingTone to Rule Them All?; SlimFTPd vuln PoC released; |
| Port 16191 fragment update, mail server dictionary attack, top 10 signs that you are infected |
| Port 2000 spike; New IIS PCT exploit?; Following the bouncing MS patches |
| Port 20168, Windows Update Virus. |
| Port 32000 spike, got packets? |
| Port 37777 "MapTable" Requests |
| Port 38566, Update to Firefox weakness, Packetfoo site launched! |
| Port 39999; Possible Vesser/W32.HLLW.Deadhat activity |
| Port 41523; Linux Exploit; Phishing Name server; New Feature: tcp %; ssh attacks; MSRC blog |
| Port 42, New Old Patch, Scams |
| Port 5000 increase due to two worms: Bobax and Kibuv |
| Port 5000 Traffic Continues; Fragmented tcp/16191 Update |
| Port 51616 - Got Packets?, (Sun, May 19th) |
| Port 53 Back on the Radar |
| Port 533 spike; Planned maintenance completed; Java WebStart Cross Platform Vulnerability, cont. |
| Port 554 increase, Solar flare activity continues |
| Port 559 and 65506 |
| Port 6346 increase; Mail bag: trojan Win32/Small.AR; SSH Advice for Repeated Hack Attempts |
| Port 6346; Improved Signature for Trojan Win32/Small.AR; Clarification on SSH Advice for Repeated Hack Attempts |
| Port 7212 spike |
| Port 7547 SOAP Remote Code Execution Attack Against DSL Modems |
| Port 80 traffic: Sources Increase |
| Port 80 UDP Malware |
| Port 8008; Quiet Day, Thanks!; Money-Back Guarantee; Follow the Bouncing Malware VII: All That Glitters Is Not Gold |
| Port 8181 update; Trojan.Comxt.B; Mail Bag |
| Port 8443 Spike |
| Port 8555 and 2967 activity |
| port 901 surge |
| Port Scanners: The Good and The Bad |
| Portal</em> Now Available On Linux |
| Possibility for disaster?; Preparing for a storm |
| Possible Fake-AV Ads from Doubleclick Servers, (Mon, Nov 5th) |
| Possible GNU Strings Denial Of Service Vulnerability |
| Possible IM attack gearing up. |
| Possible MSIE Zero-Day; Analysis of Zotob versions; Why are we still Green; |
| Possible NetDevil Scanning, RH Linux 7.1, 7.2, 7.3 and 8.0 End-of-Life |
| Possible new multi-exploit bot or worm (request for information), Rose IP Fragmentation, Scammers making use of backdoored machines |
| Possible new wave of worms, TCP reset tool for Windows released, New IIS 5 SSL Remote Root Exploit - patch now. |
| Possible New Zero-Day Exploit for Realplayer |
| Possible Patch Problems |
| Possible Problem with MS05-050 Patch |
| Possible Qmail Vulnerability / KDE vulnerability / New SoBig wave ?/ and more... |
| Post Mortem of GunnAllen IT Meltdown |
| Post-ACTA Agreement CETA Moving Forward With Similar Provisions |
| Postcard.exe - Let the mutations begin |
| postcard.exe |
| postcard.gif.exe; virus numbers!; IE7.beta warez bugged; Black Tuesday: be prepared |
| PostgreSQL updates close security holes |
| Postini Spam Filter |
| Posts by hacking group activist rankle authorities |
| Potential New AOL Chait Virus |
| Potential Patch Problem with MS06-025 |
| Potential phpBB Hack Coming? |
| Potential Risks of Personalized Portal Start Pages |
| Power Outage Impact - Nachia Worm - Sobig F |
| Power Problems Force Seattle To Throttle City Data Center For Days |
| Powerpoint Vulnerabilty and MalCode Review |
| Powerpoint, yet another new vulnerability |
| Powershell and HTTPS ? It Ain?t All Rainbows And Lollipops! (or is it?) |
| Powershell Malware - No Hard drive, Just hard times |
| PPM, ALM and Governance |
| Precautions to avoid Outlook PST Password Loss |
| Predicting Microsoft |
| Prediction Market Site InTrade Bans US Customers |
| Pre-election phishing spike blasts Iranian Gmail accounts |
| Prepaid iPhone sales exploded in Q1 |
| Preparing for Battle |
| Preparing for Feb 3rd(CME-24) |
| Press, Bloggers Fall For iPhone Cup Holder 'Joke' |
| Pretty Quiet Day |
| Preview of Synaptics's Next Generation Input Devices |
| Preview! Def Con Documentary Sneak Peek Online |
| Preying on Users After Major Security Incidents, (Sun, Jun 10th) |
| Prime Surrogates for Demented Denormalization |
| Printer Hacking for Fun and Profit |
| PRISM snitch claims NSA hacked Chinese targets since 2009 |
| Privacy Advocates Frustrated By FCC's Decision on Google Street View |
| Privacy advocates slam Google Drive's privacy policies |
| Privacy group calls for new hearings on Google Street View snooping |
| Privacy groups launch protest against CISPA bill |
| Pro Oracle SQL, A Review And More |
| Probable php shell/web defacement tool usage on the rise |
| Probes for Cisco Web Interface |
| Problem in IE Patch?; Mailbag |
| Problem with Trend Micro Virus Sig 594; Trojan Vundo; Update on Problem with MS05-019; Phishing Site?; DNS Poisoning |
| Problems with Bloodhound.Exploit.45 pattern in Symantec AV |
| Problems with Intel wireless drivers |
| Problems with Java and internet proxies solved |
| Problems with MS patch KB913446 (for the IGMP issue, MS06-007) |
| Process Pushing with a View for Performance Improvement |
| Profiling SSL Clients with tshark |
| Programs That Request A Lot Of Contiguous Memory May Fail After Security Update Is Applied |
| Project Lifecycle Governance (PLG) vs. Project Lifecycle Management (PLM) vs. Application Lifecycle Management, (ALM) |
| Project Management Lite: Intro to Code-based Estimating |
| Project Orca: How an IT Disaster Destroyed Republicans' Get-Out-The-Vote Effort |
| Project To Turn Classical Scores Into Copyright-Free Music Completed |
| Proof of Concepts, engine for innovation |
| Proposed US cyber security bill criticised |
| Prosecutors to question Manning in WikiLeaks case |
| Protecting Powershell Credentials (NOT) |
| Protecting Users and Enterprises from the Mobile Malware Threat |
| Proteins Made To Order |
| ProtonMail Back Online Following Six-Day DDoS Attack |
| pseudoDarkleech Rig EK |
| Psst: Heard the one about the National Pupil Database? Thought not |
| PSVita Hacked, Native Homebrew Loader Coming Soon |
| Public release of exploits against the windows help system |
| Public vs. private cyberattack responsibility debate heats up |
| Pump and Dump' Spam Messages |
| Purported Relativity Paradox Resolved |
| Push your cloud supplier to participate in CSA STAR |
| Pushdo botnet's smokescreen traffic hits legitimate websites |
| PUT requests and Using Web Server Logs, trillian exploit, sudo exploit. |
| Pwnie Express Releases Pwn Pad Ahead of Schedule |
| PWS Bankers 2.0 |
| Pwstealers - evolution |
| py2exe Decompiling - Part 1 |
| Python Gets a Big Data Boost From DARPA |
| Python updates for hash collison DoS problems |
| Python updates for hash collison DoS problems - Update |
| Quadcopter Drone Network Will Transport Supplies For Disaster Relief |
| Quantum computing is here! But does it run Linux? |
| Quantum Cryptography Conquers Noise Problem |
| Quantum Key Exchange With an Airplane |
| Quantum Measurements Leave Schrödinger's Cat Alive |
| Qubes OS bakes in virty system-level security |
| Querying the DShield API from RTIR |
| Quick Analysis of a Recent MySQL Exploit |
| Quick Audit of *NIX Systems |
| Quick Launch toolbar spyware (1 Comments) |
| Quick plug: Netcat in the Hat |
| Quicktime patches for Mac and Windows |
| Quicktime upgrade time |
| Quiet day for incidents, IRC channel for discussion |
| Quiet Day; U.S. CERT Summary; Scott's Toolkit for Windows |
| Quiet Day;TCP/443; Firefox GIF image handling heap overflow exploit; MS javaprxy.dll update |
| quiet holiday weekend |
| Quiet Weekend - not much news |
| Qwest having problems? |
| QWest Problems |
| R and the Pirates |
| R, SQL and Data Munging and Sculpting |
| R, SQL and the Predicate |
| R, SQL and the Rosetta Stone |
| R, SQL*PLUS, and Startup Scripts: Fortunate For The Forgetful |
| Radare2: rahash2 |
| Rails developers close another "extremely critical" flaw |
| Rails updates to 3.2.13 to close denial of service and XSS holes |
| Ralph Nader Moderates One Last 3rd-Party Debate for 2012 |
| Random stuff from the mailbag |
| Random thoughts for a quiet Sunday |
| Ransom32: The first javascript ransomware |
| Ransomware & Entropy |
| Ransomware & Entropy: Your Turn |
| Ransomware & Entropy: Your Turn -> Solution |
| Ransomware Operators Cold Calling UK Schools to Get Malware Through |
| Rant-of-the-day: on the dangers of orphaned software (the dark side of open source) |
| RapidShare Urges US To Punish Linking Sites and Not File-Sharing Sites |
| Rare Earth Elements Found In Jamaican Mud |
| Rare Form of Autism Could Be Curable With Protein Supplements |
| Rare Water-Rich Mars Meteorite Discovered |
| Raspberry Pi As Hardware Backdoor |
| RAT-flingers target human right activists in watering-hole attack |
| Raw Sockets; Trend 594 Update; Mac Trojan & More |
| Ray Harryhausen, Visual Effects Master, Dies Aged 92 |
| Reader Report from Botnet Master Christopher Maxwell's sentencing |
| Reader's Diary and Update of Windows XP: Surviving the First Day |
| Reader's tip of the day: ratios vs. raw counts |
| Reading and Calculating With Your Unconscious |
| Real Player critical patch for two vulnerabilities |
| RealPlayer (et al) vulnerabilities & Joomla/Mambo Worm |
| RealPlayer Patches, DejaVu & some Mailbag Contributions |
| RealServer Vulnerability, Exploit and Scans |
| Real-Time Cyber-Attack Map |
| Real-Time Fact Checking With "Truth Teller" |
| Real-Time Gmail Spying a 'Top Priority' For FBI This Year |
| Realtors Be Aware: You Are a Target |
| RealVNC 4.1.1 authentication bypass vulnerability reported |
| RealVNC exploits in the wild |
| RealVNC Exploits |
| Recent Apple Java Update Doesn't Fix Critical Java Flaw Claims Researcher |
| Recent Conference Keynote |
| Recent Developments in Password Cracking |
| Recent example of KaiXin exploit kit |
| Recent spike in port 53 activity |
| Recent trends in Nuclear Exploit Kit activity |
| Recent Two factor authentication attacks |
| Recommended Block List |
| Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs |
| Recovering Data From Broken Hard Drives and SSDs (Video) |
| Recovering LOST files from a hardrive |
| Red Alert: Potential loss of data for DB2 v10 users on z/OS 1.12 and 1.13 releases |
| Red faces as Pentagon leases Chinese satellite |
| Red Light Cameras Raise Crash Risk, Cost |
| Red peril paranoia hits Twitter |
| Red Team Tools Updates: hashcat and SpiderFoot |
| Redhat Kernel Packages (one AMD64 CVE security item), Bagel AV Vendor Summary |
| Redmond probes new IE 8 vulnerability |
| Reducing False Positives with Open Data Sources |
| 'Regular' PS3 gamers who've cancelled credit cards? You FOOLS! |
| Regularly scheduled MS updates |
| Regulation of facial recognition may be needed, US senator says |
| Reimagining Cisco: You Aren't a Box Seller |
| Rejected Papers Get More Citations When Eventually Published |
| Relay reject woes |
| Reminder about MS06-025 |
| Reminder: Daylight Savings Ends Sunday At 02:00 |
| Reminder: Slashdot Anniversary Meetups, Free T-Shirts |
| Remote Admin Tools May Not Be Clever Enough For Their Own Good |
| Remote Diagnostics with PSR, (Fri, Nov 9th) |
| Remote DoS in Firefox 1.5.0.7 and Firefox 2 |
| Remote DoS released targets Windows Firewall/Internet Connection Sharing (ICS) service component |
| Remote Network Access: 10 Signs Its Time to Deploy Updated Control Software - Enterprise Networking - News & Reviews - eWeek.com |
| Remotely Exploitable CodeGrrl PHP Products File Inclusion Vulnerability |
| Replacing Alice and Bob |
| Report claims Chinese hackers are working for government |
| Report Child Porn |
| Report of possible Malware coming from Chinanet |
| Report: DDoS attacks now MORE ANGRY, complex and targeted |
| Report: Dutch government was unprepared for SSL hack |
| Report: China IP theft now equal in value to US exports to Asia |
| Report: iOS vulnerability sold for $250,000 |
| Report: IPv6 sees first DDoS attacks |
| Report: Plans for Australia spy HQ hacked by China |
| Reported Shockwave issue with Myspace.com |
| Reports of Bots exploiting pmwiki and tikiwiki |
| Reports of Excel 0-Day |
| Reports of multiple OS X vulnerabilities with PoC |
| Reports of Other DDos Attacks Taking Place |
| Reports of web forums running Invision Power Board being compromised |
| Reports on IE exploit |
| Republican filibuster blocks Senate Cybersecurity bill |
| Republican senators introduce their own cybersecurity bill |
| Request for AIM IDs Involved with GDI Exploits; GDIscan Tutorial |
| Request for Data |
| Request for Help, OOB Chat Room Keeps London Working During Attack |
| Request for packets 50032 |
| Request for Packets TCP 4786 - CVE-2016-6385 |
| Research Discovery Could Revolutionize Semiconductor Manufacturing |
| Research lab extends host-based cyber sensor project to open source |
| Research on a Fraudulent site |
| Researcher Claims To Have Chrome Zero-Day, Google Says "Prove It" |
| Researcher creates proof-of-concept malware that infects BIOS, network cards |
| Researcher releases exploit code that can allegedly crash pcAnywhere |
| Researcher to demonstrate feature-rich malware that works as a browser extension |
| Researcher: 200,000 Windows PCs vulnerable to pcAnywhere hijacking |
| Researchers Build Objects With 3D Printing Using Simulated Moon Rocks |
| Researchers Create Short-term Memories In Rat Brains |
| Researchers Create Vomiting Robot To Analyze Contagions |
| Researchers Demonstrate 3D Spy Trojan for Mobile Phones |
| Researchers Devise New Attack Techniques Against SSL |
| Researchers Lift Lid on Government-Distributed Cyber-Spy Trojans |
| Researchers Mine Old News To Predict Future Events |
| Researchers Use Lasers For Cooling |
| Researchers warn of cyber flaws in Honeywell control systems |
| Researching Information Security Issues |
| Resistance against US cyber security act is growing |
| Resolution(s) For The New Year |
| Resolving erratic behavior of an Oversized PST using advanced PST File Splitter tool |
| Resources: Windows Auditing & Monitoring, Linux 2FA |
| Results vs. Relationships - Finding Your Balance on the Seesaw |
| Reuters staffer accused of aiding hackers maintains innocence -lawyer |
| Reuters staffer accused of aiding hackers maintains innocence: lawyer |
| Reuters suffers double hack |
| Reuters suffers second hack this month |
| Revealed: Chrome Really Was Exploited At Pwnium 2013 |
| Reverse Cross-Site Request (RCSR) vulnerability |
| Review: Google Compute Engine |
| RFC 6598 - Carrier Grade NAT |
| RFC2142 is a two-way street |
| RFP criteria for how to build an agile data infrastructure |
| Rhombus Tech A10 EOMA-68 CPU Card Schematics Completed |
| RIAA says Google piracy policies are lacking |
| Rick Kelly: Value focus |
| Rig Exploit Kit from the Afraidgate Campaign |
| Richard III Suffered an Ignominious Burial, Researchers Find |
| Risk... in the most obscure places |
| Risks of boomerangs a reality in world of cyberwar |
| Risks on the Rise: Making a Case for IT Disaster Recovery |
| Riverbed, 6connect, Ixia Unveil New Products, Services at Interop |
| Robot Learning To Recognize Itself In Mirror |
| Robot Serves Up 360 Hamburgers Per Hour |
| Robot Snake Could Aid Search and Rescue Operations |
| Robot Snakes To Fight Cancer Via Natural Orifice Surgery |
| Robotic Bartender Assembles Your Drink, Monitors Alcohol Consumption |
| RockBox + Refurbished MP3 Players = Crowdsourced Audio Capture |
| Rocket boffinry in pictures: Gulp the Devil's venom and light a match |
| Rogue US Airways-themed emails distribute ZeuS-based malware |
| Romanian authorities dismantle hacker group targeting government websites |
| Romney Campaign Accidentally Launches Transition Web Site |
| Rootkit Findings |
| Rootkit infects Linux web servers |
| Root-Level Exploit for OSX LaunchD Service |
| Rough Roving: Curiosity's Wheels Show Damage |
| Rover Finds Ancient Streambed On Martian Surface |
| Rover Fuel Came From Russian Nuke Factory, But Supplies Running Low |
| Royal Canadian Air Force Sees More Sims In the Future of Fighter Pilot Training |
| RPC DCOM Update |
| RPC DCOM Update: sdbot variant |
| RPC DCOM WORM (MSBLASTER) |
| RSA Conference 2012 sneak peek: cloud, big data, and mobile |
| RSA Conference 2012: Former NSA director says secure clouds can't come fast enough |
| RSA Conference 2012: Stress and burnout in infosec careers |
| RSA teams to bolster security for Apple, Google, RIM devices |
| rtfdump |
| RuggedCom fails key management 101 on Rugged Operating System (ROS), (Tue, Aug 21st) |
| Rumors about IIS 6.0 issues |
| Running InfoSphere Software in a Virtual Environment without ILMT May Cost you Millions |
| Russian botnet operators infected 6 million computers |
| Russian Cyber Criminal Unmasked As Creator of "Most Successful" Apple Malware |
| Russian EBookseller LitRes Gets Competing EBook Apps Booted From Google Play |
| Russian charged with hacking into brokerage accounts |
| Russian malware spies on US ATMs |
| Russian start-up claims BitTorrent-killer |
| Russian Univ. Launches Course Based On ReactOS Led By Alex Bragin |
| Russian upstart claims BitTorrent-killer |
| Russia's Former KGB Invests In Political Propaganda Spambots |
| Russia-speaking cybercriminals earned $4.5 billion in 2011, researchers estimate |
| s_ta_ts.js, anyone? |
| Sacre Bleu! US fingered for Flame attack on Élysée Palace |
| Safari 5.1.7 - an interesting feature, (Thu, May 10th) |
| Safemode rootkit & DRM |
| Safer Online Shopping Guide |
| Samba - Buffer Overrun, HP Remote Command Execution, Top 15 Worms, Hosts File, Sasser/Dabber Activity |
| Samba security patch fixes critical remote code execution hole |
| Samba vulnerability, Veritas BackupExec vulnerability, PowerPoint attachments, and some light reading. |
| Sample needed - of Spybot.ZIF, which scans for vulnerable Cisco Routers |
| Samsung Claims iPad Mini, iPad 4, New iPod Touch Also Infringe Patents |
| Samsung May Start Making ARM Server Chips |
| Samsung network printer vulnerability discovered |
| Samsung Opens New Apple Store In Australia |
| Samsung opens new R&D facility in Nokia's backyard |
| Samsung printers have secret admin account |
| Samsung Unveils the Galaxy S4 |
| Samsung will issue fix for security hole in printers |
| Samsung: Android's Multitouch Not As Good As Apple's |
| Samsung? BlackBerry? Who Will Win the Containerization Wars? |
| San Diego Zoo Creates Biomimicry Incubator |
| Sandia Lab Fires Up 300,000 Virtual Android Devices To Test Out Security |
| SANS 2006 |
| SANS Boston 2008 |
| SANS Industrial Control Systems (ICS) Security Training is coming to Houston! |
| SANS Institute Announces Annual Security East Training Event in New Orleans featuring SANS Technology Institute's ... |
| SANS Institute to Offer World-Class Information Security and Computer Forensics Training at SANS Secure Singapore 2013 |
| SANS Institute to Offer World-Class Virtualization and Private Cloud Security Training at SANS October Singapore 2012 |
| SANS ISC (once again) and Microsoft - Flatten Compromised Systems |
| SANS ISC presentation in Brazil |
| SANS ISC Receives Award |
| SANS Network Security 2007 -- Vegas |
| SANS offering TREATS too. |
| SANS Survey Results Announced: Mobility Policy in the Enterprise |
| Sans Top 20 - 2004 - How does it compare to 2003 Top 20; Microsoft ASP.NET ValidatePath Module; IRC Botnet Servers |
| SANS Top 20 Spring Update |
| SANS Top 20 Update |
| SANS/ISC Webcast; MS05-017 Exploit; They're Baaaaaack...; Follow the Bouncing Malware : A Fresh Bounce (Updated: 22:30 GMT) |
| SANSFIRE 2006 |
| SANSFIRE: Internet Storm Center Training Event |
| SANS's Alan Paller discusses the threat of cyberterrorism on CNN, (Sun, Apr 28th) |
| Santa IM Worm (bot) update |
| Santa IM Worm |
| Santy Variant?; Year End Poll |
| SAP GUI DLL Loading Arbitrary Code Execution Vulnerability |
| SAP NetWeaver Portal as SAP GRC 10.0 Front-End |
| Saudi Arabia Blocks Viber Messaging Service |
| Saudi Aramco Reveals Cyber Attack Hit 30,000 Workstations |
| SAV botnet revival ? |
| sav worm and its cc |
| SAV Worm Update |
| Save the Web From Software Patents |
| SC gov. admits hacking errors; revenue chief quits |
| SCADA kit has hidden factory account, password |
| SCADA security is better and worse than we think |
| Scammer tying in on disasters |
| Scanner Identifies Malware Strains, Could Be Future of AV |
| Scanning for Fortinet ssh backdoor |
| Scanning tricks with scapy |
| Scans for CA LM Vulnerability; MSFT Update #1: MS05-002; MSFT Update #2: MS05-015; MSFT Update #3: Malicious Software Removal Tool |
| SCANS, Babel (not Bagel/Bagle/Beagle) & Halloween |
| Scapy vs. CozyDuke |
| Scientific American's Fred Guterl Explores the Threats Posed By Technology |
| Scientists Create New Gasoline Substitute Out of Plants |
| Scientists Develop Sixty Day Bread |
| Scientists Growing New Crystals To Make LED Lights Better |
| Scientists Inducted Into Chemistry "Hall of Fame" |
| Scientists Invent Electronics That Dissolve In the Body |
| Scientists Match Dream Images To Photos |
| Scientists May Have Detected Neutrinos From Another Galaxy |
| Scientists Set Bold Plan For Future Exploration of the Sun |
| Scientists Take Most Accurate Reading Yet of Universe's Cooling |
| Scottish Scientists Create World's Smallest Smart Antenna |
| ScreenOS vulnerability affects Juniper firewalls |
| Script kiddie scavenging with Shellbot.S, (Wed, Sep 19th) |
| Scripting the Unofficial .wmf Patch |
| Scripting Web Categorization |
| Scrum/Agile Now Used To Manage Non-Tech Projects |
| SDBot sniffs, blings |
| SDN Is Business, OpenFlow Is Technology |
| SDN Vendor Comparison Launches |
| SDN: From Slideware to Software in 2013? |
| SDN's Potential in the Data Center and On the WAN |
| Sea Chair Project Harvests Plastic From the Oceans To Create Furniture |
| Seafood Raised on Animal Feces Approved for Consumers |
| Sealed-Box Macs: Should Computers Be Disposable? |
| Searching money, finding exploit |
| Searching Through the VirusTotal Database |
| Seasonal Malwares and other trends |
| Seattle Police Want More Drones, Even While Two Sit Unused |
| SEC staffers used government computers for personal use: report |
| SEC505 DFIR capture script: snapshot.ps1 |
| Secunia Advisory for IE; meeneemee.exe |
| Secunia PSI 3.0 Beta: plugging security vulnerabilities made easy |
| Secure Boot complaint filed against Microsoft |
| Secure Remote Services / MyDoom and IFRAME / MS04-039 revision / ISC Webcast |
| Security Audit Finds Company's Top Dev Outsourced His Work To China |
| Security audit finds dev OUTSOURCED his JOB to China |
| Security audit finds developer OUTSOURCED his JOB to China |
| Security Awareness (from students point of view) |
| Security Awareness and Collaboration |
| Security Awareness for Security Professionals |
| Security boffins say music could trigger mobile malware |
| Security concerns over Firefox's "new tab" thumbnail feature |
| Security damn well IS a dirty word, actually |
| Security Features Nobody Implements |
| Security Firm Mandiant Says China's Army Runs Hacking Group APT1 |
| Security Firm Reveals Weaknesses in DDoS Attack Toolkits |
| Security Fix for Apache |
| Security History Poll Results |
| Security History Poll |
| Security hole in Sudo's debug option closed |
| Security Challenges and Games |
| Security improvements in Opera 12 beta |
| Security in the Cloud Is All About Visibility and Control |
| Security Information on Website |
| Security Infrastructure Market to Top $86 Billion in 2016: Gartner |
| Security Log Retention |
| Security Mailing Lists for Academia |
| Security Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos |
| Security mess sends Kiwi auction site titsup in two days |
| Security Onion 12.04 Beta Released at DerbyCon (plus informational video) |
| Security patches for Mozilla Firefox/Thunderbird/SeaMonkey |
| Security problem in VMware vSphere 5 |
| Security Pros Love Python? and So Do Malware Authors! |
| Security Researcher Finds Critical Flaws in Sophos Anti-Virus Engine |
| Security Researchers Document Wiper Malware`s Disappearing Act |
| Security Talks for portuguese community |
| Security Tip of the day: Handling brute-force login attempts |
| Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone, (Wed, Jan 9th) |
| Security Updates from Microsoft; Multiple Vendors - ICMP Affecting TCP Sessions |
| Security Vulnerability Found On US Federal Government Contractors Site |
| Security vulnerability in NVIDIA's proprietary Linux drivers fixed |
| Security Worker Shortfall is Putting Organizations at Risk |
| Self-Assembling Robots Using Flying Drones |
| Senate committee approves privacy protections for cloud, email |
| Senator Asks FTC to Investigate Google and Apple Over Possible App Privacy Violations (March 5, 2012) |
| Senators propose law to combat cyber theft |
| Sendmail DoS Vulnerability |
| Sendmail Multi-Part MIME Message Handling Denial of Service vulnarability |
| Sendmail vuln |
| September 2015 Microsoft Patch Tuesday |
| Sequoia Supercomputer Sets Record With 'Time Warp' |
| Serious flaw on OS X in Apple Safari |
| Serious Problems With USB and Ethernet On the Raspberry Pi |
| Set up of Risk Terminator in SAP GRC AC 10.0 |
| SETI@Home site problems |
| Setslice Killbit Apps (1 Comments) |
| Seven Tips to Start Your Cloud Due Diligence |
| SHA1 Phase Out Overview |
| SHA-3 Winner Announced |
| Shamrocks and March Madness; Perl bots; MS05-004 update |
| Sharing HBO Go Accounts Could Result In Prison |
| Sharp Warns That It Might Collapse |
| Shellbot |
| Shelley Stewart: Business view |
| Sheryl Sandberg: Facebook's Home App Needs Some Work |
| Should Developers Be Sued For Security Holes? |
| Should Inventions Be Automatically Owned By Your Employer? |
| Should the Start of Chinese New Year Be a Federal Holiday? |
| Should the US Really Limit Chinese-Government Influenced IT Systems? |
| Should TV Networks Put Pilots Online For Judgement Like Amazon Is Doing? |
| SHOUTCAST <= 1.9.4 Vulnerability, Exploit Available |
| Shuttle Endeavour Embarking to Los Angeles Museum |
| Schmidt slams China as world's most prolific hacker |
| Schmidt, Daughter Talk About North Korea Trip |
| Schneier: We Don't Need SHA-3 |
| School Board Considers Copyright Ownership of Student and Teacher Works |
| Sidewalk: Certifications in Business Analysis: CCBA & CBAP from IIBA |
| Sidewalk: Do we really need Business Analysts? |
| Sidewalk: Tablet Wars |
| SIEM is not a product, its a process... |
| Sigcheck and VirusTotal |
| Sigcheck and VirusTotal for Offline Machine |
| Sigcheck and virustotal-search |
| Significant increase on 38566 |
| Silent Drop vs Reject Firewall rules |
| Silent Traitors - Embedded Devices in your Datacenter, (Mon, Feb 25th) |
| Silicon Valley's Dirty Little Secret: Age Bias |
| Silly PuTTY; crime pays; if it quacks like a duck get the orange sauce. |
| Simple Way to Recover Password of MS Outlook or Outlook PST File |
| Simulation Using LRO Data Shows More Locations With Ice on the Moon |
| sinFP-2.03 release |
| Singapore allows pre-crime strikes against online crooks |
| Singapore inquiry into U.S. engineer's death to start in May |
| Singapore police to share evidence with FBI on engineer's death |
| Singaporeans get hard token baked into credit card |
| Singer Reportedly Outbids NASA for Space Tourist's Seat |
| Single NFC bonk subjugated Samsung Galaxy SIII and slurped it out |
| Siri's Creator Challenges Texting-While-Driving Study |
| Site Updates: ISC/DShield API and ipinfo_ascii.html Page |
| SKorea misidentifies China as cyberattack origin |
| SKorea ready for more cyberattacks; banks recover |
| Sky News Google Play page defaced |
| Skype Disables Password Reset Function After Security Scare |
| Skype for Linux hotfix plugs security hole |
| Skype hits back at angry wiretap reports: Rat finks? Not us |
| Skype investigates tool that reveals users' IP addresses |
| Skype Worm Spreads Ransomware, Botnet Links |
| Skype 'worm' whinnies... |
| Skype worm |
| Skype; Grepping Weblogs; COAST; ISTS News |
| Slackware 14.0 Arrives |
| Slashdot Asks: SATA DVD Drives That Don't Suck for CD Ripping? |
| Slate's Mini-Biography of Aaron Swartz |
| SLOTH, attack on TLS using MD5 |
| Slow day |
| Slow Sunday; CA Message Queuing Vulns; Process Explorer Vuln; Infocon: Green Redux |
| Small Results With Big Indexes |
| Smart meter hack framework goes open-source |
| Smart TVs riddled with DUMB security holes |
| Smartest Light Bulbs Ever, Dumbest Idea Ever? |
| Smart-Grid Control Software Maker Hacked |
| Smartphone 4Q sales rise 36 pct led by Samsung |
| Smartphones overtake 'dumb' phones worldwide |
| Smoothing MODEL, K? |
| Smooth-Talking Hacker Remote-Wipes Reporter's iPad, MacBook |
| Sniffer tool displays other people's WhatsApp messages |
| Sniffers in Perl?!? |
| SNMP Issues in Cisco Routers; Vulnerability Issues in TCP; SANS Top-20 Call for Experts |
| SNMP Pwn3ge |
| Snort 2.4.2 Released |
| Snort BO pre-processor Vulnerability |
| Snort BO status update |
| Snort bypass vulnerability |
| Snort Denial of Service Vulnerability |
| Snort Rule released on BleedingSnort for the Windows Javascript vulnerability |
| Snort rule update |
| Snort rulez management |
| Snort Sig for MS06-040 |
| Snort signature and standalone detection tool |
| Snort Sigs for MS06-042 and ICMP tunnel mentioned in Diary |
| Snort URL evasion vulnerability patched and version 2.6.0 available |
| Snow Leopard users most prone to Flashback infection |
| So many devices, so little policy |
| So what passwords are those ssh scanners trying?, (Tue, May 14th) |
| So you broke our encrypted files? Ha! They were DOUBLY encrypted |
| So, what causes recession? |
| So, when is a security advisory, not a security advisory? |
| Soap Boxing |
| Sober Virus (CME-151) |
| Sober, Bagles, and Mytobs ad nauseum... |
| Sober.I is on the go; Quiet day on the net |
| SoberD@MM from spoofed Microsoft email addresses, new version of Netsky |
| SoBig Virus Update |
| SOBIG.F |
| Sobig-F and Nachia update |
| Sobig-F hybernation |
| SOC Resources for System Management |
| Social Commerce Is Future of Electronic Commerce |
| Social Media, Companies and Data Volumes |
| Social Networking Security in the Workplace |
| Social Networking Sites- An Educational Tool |
| Socialite's climb halted by unfolding scandal |
| SoftBank would appoint "security director" to Sprint board |
| Software DEP Classified Script 2.5 SQL Injection Vulnerability |
| Software exploits dropped to new low in 2011, says IBM X-Force |
| Software Patches, Nortel, User Privacy Top Week's Security News |
| Solaris 9 in.ftpd security flaw |
| Solaris telnet/rlogin cont.; Timezones; DNS queries |
| SolusOS Forks Gnome 3 Fallback Mode |
| Solution to the TCP 1433 Traffic |
| Some Android phones can be reset to factory default by clicking on links, (Wed, Sep 26th) |
| Some more 0-days from ZDI |
| Some password advice |
| Some Smart Meters Broadcast Readings in the Clear |
| Some tools updates |
| Some useful volatility plugins |
| Somebody, Probably Anonymous, Hacked the Fed During the Superbowl |
| Something new on Telnet? |
| Sony Announces 'Superslim' PS3 |
| Sony Announces the PS4 |
| Sony cuts sales target for cameras, smartphones for 2014-15 |
| Sony DRM Rootkit to be removed automatically by Microsoft |
| Sony Fined $390K in U.K. for 2011 PlayStation Network Data Breach |
| Sony mobile customers emails, names hacked in China |
| Sony PS Vita exploit opens the door for unauthorized apps, piracy |
| Sony redo of PlayStation Store links games, movies |
| Sony to assess spin-off plan; cuts targets for cameras, smartphones |
| Sony To Make Its Last MiniDisc System Next Month |
| Sony Touts 25 Hour Battery Life For Haswell-Equipped Vaio Pro |
| SOPA, PIPA, Anonymous: Can I have a little hope? |
| Sophos buys mobile device management vendor Dialogs |
| Sophos dangles free Android antivirus to tempt BYOD-friendly biz |
| Sophos false positives on Mac OS X |
| Sophos Reveals the "Dirty Dozen" |
| Sourcefire VRT MS-WORD 0DAY recommendations, Rules and tool Advisory |
| South Carolina tax chief resigns after taxpayers hit in cyber attack |
| South Korea Backtracks On China As Source of Cyberattack |
| South Korea cyberattacks hold lessons for U.S. |
| South Korean crackers arrested |
| SP2 breaks nmap, others - *Anti*phishing - Application exploits |
| Space Diving: Iron Man Meets Star Trek Suit In Development |
| Space Shuttle Endeavour's Final Journey |
| Space Station Saved By a Toothbrush? |
| Space Station Spacewalkers Stymied By Stubborn Bolt |
| SpaceX Dragon Set To Launch |
| SpaceX: Lessons Learned Developing Software For Space Vehicles |
| Spaf on reexamining |
| Spain's Extremadura Starts Move To GNU/Linux, Open Source |
| Spam - spam - spam |
| Spam ahoy! |
| Spam Backscatter |
| Spam blocking by RBL, when is a good thing too much? |
| Spam Delivered via .ICS Files |
| SPAM in German is Still SPAM |
| Spam Increase |
| Spam reporting addresses |
| Spam with Obfuscated Javascript |
| Spam, Recon or ??: You make the call!! |
| Spamassassin - upgrade |
| Spamhaus DDoS Attack Investigation Results in Arrest of Dutch Man |
| SPAM-Let the time fit the crime; |
| Spammers attempt to defeat Bayesian filters; Malaysia terrorism warning; MSN Messenger worm |
| Spammers dodge junk filters with Google Translate |
| Spammers unleash DIY phone number slurping web tool |
| Spammers, phishers escape proper punishment |
| Spamming as 'terror' tactic |
| Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot |
| Spanish police arrest suspected developer of BKA trojan |
| Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack |
| Speaking of Predictions |
| Speaking of Said Upgrades… Firefox 1.0.7 |
| Special Microsoft Bulletin Patching Remote Code Execution Flaw in OpenType Font Drivers |
| Special Ops Takes Its Manhunts Into Space |
| Spectacular New Views of Saturn's Polar Vortex |
| Speed traders eyed after Twitter hack attack: regulator |
| Speech-to-text drives motorists to distraction |
| SplitRXMode - Taking VMware Multicasting to the Next Level |
| Sploits Du Jour: Veritas NetBackup & Ethereal. Watch Oracle and Snort! |
| Sporadic Problems, Internet Health Monitors, IE Attacks, and HTTP GET |
| Spy Gadgets: A Visit With the Real-Life Q |
| Spyware Report Disected and Thanks For The Malware |
| Spyware Tool Kit, OSPF Filtering & Authentication, Port 559 Traffic Spike |
| SQL Injection Flaw in Ruby on Rails, (Wed, Jan 9th) |
| SQL Injection Lilupophilupop style, Part 2, (Thu, Aug 9th) |
| SQL Injection: Paper & Worm, WINS, Asking for Input. |
| SQL Model Clause: References and Recommendations |
| Square Kilometre Array Pathfinder Goes Live |
| SquirrelMail 1.4.8 released |
| SSD Prices Fall Dramatically In 2012 But Increase In Q4 |
| SSH Honeypot Capture, Follow The Bouncing Malware (Part III) |
| SSH Honeypots (Ab)used as Proxy |
| SSH scanning continues, some simple advice; IPS comparison article |
| SSH Scanning Resolved; First Things First Guide |
| SSL 2.0 Rollback in OpenSSL |
| SSL Phishing Scam / FreeBSD DoS Vulnerability / Acrobat Reader Flaw |
| SSL Requests sent to port 80 (request for help/input), (Thu, Sep 6th) |
| SSL, SSL - Where Art Thou SSL? |
| Standard Kilogram Gains Weight |
| Stanford Study Flawed: Organic Produce May Be More Nutritious After All |
| Stanford Uses Million-Core Supercomputer To Model Supersonic Jet Noise |
| Stanford's Flying Fish Glider |
| Staples Starts Selling 3-D Printer |
| Startup decloaks, rolls out cloudy security 'conductor' |
| State of the Union: Full text of President Obama's address |
| State social media privacy laws a mixed bag for businesses |
| Statistical Tools For Detecting Electoral Fraud |
| Statistics Key To Success In Run-and-Gun Basketball |
| Staying Secure During ERP Implementation: What to Look Out For |
| Stealing photos and spying: backdoors to networked cameras |
| Stealthy Apache Exploit Redirects Victims to Blackhole Malware |
| Stealthy Group Steals Data Using Zero-Day, 'Watering Hole' Attack |
| Stealthy, malware-spewing server attack not limited to Apache |
| Steam spawns vulnerabilities, say researchers |
| Steelie Neelie admits laptop hack during IGF |
| Stem Cell Treatment Found Effective For Rare Brain Disorder |
| Steps to Mitigate Office Vulnerabilities |
| Steve Jobs Movie Clip Historically Inaccurate, Says Woz |
| Still a Microsoft Most Valuable Professional (6th year!) |
| Still More MyDoom, a Few Twists on IDS, and a New Phishing Threat |
| Stolen Laptops |
| Stop calling it a ransomware "attack" |
| Stopping Spam by Extrusion Detection |
| Storage and expertise - the PureSystems box |
| Storm Center in the News |
| Storm Season |
| Strange file names being requested from a web server |
| Strange Http request... |
| Strange phishing/spam e-mails |
| Strange Spam; Update on Port 3001; New Discussion Forum; Small Website Change; Cisco Humor; SANS Washington DC |
| Strange UDP Packets, Amazon.com and LATAM NIC Issues |
| Stratfor Hacker Could Be Sentenced to Life, Says Judge |
| Stress-Testing Software For Deep Space |
| Student mules, More database holes, Microsoft spyware beta |
| Student privacy activists due to meet with Facebook |
| Student Refusing RFID Badge Now Fights Expulsion Order |
| Students Calculate What Hyperspace Travel Would Actually Look Like |
| Study Finds Universe Is 100 Million Years Older Than Previously Thought |
| Study says malware attacks are on the rise, mobile threats becoming more serious |
| Study Urges CIOs To Choose Open Source First |
| Study: Geolocation apps draw users, despite privacy concerns |
| Study: Limiting Bidding On Spectrum Could Cost Billions |
| Study: Online Social Influence Has the Strongest Effect On Voting Behavior |
| Study: the Universe Has Almost Stopped Making New Stars |
| Stuxnet worm planted on Iranian PCs via USB stick, site claims |
| Submitting Malware - Unpatched IE Hole Being Exploited - eJihad or iHysteria? |
| Substantial Increase in Infected System Numbers (is it real?) |
| Sudo For Windows |
| Sugar Batteries Could Store 20% More Energy Than Li-Ions |
| Summer/Winter Vacation Book Suggestions and Hacking Challenges |
| Sun bulletins, MS04-040 discussion, anti-spam vigilante-ism dumb, did you know? |
| Sun Java JRE sandbox bypass vulnerability |
| Sun Java Runtime Environment XML Parsing Denial of Service Vulnerability |
| Sun Java SDK and JRE Updates |
| Sun JDK 5.0 Update 10 |
| Sun JRE Privilege Escalation, Opera Vulnerability, Pocket PC Trojan in the wild |
| Sun ONE Messaging Server Vulnerability; Weaknesses in Wireless LAN Session Containment; Credit Card Breach |
| Sunday P & Q; Happy Birthday OpenSSH; RBOT Snort Sig; Bacula |
| Sunday, little to report, and backups |
| SunJava 1.5.0_09 Released |
| Super Bacteria Create Gold |
| Supercomputer Repossessed By State, May Be Sold In Pieces |
| Supercomputers' Growing Resilience Problems |
| Super-Earth Discovered In Stars' Habitable Zone |
| Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA |
| 'Super-powerful' Flame worm actually boring BLOATWARE |
| Superstition |
| Support Forums Reveal SCADA Infections |
| Supreme Court To Decide If Monsanto GMO Patents Are Valid |
| Surface Pro Sold Out; Was It Just Understocked? |
| Surface Pro: 'Virtually Unrepairable' |
| Surfing Robot Tracks Great White Sharks |
| Surge in Exploit Attempts for Netis Router Backdoor (UDP/53413) |
| Surveillance software: Gamma Group's offshore companies uncovered |
| Survey on Application Portfolio Management–What is your organization doing? |
| Survey Reveals a Majority Believe "the Cloud" Is Affected by Weather |
| Survey Suggests P2P Users Buy More Music |
| SUS: deadline extended - XP SP1 not supported anymore |
| Suspicious eFax Spear Phishing Messages, (Fri, Aug 17th) |
| Swartz' death fuels debate over computer crime |
| Swedish Data Center Saves $1M a Year Using Seawater For Cooling |
| Swedish School Makes Minecraft Lessons Compulsory |
| Sweet Treats from the Honeynet group. |
| Swiss security day |
| Switching Tasks Changes Worker Bee DNA |
| Syfy Reality Show Will Feature Giant Boxing Robots |
| Symantec Antivirus Scan Engine: Web Service Administrative Interface Buffer Overflow |
| Symantec AV linked to Verisign certificate problem, DUGallery, False Weather Alerts, more phishing |
| Symantec AV RAR library vulnerability |
| Symantec AV Vulnerability Latest |
| Symantec beats estimates on demand for security products |
| Symantec CEO takes over global sales chief's job, shows him door |
| Symantec detecting NSIS as trojan.zlob. |
| Symantec DOS Exploit Code, Sasser Backdoor Exploit Capture, Reading Material |
| Symantec finds Linux wiper malware used in S. Korean attacks |
| Symantec forecasts weak results as yen depreciates |
| Symantec Patch Posted |
| Symantec Products Vulnerabilties / Worm Password List / Mailbag-Netsky |
| Symantec retires low-end security software |
| Symantec Scan Engine Multiple Vulnerabilities |
| Symantec Sees Links Between 2011, 2013 Cyber-Attacks on South Korea |
| Symantec update blocks access to AOL |
| Symantec VERITAS Storage Exec DCOM Server BO's |
| Symantec: don't blame us for New York Times hack |
| Symantec: Flashback malware netted upwards of $10,000 a day |
| Symbian operating system - Nokia series 60 mobile phones - 3 new Trojans |
| Symbian Sells Millions, Despite Nokia Pushing Windows Phone |
| SYN-ACK Packets With Data |
| Syncing Between Devices |
| Synthetic Materials Set New World Record For Greatest Amount of Surface Area |
| Syria drops from Internet 7th May 2013, (Wed, May 8th) |
| Syria Falls Off the Internet Again |
| Sysadmin Appreciation Day |
| Syslog'n with the best of 'em; |
| System Architecture Test Plan (Expanded) |
| System Documentation: Application Software |
| System Documentation: Working System |
| System Resource Utilization Monitor |
| System Spec: External (Human) Interface |
| System Store Trojan, Infection Persistence, Save the Pr0n |
| TACC "Stampede" Supercomputer To Go Live In January |
| Taiwan Earthquakes cut undersea cables |
| Taiwan security official warns of crippling Chinese cyberattacks |
| Taiwan to ramp up cyberwar efforts |
| Taiwan's civil servants caught by sexy email trap |
| Take a Free Networking Class From Stanford |
| Take Back Wednesday? SQL Slammer... still alive but barely kicking |
| Taking a Hard Look At SSD Write Endurance |
| Taking a Look at the FreeVideo Player Trojan |
| Taking Action For Free JavaScript |
| Talented and Creative Group We Are |
| Taliban official's email blunder leaks 400+ contacts |
| Talking to Kids About Online Porn: How One Dad Handled it |
| Tap Gigabit Networks on the Cheap |
| Targeted attack: experience from the trenches |
| Targeted attack: Word exploit - Update |
| Targeted Attacks Increased, Became More Diverse in 2011 |
| Targeted IPv6 Scans Using pool.ntp.org . |
| Targeted Trojan attacks? |
| Tata Intends To Sell Air-Powered Car In India |
| Tax Day and associated risk |
| Tax Day and recovering from San Diego; Oracle patches; IRC spam worm |
| TCP 554 scanning; Linux mremap local root exploit posted |
| tcp bindshell with password prompt in 162 bytes |
| TCP Fuzzing with Scapy, (Thu, Sep 13th) |
| TCP port 10000 cont. / Connecting mismatched protocols |
| TCP port 1025 activity; continued DNS poisonings; 802.11 security primer |
| TCP Port 8181 Puzzle |
| tcp/135 and ICMP Continue to Decline; Solaris 8 Hacks |
| TCP/1433 spike: Call for Packets. |
| Teenager Makes Discovery About Galaxy Distribution |
| Teens arrested in connection with attack on UK Police Agency |
| Teens Drug Parents To Get Web Access |
| Teens, Social Media, and Privacy |
| Tech tip follow-up: Using the data Invoked with R's system command |
| Tech tip: Invoke a system command in R |
| TechCrunch:Expanded DMCA Still Has Limits |
| Technical document on WMF vulnerability and Guilfanov's patch available |
| Technical Mujahid Magazine |
| Television Network Embeds Android Device In Magazine Ads |
| Telnet client vulnerability; DNS posioning re-appearing |
| Telstra Bigpond To Use Outlook.com As Email Handler |
| Temporary Patches for createTextRange Vulnerability |
| Tens of millions of hackers target Israel government websites |
| Tesla CTO Talks Model S, Batteries and In-car Linux |
| TeslaCrypt ransomware sent using malicious spam |
| Test File: PDF With Embedded DOC Dropping EICAR |
| Test Gallery - VMware |
| Testing for DNS recursion and avoiding being part of DNS amplification attacks |
| TestLink v1.9.3 Arbitrary File Upload Vulnerability |
| Tests Show That Deadly New Flu Could Spread Among People |
| Texan schoolgirl expelled for refusing to wear RFID tag |
| Texas Attorney General Warns International Election Observers |
| Texas Company's Antique Computers Are For Production, Not Display |
| Texas School Board Searching For Alternatives To Evolutionary Theory |
| Texas State Rep. Files 2 Bills To Ban RFID In Schools |
| Thai PM's site defaced with smutty abuse |
| Thanks for info on chat monitoring; PanadaLabs report; Hyper-Threading vulnerability |
| Thanx to our readers |
| That Peculiar Genetics of Mathematics |
| The "Yes, but..." syndrome |
| The 1 Train Hackers Stole $2.4 Million from 2,904 ATMs in Just 10 Hours |
| The 3D Un-Printer |
| The 7 Craziest Intelligence Leaks in US History |
| The 80's called - They Want Their Mainframe Back!, (Wed, Jan 9th) |
| The 866-PC-SAFETY poll |
| The Agony And Ecstasy Of The Oracle 11gR2 Upgrade |
| The Algorithmic Copyright Cops: Streaming Video's Robotic Overlords |
| The AP Twitter hack: Wall Street's tweet-scraping technology that sparked a 145-point nosedive |
| The Arcati Mainframe Yearbook 2013 |
| The asymmetry implicit in Internet data retention |
| The ATF Not Concerned About 3D Printed Guns... Yet |
| The Beast |
| The best anti-Obama book I've read |
| The biggest cyberattack in Internet history |
| The Biggest Financial Fraud of All Time |
| The British Have All The Fun |
| The Bronies Get Their Own Charity |
| The Case For Targeted Ads |
| The Case for UC Interoperability |
| The CIA and Jeff Bezos Bet $30 Million On Quantum Computing Company |
| The Cloud Ecosystem - Just Getting Started |
| The Cloud Wars |
| The Coming Internet Video Crash |
| The Computer Science Behind Facebook's 1 Billion Users |
| The Current Cloud Landscape |
| The cyber debate goes public |
| The Cyber Threat To the Global Oil Supply |
| The Danger In Exempting Wireless From Net Neutrality |
| The dangers of shared web hosts |
| The Dark Side of Certificate Transparency |
| The Data Crunchers Who Helped Win The Election |
| The Empire Hacks Back Challenge: Test Your Windows Command-Line Kung Fu |
| The era of big DDOS? |
| The Family System Administrator |
| The Faraway Cloud: Measuring Cloud Performance |
| The FBI Is Now Investigating the Steubenville Backlash |
| The FBI will turn off the Internet on Monday (or not), (Mon, Jul 9th) |
| The FBI's reported new plan to read your emails |
| The Foldable Readius Ereader Is Dead |
| The Foundation of Your ATS Should be a CRM |
| The Free State Project, One Decade Later |
| The FSF Adopts the Kickstarter Approach To Fund-raising |
| The Full Text of President Obama's 2013 State of the Union Address |
| The Gates Foundation Engages Its Critics |
| The government wants to know what it doesn't know |
| The H Roundup - AMD fires developers, Android turns 5, E17 alpha arrives |
| The H Roundup - Bogus leap seconds, EFI rootkits and cloud cracking |
| The H Roundup - Linux Mint 15 RC, WebM patents, Google drops XMPP |
| The H Roundup for the week ending 12 May |
| The H Roundup for the week ending 14 July |
| The H Roundup for the week ending 17 March |
| The H Roundup for the week ending 18 February |
| The H Roundup for the week ending 19 May |
| The H Roundup for the week ending 2 June |
| The H Roundup for the week ending 23 June |
| The H Roundup for the week ending 24 March |
| The H Roundup for the week ending 28 July |
| The H Roundup for the week ending 9 June |
| The H Roundup for the week ending May 5 |
| The History of the Floppy Disk |
| The Hunt For LulzSec's Missing Sixth Member |
| The chocolate / attack correlation |
| The importance of ongoing dialog |
| The Intelligence Cycle for a Vulnerability Intelligence program on-the-cheap |
| The Internet Plays Role of Stupidity Amplifier |
| The ISC is not Trying to Trojan Your Machines |
| The Largely Unknown Success Story of Afghanistan's Television Network |
| The Linux-Proof Processor That Nobody Wants |
| The Long Reach of US Extradition |
| The Mathematics of the Lifespan of Species |
| The Matthew Keys Case Shows Just How Big a Bully the Feds Can Be |
| The missing Microsoft patches |
| The Mobile App Design Tail Wags the Desktop Software Design Dog |
| The most hated IP address of 2005 ? |
| The MS Claria debate; Intrusions via MS05-017; some more light reading |
| The New AI: Where Neuroscience and Artificial Intelligence Meet |
| The New Series of Doctor Who: Fleeing From Format? |
| The Olympic Live Stream: Observations, Recommendations, Predictions |
| The other Juniper vulnerability - CVE-2015-7756 |
| The Passing of the Personal Computer Era |
| The Passwords You Should Never Use |
| The Perils of Vendor Bloatware |
| The Pirate Bay supporters hack Virgin Media |
| The Pirate Bay's Oldest Torrent Is Revolution OS</em> |
| The Pitfall Of Two Factor Authentication |
| The Privacy Illusion |
| The Prototype Still Works; Insider Threat Paper; More Keylogging; Translation |
| The Rapid Rise of License Plate Readers |
| The reasons you should attend IOD 2012 aren't always technical |
| The Release Candidate For Linux Mint 14 "Nadia" Is Out |
| The Return of CISPA |
| The Rise of Paid Wikipedia Consulting |
| The Risks of Trusting Experts |
| The Science Behind Building a Space Gun |
| The security risks and rewards of big data |
| The Short Life of a Vulnerable DVR Connected to the Internet |
| The Shumway Open SWF Runtime Project |
| The Sleuth Kit (TSK) for Windows released |
| The Snort Top 10 |
| The SPAM People;Thanks;Package Verification |
| The Strange Nature of the Nigerian App Market |
| The Struggles of Getting Into the App Store |
| The Tech Behind Felix Baumgartner's Stratospheric Skydive |
| The Three Pillars of Data Warehousing |
| The Tiny Console Killers Taking On the PS4 and Xbox 720 |
| The Top 10 - The Best Conversations Happening Right Now |
| The Top 5 Reasons Cloud Computing Projects Fail |
| The Top Paying Tech Companies For Interns |
| The trouble with talking to computers. |
| The Twelve Days of Christmas Packet Challenge |
| The Two Big Problems With Online College Courses |
| The Ultimate OS X Hardening Guide Collection, (Mon, Feb 20th) |
| The ultimate tips box |
| The Value a "Fresh Set Of Eyes" (FSOE) |
| The White House's Next Enemy: Botnets |
| The Wordpress Plugins Playground |
| The World Remains Five Minutes From Midnight |
| The worst security snafus of 2012 – so far |
| There are no more Passive Exploits |
| There Is No Reason At All To Use MySQL: MariaDB, MySQL Founder Michael Widenius |
| They didn't predict that: Astrologers! blamed! after! Yahoo! hack! |
| They Work Long Hours, But What About Results? |
| Think Tank's Website Rejects Browser Do-Not-Track Requests |
| Third Party Debates Moderated by Larry King: Discuss |
| Third-party apps ripe targets for cybercriminals, Secunia says |
| Thirty Six Days to Dreamforce |
| This Article is Brought to You By the Letter ノ |
| 'This Is Your Second and Final Notice' Robocallers Revealed |
| This Week's Top 10 Discussions |
| This Week's Top 10 Discussions - April 29, 2013 |
| This Week's Top 10 Discussions - May 6, 2013 |
| Thomson Reuters employee indicted for aiding hackers -court filing |
| Those never-ending waves of Locky malspam |
| Thoughts about Informix |
| Thoughts on PCI (Payment Card Industry) compliance requirements |
| Thoughts on VoIP, Holiday recommended reading |
| Thousands of Kuwaitis protest against voting changes |
| Thousands of Publicly Accessible Printers Searchable On Google |
| Thousands of Publicly Addressable Printers Searchable On Google |
| Threats in the Cloud Environment SSH Scanners |
| Three Mile Island Shuts Down After Pump Failure |
| Three reasons you shouldn't neglect your application security |
| Three Ways Cloud Computing Providers Shoot Themselves in the Foot |
| Thunderbird Download Link |
| Tibetan and Uyghur activists targeted with Android malware |
| Tim Bryce - COMMON COURTESY - 9/24/2012 |
| Tim O'Reilly Steps In To Debate Open Government and Linux |
| Time for some predictions |
| Time to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801, (Wed, Oct 24th) |
| Time to update Mozilla/Firefox/Thunderbird and Ethereal; also: sightings of infected IIS 6 servers. |
| Time to upgrade Ethereal... |
| Time Zone Updates, Part 2 |
| Times sued over police hacking |
| Tiny Pill Relays Body Temperature of Firefighters In Real-time |
| Tip of the Day - Backup and Backup Management for Home or Small Business Users |
| Tip of the Day - Color and Bar Coded Daily Risk Analysis |
| Tip of the Day - Fleshing out the details in email policy |
| Tip of the Day - Home Wireless Gateways |
| Tip of the Day - If you don't need it on, turn it off. |
| Tip of the Day - Like a Kid in a WMIC Candy Store |
| Tip of the Day - Making the Switch |
| Tip of the Day - PHP Security |
| Tip of the Day - Protecting HP JetDirect-based Printers |
| Tip of the Day - Turn the NICs off during installation |
| Tip of the Day : snort rule management |
| Tip Of The Day |
| Tip of the Day: Audit |
| Tip of the Day: Be unpredictable and diverse |
| Tip of the Day: Don't be a victim (well try to not be a victim) - security toolbars |
| Tip of the Day: Logbooks |
| Tip of the Day: mount options |
| Tip of the Day: Protect the Single Points of Compromise |
| Tip of the Day: Read e-mail in plain text (as God intended) :) |
| Tip of the Day: Remove Default Route |
| Tip of the Day: Secure Surfing at the Coffee Shop (or Hacker Conferences) |
| Tip of the Day: Standards |
| Tip of the Day: Strong Passwords |
| Tip of the Day: Surviving the monthly patch cycle |
| Tip of the day: Test, don't ping |
| Tip of the Day: The -they shall not be broken into- challenge |
| Tip of the Day: Turn off your Computer |
| Tip of the Day: Use ssh keys |
| Tip of the Day: Use the features of your switches |
| Tip of the day: using host based firewall on Windows XP SP2 |
| Tip: Quick Analysis of Office Maldoc |
| Tippingpoint IPS DoS |
| Tips for Stopping Ransomware |
| T-Mobile patches Wi-Fi eavesdrop vuln |
| To protest Israel's Gaza offensive, 'Anonymous' launches millions of cyberattacks |
| To report any scams/malware related to Hurricane Matthew, use our contact form: https://isc.sans.edu/contact.html |
| To SSL or not to SSL - send us your links! |
| ToD - Configuration Management - maintaining security awareness |
| Today's Locky Variant Arrives as a Windows Script File |
| Tolkien Estate Sues Over Lord of the Rings</em> Slot Machines |
| Tomcat IR with XOR.DDoS |
| Tool Released to Decrypt Petya Ransomware Infected Disks |
| Tool Tip: Kansa Stafford released, PowerShell for DFIR |
| Tool updates and Win 8, (Sun, May 6th) |
| Tools released at Defcon can crack widely used PPTP encryption in under a day |
| toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics |
| Top 100 security tools |
| Top 20 Internet Status Sites |
| Top 20 update; IM malware and IRC bots are the flavor of the day; Sober variant |
| Top 6 Mashable Comments This Week (Mashable) |
| Top20 List Updated; TCP/1433 Remains Elevated; ZoneAlarm 6.0 Released; The Penetrating Packets: Spam E-Mail |
| TOR servers seized by police in Germany |
| Torvalds Takes Issue With De Icaza's Linux Desktop Claims |
| Total Solar Eclipse Bedazzles Northern Australians |
| Tour of the Deep Underground Science and Engineering Lab |
| TR-069 NewNTPServer Exploits: What we know so far |
| Tracking HTTP POST data with ELK |
| Tracking Privileged Accounts in Windows Environments |
| Tracking SSL Certificates |
| Trade Group: US Software Developer Wages Fell 2% Last Year |
| Trading Privacy for Convenience |
| Traits of a Software Professional |
| Treasure Your Trials |
| Trend Micro unearths more links between China and hacker group |
| Trends in malware installers, Oddbob is back, .ANI file followup, and SMTP oddities redux. |
| Treo 700w DST Ooooops! |
| Trevor Eddolls - IBM Champion 2012 |
| Tricks for DLL analysis |
| Trisquel 6.0 'Toutatis' Is Now Available |
| Trojan attack on Maplesoft customers |
| Trojan Disguised as Microsoft Patch; Identity Theft |
| Trojan dropper in Power Point - a new issue? |
| Trojan exploiting MS05-053 - TROJ_EMFSPLOIT.A |
| Trojan postcards; Using authorized apps to do bad things; More IE and Outlook problems? |
| Trojan.Mdropper.Q / Email Attachment Practices |
| Trojanized SSH Daemon In the Wild, Sending Passwords To Iceland |
| Trouble At OnLive |
| Trouble Brewing? - Port 106 Activity |
| Trusteer Identifies Universal Man-in-the-Browser Attack Technique |
| Trustworthy Computing |
| TSA Says Screening Drinks Purchased Inside Airport Terminal Is Nothing New |
| Tsunami.exe, Oracle critical patch update, got packets? |
| Turkey Lurkey brings state of calm to the net -- well, almost |
| Turkish agency blamed by U.S. companies for intercepted Web pages |
| Turkish Registrar Enabled Phishing Attacks Against Google |
| Turning SF's Bay Bridge Into a Giant LED Display |
| TV station hacker warns of zombies in Montana |
| Twas the night before Christmas, when all through the house Not a creature was stirring, not even a mouse. |
| Tweet-to-buy? American Express says yes |
| Twin Craft To Study Space Weather From Within Earth's Radiation Belts |
| Twitter Based "Ted" System Warns of Earthquakes Earlier |
| Twitter Breached, 50k Accounts Posted to Internet |
| Twitter clients stay signed in with pre-breach passwords |
| Twitter hires Apple’s hacker nemesis to boost its security team |
| Twitter jumps on Do Not Track bandwagon |
| Twitter locks down logins by adding two-factor authentication |
| Twitter Resets 250,000 User Passwords After Cyber-Attack |
| Twitter spam campaign infects users with fake antivirus programs |
| Twitter stumble causes outage, not hactivist |
| Twitter suffers malware spam outbreak |
| Twitter Tells News Organizations to Expect Even More Hacks in the Future |
| Twitter's Vine App Ready To Bomb Internet With GIF-Like Videos |
| Two great books for aspiring "data scientists" |
| Two Heads Are Better Than One For Brain-Computer Interfaces |
| Two Changes To Quirky Could Change The World |
| Two new Internet Explorer vulnerabilities disclosed including PoC |
| Two New Sober Viruses on the Loose Today |
| Two subsystem parameters (DSNZPARM keywords) have been added in support of DDF (and other DDF enhancements...) |
| Two subsystem parameters have been added in support of DDF (and other DDF enhancements...) |
| Two Things I Wish Companies Cared More About: Cloud & Acquisitions Risks |
| Two-factor authentication Defense Mechanisms |
| Two-Way Firewall in Windows Vista and Microsoft OneCare |
| Tylenol May Ease Pain of Existential Distress, Social Rejection |
| Typo Squatting Charities for Fake Tech Support Schemes |
| Typo-Squatting and Password Best Practices |
| U.N. nuclear agency says hackers stole information |
| U.S Law Enforcement Agencies Increase Warrantless Electronic Snooping |
| U.S. Army, Target, others advertising on pirate sites |
| U.S. bank website hackers used advanced botnets, diverse tools |
| U.S. carriers line up against texting while driving |
| U.S. Congress urged to probe Chinese cyber-espionage |
| U.S. cyber warrior accuses China of targeting Pentagon |
| U.S. defense chief says pre-emptive action possible over cyber threat |
| U.S. group studying breach at Schneider unit |
| U.S. lawmakers to introduce new bill to punish cyber theft |
| U.S. looks into claims of security flaw in Siemens gear |
| U.S. panel urges wariness as Chinese investment grows |
| U.S. report says major weapons designs compromised by Chinese |
| U.S. Seeks Power to Wiretap Web Services, Including Google, Facebook |
| U.S. seeks to tackle trade secret theft by China, others |
| U.S. seeks to tackle trade-secret theft by China, others |
| U.S. Senator Takes Wrong Turn on DOJ's GPS Tracking Requests |
| U.S.-Israel project with Motorola leads to security-hardened industrial control system |
| UAC Bypass in JScript Dropper |
| Ubisoft assassinates Uplay flaw, denies DRM rootkit |
| Ubisoft DRM opens backdoor |
| Ubuntu Developing Its Own Package Format, Installer |
| Ubuntu Gnome Remix 12.10 Arrives For Testing |
| Ubuntu install passwd in log |
| Ubuntu Isn't Becoming Less Open, Says Shuttleworth |
| Ubuntu Touch Developers Aim for Daily Phone Usability Before June |
| uCertify Online Prep Kit - Software Review |
| UDP port 1434 directed attack to AS13489 IP ranges, (Fri, May 24th) |
| UDP Port 47290 |
| UDP traffic to port 50368 |
| UDP/1030 (continued) |
| udp/1030 Increase |
| UDP/4081 Spike |
| UK Authorities Threaten To Storm Ecuadorian Embassy To Arrest Julian Assange |
| UK biz pays heavy price for skimping on security - PwC |
| UK Broadband Plan Set To Clear EU Approval |
| UK cookies cop changes own policy to ‘implied consent’ |
| UK Court: MPAA Not Entitled To Profits From Piracy |
| UK Critical Infrastructure and Business Trojan Attacks (Updated), imap scanning, Opera vulns, Adobe Reader/Acrobat vuln, NIST Control Tool, Mailbag |
| UK Government Owns 16.9 Million Unused IPv4 Addresses |
| UK Government Spending £6,000 Per Computer Every Year To Maintain Desktops |
| UK Gov't Official Advises Using Fake Details On Social Networks |
| UK hacker jailed for nicking PayPal, banking data from MILLIONS |
| UK charges teenager for alleged jamming of anti-terrorist hotline |
| UK lawmakers say Huawei-BT deal exposes flawed security controls |
| UK License Plate Cameras Have "Gaps In Coverage" |
| UK Ministers' Private Communications Subject To Freedom of Information Act |
| UK Police Fined For Using Unencrypted Memory Sticks |
| UK Police Now Double As CCTV Cameras |
| UK police: Man charged in UK soldier's murder |
| UK.gov to spunk £2m a year policing global cyber-security |
| UKNova TV Torrent Tracker Shut Down After FACT Issues C&D |
| Ultra-hackable Google Glass could be a security nightmare |
| UN: More international cooperation needed to fight cyberterrorism |
| Unauthorized Change Detected! |
| Unencrypting Extortion Malware |
| Unidentified E-mail worm, PHP server vulnerabilities, MS SMS Client DoS |
| Uninstalling Problem Applications using Powershell |
| Unity Makes Strength |
| Universal IPSec VPN client for Android 4.0 |
| University Security Problems and Another CHM exploit in the Wild |
| Unix/Linux Steals the Show! |
| Unpatched exploit gets publicity |
| Unpatched Vulnerability in Firefox used to Attack Tor Browser |
| Unreal Engine Heap Overflow, RBOT.CC, ISCAlert |
| Unscrambling an Android Telephone With FROST |
| Unspecified Vulnerabilities in Flash |
| Unusual Discovery of New African Monkey Species |
| Unusual New Species of Dinosaur Identified |
| Update - Symantec RAR File Parser Remote Heap Overflow |
| Update 20:10 GMT 2004-1-28: New variant of Novarg/MyDoom found, Microsoft Changing IE's URL Handling, Solaris Local Privilege Escalation |
| Update Firefox to 1.5.0.1, the exploit is out |
| Update for Intel(R) PRO/Wireless 3945ABG Network Connection Software bugs |
| Update for Windows Update has teething troubles |
| Update from Microsoft Not Included in April 2006 Bulletin |
| Update on MS06-042 and CA Unicenter Service Desk |
| Update on Postcard virus emails |
| Update on Symantec Elevation of Privilege Vulnerability |
| Update on the Paypal Phish Phlaw |
| Update on the SUS issues |
| Update on the UDP strange packets |
| Update on TrendMicro Pattern 594 Issue; W2K Mainstream Support Ending June 30, 2005; My Computer Has a Rash |
| Update on Word 0-Day Issue |
| -UPDATE- Sasser Worm , Week in Review; LSASS Exploit Analysis; SANSFIRE 2004 |
| Update to MS04-025; Windows 2003 Guides Released; Port 3072; Your Daily Phish |
| Update/Fix for MS06-049 |
| Update: Malware Analysis: Tools of the Trade |
| Update: New Windows XP SP2 vulnerability; MS Patches reports; Bad, Bad Spam... |
| Update: Paypal Phish Conditioning; DNS Denial of Service Vulnerability; CA Vet Library Vulnerability; Combating Windows Malware Tutorial |
| Update: Sasser.d to start the work week, clean up tools may not be adequate |
| Updated (13:45 3/18 GMT): OpenSSL DoS Vulnerability, New Bagel Variants |
| Updated Acrobat Snort Sig / Cisco Advisory / Distributed Vulnerable Scripts Scans/ Diary Foot-note |
| Updated DShield Blocklist |
| Updated Malware Domain List |
| Updated Model Puts Earth On the Edge of the Habitable Zone |
| Updated MSIE VML Remote Buffer Overflow Exploit Code Released |
| Updated Packet Attack flash animation |
| Updated PFSense Client |
| Updated RSS Feed |
| Updated Twiki Snort Sig |
| Updated version of Ilfak Guilfanov's patch |
| Updated Windows Registry Concealment Info;Symantec AV Vulnerability |
| Updated(2): Checkpoint VPN-1 ASN.1 vulnerability, RADIUS and wireless, reminder about home routers |
| Updated: Bagle C Virus. New Vulnerability in RealSecure and BlackIce Products, Solaris 8 and 9 passwd(1) bulletin, WinZip flaw, IE cross-frame scripting issue |
| Updated: IWAP_WWW account on compromised IIS servers |
| Updated: MS04-011 LSASRV Exploit; Sasser Worm Update: Sasser.b |
| Updated: Security bulletins from Sun, more Dameware |
| Updates on DNS Poisoning / Peru Offline / Mailbag and other stories... |
| Updates on IE vulnerability |
| Updating early and often; NPR gets it right |
| UPEK fingerprint scanners insecure, says Elcomsoft |
| Upgrading ODI to 11g |
| Upgrading Software From 350 Million Miles Away |
| UPnP Problems |
| UPnP scan shows 50 million network devices open to packet attack |
| UPS raises dividend to 62 cents from 57 cents |
| URGENT: New version of Beagle hitting |
| US accused of hypocrisy over cyber warfare |
| US activist released from Vietnam after 9 months |
| US Activists Oppose US Govt Calls To Weaken EU Privacy Rules |
| US Air Force Scraps ERP Project After $1 Billion Spent |
| US Authorities Start Extradition Process in Megaupload Case (March 5, 2012) |
| US banks hit by more than a week of cyberattacks |
| US blaming Iran for Persian Gulf cyberattacks |
| US CEO Says French Workers Have Three-Hour Work Day |
| US congress wants a word with ZTE, Huawei |
| US Department of Homeland Security Looking For a Few Good Drones |
| US DHS banking alert |
| US DOJ Claims It Did Not Entrap Megaupload |
| US Educational Scores Not So Abysmal |
| US Election's Only VP Debate Tonight: Weigh In With Your Reactions |
| US Freezes Nuclear Power Plant Permits Because of Waste Issues |
| US Government Monitoring Associated Press Phone Records |
| US government wants security research on car-to-car nets |
| US chief spook: Look, we only want to spy on 6.66 BEELLLION of you |
| US Is Finally Cleaning Up Agent Orange In Vietnam |
| US ISPs commit to new cybersecurity measures |
| US Justice Dept. Sues eBay For Anti-Competitive Hiring Practices |
| US legislation to strengthen mobile data protection proposed |
| US Looks For Input On "The Next Big Things" |
| US Military Tested the Effects of a Nuclear Holocaust On Beer |
| US Mining Data Directly From 9 Silicon Valley Companies |
| US national vulnerability database hacked |
| US options exchange reopens after half-day outage |
| US parents quit Singapore inquest into son's death |
| US power grid the target of 'numerous and daily' cyber-attacks |
| US President Ford Dies |
| US Presidential Debate #2 Tonight: Discuss Here |
| US software firm hacked for years after suing China |
| US Suspects Iran Was Behind a Wave of Cyberattacks |
| US warning reflects fears of Iranian cyberattack |
| USA Calling For the Extradition of Snowden |
| USB cleaning device for the masses |
| USB Storage Drive Loaded With Malware Shuts Down Power Plant |
| Use The Privilege |
| User Awareness and Education, (Sat, Jul 14th) |
| User Group Notice: July 11, 2012 Houston Area DB2 User Group meeting has been scheduled |
| User Group Reminder: This Wednesday (July 11, 2012) is the next meeting of the Houston Area DB2 User Group |
| User Help: Operations Manual |
| User Help: The User Manual |
| User questions new WindowsUpdate Fix |
| Users Abandon Ship If Online Video Quality Is Not Up To Snuff, Says Study |
| Users give Facebook's privacy changes a thumbs down |
| Users still double clicking email attachments, MSJVM Removal Tool 1.0, Upcoming ISC Webcast |
| Using daemonlogger as a Software Tap |
| Using ISA to help block VML exploit |
| Using Security Tools to Compromize a Network |
| Using Solr/Lucene to Surface the Big Data of Social Media |
| Using the Center for Internet Security (CIS) Benchmarks to Support an Information Security Management System |
| Using Truth Serum To Confirm Insanity |
| USPS Discriminates Against 'Atheist' Merchandise |
| Utah breach may have compromised over 25,000 Social Security numbers |
| Utah: 750K more victims in health dept data breach |
| V$process, V$session: FULL OUTER Curiosity |
| Vacation Rental Property Scam |
| Valve Blog Announces Dates For Steam Linux External Beta |
| Valve Officially Launches Steam For Linux |
| Vastly Improved Raspberry Pi Performance With Wayland |
| VBA and P-code |
| VBA Shellcode and Windows 10 |
| VBS.Pub Worm, RTT Measurement Probes, ARIN in-addr.arpa, IE Exploits |
| VCE: Driving the Velocity of Change within the IT industry |
| Vendors Take Note, Mark II, DHS Cyber Chief Departure |
| Vendors: More Patch-Release Options Please, (Sat, Aug 4th) |
| Venezuela prosecutor to open probe over leaked recording |
| Verifying SSL/TLS certificates manually |
| Verisign Site Seal Update |
| Veritas Exploit on the web |
| VERITAS NetBackup (tm) Enterprise Server/Server 5.0 and 5.1 BO |
| VERITAS NetBackup Vulnerability - remote |
| Veritas pulls (some) patches for Backup Exec |
| Veritas 'Sploits, MS05-002 PoCs, Phishin' through the hoops, Microsoft vs. Porn |
| Verizon Data Breach Report Offers Scary Truths About Security |
| Verizon Ordered To Provide All Customer Data To NSA |
| VIA Unveils $79 Rock and $99 Paper ARM PCs |
| Victim of its own success and (ab)used by malwares |
| Victory For Apple In "Patent Trial of the Century," To the Tune of $1 Billion |
| Video Inpainting Software Deletes People From HD Video Footage |
| Virnetx Loses Court Battle To Cisco Over VPN Patent |
| Virtual Backup Challenges Enterprise IT |
| Virtual Bitlocker Containers |
| Virtual Machine Detection in Malware via Commercial Tools |
| Virus Alphabet, War!, Port 3389 Spike, WinZip Issues |
| Virus could black out nearly 250,000 PCs on Monday |
| Virus scanning recommendations for Enterprise computers (Revision 53) |
| Virus spreads from Asus Server |
| Virus Tuesday: New Bagels, New Mytob. ; qmail pop3 64bit issues |
| Virut Botnet Crippled in Multinational Takedown Effort |
| Visa Sued for Fines Stemming from Genesco Data Breach |
| Vista reviewed by Symantec |
| Vista: better security [Y/N] ? |
| Visual Studio 2005 Remote Code Exploit, Actively Being Exploited |
| Visualization of Dasher worm |
| VML exploits with OS version detection |
| VML vuln being actively exploited |
| vMotions a Killer App for 10GbE at Vonage |
| VMware Acquires Virsto To Enhance Virtual Storage Performance |
| VMWare Browser |
| VMware Hybrid Cloud Plans: Time For Amazon Answer |
| VMware Patches DoS Vulnerability in Virtualization Software |
| VMWare Security Advisories VMSA-2016-0005 |
| VMWare Security Advisory |
| VMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html, (Fri, Oct 5th) |
| VMware Security Bulletins |
| VMware security update |
| VMware VMSA-2015-0007.3 has been Re-released |
| VMware VMSA-2016-0002 |
| VMware's SDN Dilemma: VXLAN or Nicira? |
| Voice Message Notifications Deliver Ransomware |
| Volatility Bot: Automated Memory Analysis |
| Volunteer Response |
| Volunteer Response; OpenSSH issues; Bluetooth delay |
| Vote On What the Very Large Telescope Observes |
| Voter Data: What the Candidates Know About You |
| Voting Machine Problem Reports Already Rolling In |
| VPN ban makes for nervy times behind Great Firewall |
| Vsmons.exe / Port 6112 / USBank phishing / MS04-22 Update |
| vSphere 5.0 Hardening Guide Officially Released, (Mon, Jun 4th) |
| Vuln: 389 Directory Server CVE-2013-0312 Remote Denial of Service Vulnerability |
| Vuln: ActFax Server Multiple Remote Buffer Overflow Vulnerabilities |
| Vuln: activeCollab Chat Module Arbitrary PHP Code Execution Vulnerability |
| Vuln: Adobe Acrobat and Reader APSB13-15 Multiple Security Vulnerabilities |
| Vuln: Adobe Acrobat and Reader CVE-2013-0603 Remote Heap Based Buffer Overflow Vulnerability |
| Vuln: Adobe Acrobat and Reader CVE-2013-0604 Remote Heap Based Buffer Overflow Vulnerability |
| Vuln: Adobe Acrobat and Reader CVE-2013-0610 Remote Stack Based Buffer Overflow Vulnerability |
| Vuln: Adobe Acrobat and Reader CVE-2013-2730 Remote Buffer Overflow Vulnerability |
| Vuln: Adobe Flash Player and AIR APSB13-14 Multiple Memory Corruption Vulnerabilities |
| Vuln: Adobe Flash Player and AIR CVE-2012-5275 Buffer Overflow Vulnerability |
| Vuln: Adobe Flash Player and AIR CVE-2012-5279 Memory Corruption Vulnerability |
| Vuln: Adobe Flash Player and AIR CVE-2012-5280 Buffer Overflow Vulnerability |
| Vuln: Adobe Flash Player and AIR CVE-2013-0647 Memory Corruption Vulnerability |
| Vuln: Adobe Flash Player and AIR CVE-2013-1374 Use After Free Remote Code Execution Vulnerability |
| Vuln: Adobe Flash Player and AIR CVE-2013-3343 Remote Memory Corruption Vulnerability |
| Vuln: Adobe Reader Unspecified Remote Code Execution Vulnerability |
| Vuln: Anacrypt '.tuz' Configuraton File Information Disclosure Vulnerability |
| Vuln: Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability |
| Vuln: Apache Struts 'ParameterInterceptor' Class OGNL (CVE-2011-3923) Security Bypass Vulnerability |
| Vuln: Apache Struts2 Skill Name Remote Code Execution Vulnerability |
| Vuln: Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability |
| Vuln: Apache Tomcat CVE-2012-2733 Denial of Service Vulnerability |
| Vuln: Apache Tomcat CVE-2012-4431 Cross-Site Request Forgery Vulnerability |
| Vuln: Apache Tomcat CVE-2012-4534 Denial of Service Vulnerability |
| Vuln: Apache Tomcat DIGEST Authentication Multiple Security Weaknesses |
| Vuln: A-PDF All to MP3 Converter '.wav' File Remote Buffer Overflow Vulnerability |
| Vuln: Apple iOS User Space Stack Cookies CVE-2013-3951 Local Security Bypass Vulnerability |
| Vuln: Attachmate Reflection DLL Loading Arbitrary Code Execution Vulnerability |
| Vuln: BackupPC 'index.cgi' Multiple Cross Site Scripting Vulnerabilities |
| Vuln: Bind DynDB LDAP CVE-2012-3429 Package Remote Denial of Service Vulnerability |
| Vuln: Broadcom UPnP Stack 'SetConnectionType()' Function Format String Vulnerability |
| Vuln: Bugzilla Multiple Information Disclosure Vulnerabilities |
| Vuln: Call of Duty: Modern Warfare 3 Remote Denial of Service Vulnerability |
| Vuln: Cisco VPN Client for Windows CVE-2012-5429 Local Denial of Service Vulnerability |
| Vuln: CoDeSys Access Security Bypass Vulnerability |
| Vuln: CoolPDF Reader CVE-2012-4914 Remote Stack Buffer Overflow Vulnerability |
| Vuln: Coppermine Photo Gallery 'keywords' Field HTML Injection Vulnerability |
| Vuln: CryENGINE Remote Code Execution Vulnerability |
| Vuln: CyberLink PowerProducer Multiple DLL Loading Arbitrary Code Execution Vulnerabilities |
| Vuln: CyberLink StreamAuthor Insecure Library Loading Multiple Arbitrary Code Execution Vulnerabilities |
| Vuln: Cyclope Employee Surveillance Solution 'username' Parameter SQL Injection Vulnerability |
| Vuln: Django 'HttpRequest.get_host()' Information Disclosure Vulnerability |
| Vuln: Django Multiple Security Vulnerabilities |
| Vuln: DM FileManager 'album.php' Remote File Include Vulnerability |
| Vuln: Dnsmasq Multiple Remote Denial of Service Vulnerabilities |
| Vuln: Dokuwiki 'url' HTML Injection Vulnerability |
| Vuln: Drupal CDN Module Information Disclosure Vulnerability |
| Vuln: Drupal Core Multiple Access Bypass and Cross Site Scripting Vulnerabilities |
| Vuln: Drupal Faster Permissions Module Access Security Bypass Vulnerability |
| Vuln: Drupal Node Parameter Control Module Access Bypass Vulnerability |
| Vuln: Drupal Printer, email and PDF versions Cross Site Scripting Vulnerability |
| Vuln: EC Software Help & Manual 'ijl15.dll' DLL Loading Arbitrary Code Execution Vulnerability |
| Vuln: Effective File Search (EFS) DLL Loading Arbitrary Code Execution Vulnerability |
| Vuln: Elxis CMS Multiple Cross Site Scripting Vulnerabilities |
| Vuln: EMC AlphaStor CVE-2013-0930 Buffer Overflow Vulnerability |
| Vuln: EMC Avamar Backup Client Insecure File Permissions Vulnerability |
| Vuln: ERDAS ER Viewer 'ERM_convert_to_correct_webpath()' Function Stack Buffer Overflow Vulnerability |
| Vuln: FreeIPA CVE-2012-4546 Certificate Revocation List Security Vulnerability |
| Vuln: Gajim SQL Injection and Code Execution Vulnerabilities |
| Vuln: Ganglia Unspecified PHP Code Execution Vulnerability |
| Vuln: gdk-pixbuf 'read_bitmap_file_data()' Remote Integer Overflow Vulnerability |
| Vuln: GIMP CVE-2012-3402 Buffer Overflow Vulnerability |
| Vuln: GIMP Multiple Buffer Overflow Vulnerabilities |
| Vuln: GnuPG CVE-2012-6085 Multiple Remote Memory Corruption Vulnerabilities |
| Vuln: Google Chrome for Android Prior to 18.0.1025308 Multiple Security Vulnerabilities |
| Vuln: Google Chrome Prior to 15.0.874.102 Multiple Security Vulnerabilities |
| Vuln: Google Chrome Prior to 17.0.963.56 Multiple Security Vulnerabilities |
| Vuln: Google Chrome Prior to 17.0.963.65 Multiple Security Vulnerabilities |
| Vuln: Google Chrome Prior to 20.0.1132.57 Multiple Security Vulnerabilities |
| Vuln: HP Insight Diagnostics CVE-2013-3574 Remote Code Injection Vulnerability |
| Vuln: HP Intelligent Management Center 'FaultDownloadServlet' Information Disclosure Vulnerability |
| Vuln: HP Intelligent Management Center 'IctDownloadServlet' Information Disclosure Vulnerability |
| Vuln: HP Intelligent Management Center 'mibFileUpload' Servlet Remote Code Execution Vulnerability |
| Vuln: HT Editor File Open Remote Stack Buffer Overflow Vulnerability |
| Vuln: IBM WebSphere Application Server Administrative Access Security Bypass Vulnerability |
| Vuln: IBM WebSphere Application Server for z/OS Multiple Security Vulnerabilities |
| Vuln: ICCLIB CVE-2012-4405 Out-of-Bounds Memory Write Remote Code Execution Vulnerability |
| Vuln: Intel CPU Hardware Local Privilege Escalation Vulnerability |
| Vuln: IRCD-Hybrid 'try_parse_v4_netmask()' Denial of Service Vulnerability |
| Vuln: ISC BIND 9 'libdns' Remote Denial of Service Vulnerability |
| Vuln: ISC DHCP IPv6 Lease Expiration Handling Denial of Service Vulnerability |
| Vuln: JBoss Enterprise Application Platform Cross Site Request Forgery Vulnerability |
| Vuln: JBoss Enterprise BRMS Platform JGroups Diagnostics Service Information Disclosure Vulnerability |
| Vuln: JBoss 'twiddle.sh' Local Information Disclosure Vulnerability |
| Vuln: Joomla! JCE Component Multiple Directory Traversal Vulnerabilities |
| Vuln: jPlayer 'Jplayer.swf' Script 'id' Parameter Cross Site Scripting Vulnerability |
| Vuln: JW Player 'logo.link' Parameter Cross Site Scripting Vulnerability |
| Vuln: JW Player Multiple Cross Site Scripting Vulnerabilities |
| Vuln: KDE Plasma Paste Applet Local Password Generation Vulnerability |
| Vuln: libgdata SSL Certificate Validation Security Bypass Vulnerability |
| Vuln: LibRaw CVE-2013-2126 Multiple Memory Corruption Vulnerabilities |
| Vuln: librdmacm 'ib_acm' Service Port Connection Security Vulnerability |
| Vuln: LibreOffice and OpenOffice Multiple Heap Based Buffer Overflow Vulnerabilities |
| Vuln: libssh Multiple Buffer Overflow and Denial of Service Vulnerabilities |
| Vuln: libupnp Multiple Buffer Overflow Vulnerabilities |
| Vuln: libvirt CVE-2013-1766 Local Security Bypass Vulnerability |
| Vuln: libxml2 CVE-2012-2807 Multiple Integer Overflow Vulnerabilities |
| Vuln: libxml2 Hash Collision Denial Of Service Vulnerability |
| Vuln: lighttpd 'http_request_split_value()' Function Remote Denial of Service Vulnerability |
| Vuln: Linux GNU Debugger 'debug_gdb_scripts' Loading Arbitrary Code Execution Vulnerability |
| Vuln: Linux Kernel CVE-2013-0914 Local Information Disclosure Vulnerability |
| Vuln: Linux Kernel CVE-2013-1763 Local Privilege Escalation Vulnerability |
| Vuln: Linux Kernel CVE-2013-1826 NULL Pointer Dereference Local Denial of Service Vulnerability |
| Vuln: Linux Kernel CVE-2013-1827 Multiple NULL Pointer Dereference Local Denial of Service Vulnerability |
| Vuln: Linux Kernel CVE-2013-3228 Local Information Disclosure Vulnerability |
| Vuln: Linux Kernel CVE-2013-3232 Local Information Disclosure Vulnerability |
| Vuln: Linux Kernel CVE-2013-3234 Local Information Disclosure Vulnerability |
| Vuln: Linux Kernel EXT4 'ext4_fill_flex_info()' Local Denial of Service Vulnerability |
| Vuln: Linux Kernel ext4 Local Denial of Service Vulnerability |
| Vuln: Linux Kernel hypervkvpd 'hv_kvp_daemon.c' Netlink Packet Processing Denial of Service Vulnerability |
| Vuln: Linux Kernel KVM CVE-2013-1798 Denial of Service Vulnerability |
| Vuln: Linux Kernel 'mmc_ioctl_cdrom_read_data()' Function Local Information Disclosure Vulnerability |
| Vuln: Linux Kernel 'MSR' Driver Local Privilege Escalation Vulnerability |
| Vuln: Linux Kernel Netlink Interface CVE-2013-1873 Multiple Information Disclosure Vulnerabilities |
| Vuln: Linux Kernel 'request_module() OOM' Local Denial Of Service Vulnerability |
| Vuln: Linux Kernel 'tg3.c' Integer Overflow Vulnerability |
| Vuln: Linux Kernel XFS Filesystem 'fs/xfs/xfs_acl.c' Integer Overflow Vulnerability |
| Vuln: Mahara Multiple Cross Site Scripting and HTML Injection Vulnerabilities |
| Vuln: MantisBT 'match_type' Parameter Cross Site Scripting Vulnerability |
| Vuln: MantisBT SOAP API Security Bypass Vulnerability |
| Vuln: MediaWiki CVE-2012-5391 Session Fixation Vulnerability |
| Vuln: Microsoft Internet Explorer CVE-2012-1876 Col Element Remote Code Execution Vulnerability |
| Vuln: Microsoft Internet Explorer CVE-2013-1309 Use-After-Free Remote Code Execution Vulnerability |
| Vuln: Microsoft Internet Explorer CVE-2013-1311 Use-After-Free Remote Code Execution Vulnerability |
| Vuln: Microsoft Internet Explorer JSON Array CVE-2013-1297 Information Disclosure Vulnerability |
| Vuln: Microsoft Internet Explorer Time Element Uninitialized Memory Remote Code Execution Vulnerability |
| Vuln: Microsoft Windows CVE-2013-2554 Security Bypass Vulnerability |
| Vuln: Microsoft Windows CVE-2013-2556 ASLR Security Bypass Vulnerability |
| Vuln: Microsoft Windows Kernel 'Win32k.sys' Integer Overflow Privilege Escalation Vulnerability |
| Vuln: Microsoft Windows Kernel 'Win32k.sys' Local Privilege Escalation Vulnerability |
| Vuln: Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution Vulnerability |
| Vuln: Microsoft Windows 'Win32k.sys' CVE-2013-1271 Local Privilege Escalation Vulnerability |
| Vuln: Microsoft Windows 'Win32k.sys' CVE-2013-1274 Local Privilege Escalation Vulnerability |
| Vuln: MIT Kerberos 5 kadmind CVE-2002-2443 Remote Denial of Service Vulnerability |
| Vuln: ModSecurity POST Parameters Security Bypass Vulnerability |
| Vuln: Monkey HTTP Daemon Multiple Denial of Service Vulnerabilities |
| Vuln: Movable Type Multiple SQL Injection and Command Injection Vulnerabilities |
| Vuln: Mozilla Firefox and SeaMonkey CVE-2013-0751 Information Disclosure Vulnerability |
| Vuln: Mozilla Firefox and Thunderbird CVE-2013-0801 Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox and Thunderbird CVE-2013-1678 Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox and Thunderbird CVE-2013-1680 Use After Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox and Thunderbird CVE-2013-1681 Use After Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox 'app_tmp' Directory Insecure Permissions Vulnerability |
| Vuln: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability |
| Vuln: Mozilla Firefox CVE-2012-3979 '__android_log_print' Remote Code Execution Vulnerability |
| Vuln: Mozilla Firefox CVE-2012-4210 Style Inspector Remote Code Execution Vulnerability |
| Vuln: Mozilla Firefox CVE-2012-5837 Developer Toolbar Cross Site Scripting Vulnerability |
| Vuln: Mozilla Firefox, SeaMonkey, and Thunderbird Information Disclosure Vulnerability |
| Vuln: Mozilla Firefox/SeaMonkey CVE-2013-0794 Information Disclosure Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-1959 Security Bypass Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/Seamonkey CVE-2012-1961 Clickjacking Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-1972 Use-After-Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-1973 Use-After-Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3959 Use-After-Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3962 Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3966 Multiple Memory Corruption Vulnerabilities |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3967 Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3970 Use-After-Free Memory CorruptionVulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3971 Multiple Memory Corruption Vulnerabilities |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3978 Security Bypass Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4179 Use After Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-5836 Denial of Service Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0757 Security Bypass Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0761 Use After Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0763 Use After Free Memory Corruption Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0771 Heap Buffer Overflow Vulnerability |
| Vuln: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2012-91 through -106 Multiple Vulnerabilities |
| Vuln: M-Player '.mp3' File Denial Of Service Vulnerability |
| Vuln: Multiple Asterisk Products CVE-2012-5977 Denial of Service Vulnerability |
| Vuln: Multiple Honeywell Products 'HscRemoteDeploy.dll' Activex Remote Code Execution Vulnerability |
| Vuln: Multiple Horde Products Multiple Unspecified HTML Injection Vulnerabilities |
| Vuln: Multiple Products Cookie Authentication Bypass Vulnerability |
| Vuln: Multiple SonicWALL Products CVE-2013-1359 Authentication Bypass Vulnerability |
| Vuln: Multiple Symantec Products CAB Files Handling Memory Corruption Vulnerability |
| Vuln: Mutiny CVE-2012-3001 Command Injection Vulnerability |
| Vuln: MySQL MyISAM Table Symbolic Link CVE-2012-4452 Local Privilege Escalation Vulnerability |
| Vuln: Naxsi 'naxsi_unescape_uri()' Function Security Bypass Vulnerability |
| Vuln: NetIQ Privileged User Manager 'ldapagnt_eval()' Remote Code Execution Vulnerability |
| Vuln: Network UPS Tools (NUT) 'addchar()' Function Buffer Overflow Vulnerability |
| Vuln: nfs-utils 'rpc.gssd' DNS Spoofing Vulnerability |
| Vuln: nspluginwrapper Private Browsing Flash Player Storage Local Information Disclosure Vulnerability |
| Vuln: NTR ActiveX control Buffer Overflow and Remote Code Execution Vulnerabilities |
| Vuln: NVIDIA Graphics Driver for Windows CVE-2013-0109 Local Privilege Escalation Vulnerability |
| Vuln: NVIDIA Graphics Driver for Windows CVE-2013-0110 Local Privilege Escalation Vulnerability |
| Vuln: NVIDIA Graphics Driver for Windows CVE-2013-0111 Local Privilege Escalation Vulnerability |
| Vuln: Open Handset Alliance Android Dailer Remote Denial of Service Vulnerability |
| Vuln: OpenCart 'filemanager.php' Multiple Directory Traversal Vulnerabilities |
| Vuln: OpenPLI Shell Command Execution and Multiple HTML Injection Vulnerabilities |
| Vuln: OpenStack Nova CVE-2012-3361 Memory Corruption Vulnerability |
| Vuln: OpenStack Nova CVE-2012-3447 Memory Corruption Vulnerability |
| Vuln: OpenVPN 'openvpn_decrypt()' Function Information Disclosure Vulnerability |
| Vuln: Oracle Business Transaction Management Server Arbitrary File Write Vulnerability |
| Vuln: Oracle Database Mobile/Lite Server CVE-2013-0363 Remote Vulnerability |
| Vuln: Oracle E-Business Suite CVE-2012-3190 Remote Security Vulnerability |
| Vuln: Oracle E-Business Suite CVE-2013-0376 Remote Security Vulnerability |
| Vuln: Oracle Java Runtime Environment CVE-2012-1682 Remote Code Execution Vulnerability |
| Vuln: Oracle Java Runtime Environment CVE-2013-2423 Security Bypass Vulnerability |
| Vuln: Oracle Java SE CVE-2012-0506 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2012-0547 Remote Java Runtime Environment Weakness |
| Vuln: Oracle Java SE CVE-2012-1533 Remote Code Execution Vulnerability |
| Vuln: Oracle Java SE CVE-2012-1541 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2012-1713 Remote Code Execution Vulnerability |
| Vuln: Oracle Java SE CVE-2012-5070 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2012-5074 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2012-5085 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2012-5088 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2013-0351 Java Runtime Environment Remote Security Vulnerability |
| Vuln: Oracle Java SE CVE-2013-0409 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2013-0423 Java Runtime Environment Remote Security Vulnerability |
| Vuln: Oracle Java SE CVE-2013-0426 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2013-0433 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2013-0443 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2013-1489 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle Java SE CVE-2013-2429 Remote Java Runtime Environment Vulnerability |
| Vuln: Oracle JD Edwards EnterpriseOne Tools CVE-2012-1678 Remote Security Vulnerability |
| Vuln: Oracle MySQL CVE-2012-2122 User Login Security Bypass Vulnerability |
| Vuln: Oracle MySQL CVE-2013-1531 Remote MySQL Server Vulnerability |
| Vuln: Oracle MySQL CVE-2013-1552 Remote MySQL Server Vulnerability |
| Vuln: Oracle MySQL CVE-2013-2375 Remote MySQL Server Vulnerability |
| Vuln: Oracle MySQL Server CVE-2013-0367 Remote Security Vulnerability |
| Vuln: Oracle MySQL Server CVE-2013-0389 Remote Security Vulnerability |
| Vuln: Oracle MySQL Server CVE-2013-1544 Remote Security Vulnerability |
| Vuln: Oracle MySQL Server Heap Overflow Vulnerability |
| Vuln: Oracle Outside In Technology CVE-2012-1768 Remote Code Execution Vulnerability |
| Vuln: Oracle Outside In Technology CVE-2012-3106 Remote Code Execution Vulnerability |
| Vuln: Oracle Solaris CVE-2012-3187 Local Security Vulnerability |
| Vuln: Oracle Solaris CVE-2012-3209 Local Security Vulnerability |
| Vuln: Oracle Solaris CVE-2012-3211 Local Security Vulnerability |
| Vuln: Oracle Sun Products Suite CVE-2012-3126 Local Solaris Cluster Vulnerability |
| Vuln: OTRS 'Body' Field HTML Injection Vulnerability |
| Vuln: Perl Config::IniFiles Module Insecure Temporary File Creation Vulnerability |
| Vuln: Perl Dancer.pm CVE-2012-5572 HTTP Header Injection Vulnerability |
| Vuln: PHP '_php_stream_scandir()' Buffer Overflow Vulnerability |
| Vuln: PHP 'header()' HTTP Header Injection Vulnerability |
| Vuln: PHP 'main/SAPI.c' CVE-2012-4388 HTTP Header Injection Vulnerability |
| Vuln: phpMyAdmin 'server_sync.php' Backdoor Vulnerability |
| Vuln: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability |
| Vuln: Pixman CVE-2013-1591 Stack-Based Buffer Overflow Vulnerability |
| Vuln: PostgreSQL 'SECURITY DEFINER' and 'SET' Attributes Remote Denial of Service Vulnerability |
| Vuln: Privoxy Proxy Authentication Information Disclosure Vulnerabilities |
| Vuln: ProFTPD Race Condition Local Privilege Escalation Vulnerability |
| Vuln: Python CGIHTTPServer Module Information Disclosure Vulnerability |
| Vuln: Python pip CVE-2013-1888 Insecure Temporary File Creation Vulnerability |
| Vuln: QEMU KVM QXL Local Denial of Service Vulnerability |
| Vuln: QEMU KVM 'virtio-blk' Driver Local Privilege Escalation Vulnerability |
| Vuln: QNX Qconn Remote Arbitrary Command Execution Vulnerability |
| Vuln: Qt 'QSslSocket::sslErrors()' Certificate Validation Security Weakness |
| Vuln: Quick Post Widget Plugin Cross Site Scripting and Cross Site Request Forgery Vulnerabilities |
| Vuln: Rack Multiple Denial of Service Vulnerabilities |
| Vuln: Rack 'Rack::File()' Insecure Temporary File Creation Vulnerability |
| Vuln: Rack Timing Attack Remote Code Execution Vulnerability |
| Vuln: Real Networks RealPlayer Write Access Violation Arbitrary Code Execution Vulnerability |
| Vuln: Red Hat Certificate System CVE-2013-1885 Multiple Cross Site Scripting Vulnerabilities |
| Vuln: Red Hat Certificate System CVE-2013-1886 Format String Vulnerability |
| Vuln: Resource Hacker Heap Based Buffer Overflow Vulnerability |
| Vuln: RETIRED: Adobe Reader and Acrobat APSB13-15 Prenotification Multiple Vulnerabilities |
| Vuln: RETIRED: Apple QuickTime Prior To 7.7.3 Multiple Arbitrary Code Execution Vulnerabilities |
| Vuln: RETIRED: BackupPC 'RestoreFile.pm' Cross Site Scripting Vulnerability |
| Vuln: RETIRED: MantisBT SOAP API CVE-2012-2691 Security Bypass Vulnerability |
| Vuln: RETIRED: Microsoft August 2012 Advance Notification Multiple Vulnerabilities |
| Vuln: RETIRED: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2012-88/89 Multiple Vulnerabilities |
| Vuln: RETIRED: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2013-01 through -20 Multiple Vulnerabilities |
| Vuln: RETIRED: Open Realty 'select_users_lang' Parameter Local File Include Vulnerability |
| Vuln: RETIRED: Oracle Java Runtime Environment Multiple Security Vulnerabilities |
| Vuln: RETIRED:Microsoft Internet Explorer CVE-2013-1313 Use-After-Free Remote Code Execution Vulnerability |
| Vuln: Ruby '#to_s' Method Incomplete Fix Security Bypass Vulnerability |
| Vuln: Ruby multi_xml CVE-2013-0175 Remote Arbitrary Command Execution Vulnerability |
| Vuln: Ruby Phusion Passenger Gem CVE-2013-2119 Insecure Temporary File Creation Vulnerability |
| Vuln: RubyGems SSL Certificate Validation Security Bypass Vulnerability |
| Vuln: RubyGems 'thumbshooter' Remote Command Execution Vulnerability |
| Vuln: Samba CVE-2013-0172 Remote Security Bypass Vulnerability |
| Vuln: Samba SWAT Cross Site Request Forgery and Clickjacking Vulnerabilities |
| Vuln: Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities |
| Vuln: Serva CVE-2013-0145 Remote Buffer Overflow Vulnerability |
| Vuln: sflog! 'section' Parameter Local File Include Vulnerability |
| Vuln: sflog! 'uploadContent.inc.php' Arbitrary File Upload Vulnerability |
| Vuln: Schneider Electric Accutech Manager Heap Buffer Overflow Vulnerability |
| Vuln: Siemens SIMATIC WinCC Multiple Security Vulnerabilities |
| Vuln: Spree 'spree_auth_devise' Security Bypass Vulnerability |
| Vuln: SquidClamav URL Parsing Denial of Service Vulnerability |
| Vuln: Symantec Messaging Gateway CVE-2012-0308 Cross Site Request Forgery Vulnerability |
| Vuln: TCExam Prior 11.3.008 Multiple SQL Injection Vulnerabilities |
| Vuln: TeeChart Professional ActiveX Remote Integer Overflow Vulnerability |
| Vuln: Telepathy-Gabble CVE-2013-1769 NULL Pointer Dereference Denial of Service Vulnerability |
| Vuln: TomatoCart 'json.php' Security Bypass Vulnerability |
| Vuln: Tor Remote Denial of Service Vulnerability |
| Vuln: TrouSerS CVE-2012-0698 Denial Of Service Vulnerability |
| Vuln: Twig Templates Directory Traversal Vulnerability |
| Vuln: TYPO3 Core TYPO3-CORE-SA-2012-001 Multiple Remote Security Vulnerabilities |
| Vuln: Ushahidi Multiple Security Vulnerabilities |
| Vuln: Vanilla Forums AboutMe Plugin HTML Injection Vulnerabilities |
| Vuln: Vanilla Forums LatestComment Plugin Discussion Title HTML Injection Vulnerability |
| Vuln: Vino CVE-2012-4429 Information Disclosure Vulnerability |
| Vuln: VLC Media Player HTML Subtitle Multiple Buffer Overflow Vulnerabilities |
| Vuln: VMware OVF Tool OVF File CVE-2012-3569 Format String Vulnerability |
| Vuln: VxWorks CVE-2013-0715 Remote Denial of Service Vulnerability |
| Vuln: VxWorks SSH Server CVE-2013-0711 Denial of Service Vulnerability |
| Vuln: VxWorks SSH Server CVE-2013-0712 Denial of Service Vulnerability |
| Vuln: VxWorks Web Server CVE-2013-0716 Remote Denial of Service Vulnerability |
| Vuln: WAGO IPC 758-870 Hardcoded Password Security Bypass Vulnerability |
| Vuln: WebKit Cross Site Scripting Filter 'XSSAuditor.cpp' Security Bypass Vulnerability |
| Vuln: WeeChat Color Decoding Heap Buffer Overflow Vulnerability |
| Vuln: WellinTech KingView CVE-2012-4711 Memory Corruption Vulnerability |
| Vuln: Wind River Systems VxWorks CVE-2013-0713 Denial of Service Vulnerability |
| Vuln: Wind River Systems VxWorks CVE-2013-0714 Denial of Service Vulnerability |
| Vuln: Wireshark ASN.1 BER Dissector CVE-2013-3556 Denial of Service Vulnerability |
| Vuln: Wireshark Buffer Underflow and Denial of Service Vulnerabilities |
| Vuln: Wireshark DCP ETSI Dissector NULL Pointer Dereference Denial of Service Vulnerability |
| Vuln: Wireshark DTLS Dissector Denial of Service Vulnerability |
| Vuln: Wireshark DTN Dissector Denial of Service Vulnerability |
| Vuln: Wireshark ETCH Dissector Denial of Service Vulnerability |
| Vuln: Wireshark Information Disclosure and Denial of Service Vulnerabilities |
| Vuln: Wireshark MS-MMC Dissector Denial of Service Vulnerability |
| Vuln: Wireshark NTLMSSP Dissector Buffer Overflow Vulnerability |
| Vuln: Wireshark PER Dissector Denial of Service Vulnerability |
| Vuln: Wireshark Websocket Dissector Denial of Service Vulnerability |
| Vuln: Wireshark Websocket Dissector 'packet-websocket.c' Denial of Service Vulnerability |
| Vuln: WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability |
| Vuln: WordPress Cimy User Manager Plugin Arbitrary File Disclosure Vulnerability |
| Vuln: WordPress FireStorm Professional Real Estate Plugin 'id' Parameter SQL Injection Vulnerability |
| Vuln: WordPress User Photo '$_SERVER['REQUEST_URI']' Parameter Cross Site Scripting Vulnerability |
| Vuln: WordPress WP Cleanfix Plugin Cross Site Request Forgery Vulnerability |
| Vuln: WordPress WP cleanfix Plugin 'eval()' Function Cross Site Request Forgery Vulnerability |
| Vuln: X.Org libX11 CVE-2013-1981 Multiple Remote Code Execution Vulnerabilities |
| Vuln: X.Org libX11 CVE-2013-1997 Multiple Remote Code Execution Vulnerabilities |
| Vuln: X.Org libX11 CVE-2013-2004 Multiple Denial of Service Vulnerabilities |
| Vuln: X.Org libXfixes 'XFixesGetCursorImage()' Function Remote Code Execution Vulnerability |
| Vuln: X.Org libXtst CVE-2013-2063 Remote Code Execution Vulnerability |
| Vuln: X.Org libXxf86dga CVE-2013-1991 Multiple Remote Code Execution Vulnerabilities |
| Vuln: X.Org libXxf86dga CVE-2013-2000 Multiple Remote Code Execution Vulnerabilities |
| Vuln: X.Org X11 File Enumeration Information Disclosure Vulnerability |
| Vuln: Xen 'ELF' Parser Multiple Security Vulnerabilities |
| Vuln: Xen PV Domain Builder Kernel Decompression Local Denial Of Service Vulnerability |
| Vuln: Xfig and Transfig '.fig' File Buffer Overflow Vulnerability |
| Vuln: YUI 'SWF' File Unspecified Security Vulnerability |
| Vuln: ZEN Load Balancer Multiple Security Vulnerabilities |
| Vuln: ZeroClipboard 'ZeroClipboard10.swf' Cross Site Scripting Vulnerability |
| Vulnerabilities in L-Soft's LISTSERV and Microsoft's Visual Studio |
| Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution (913433) |
| Vulnerabilities in phpMyAdmin, Dell's TrueMobile 2300 Wireless Router and couple of PoC exploits. |
| Vulnerabilities in RFID-enabled credit cards |
| Vulnerabilities in Symantec Products, Dabber Worm, Empty .zip File Attachments |
| Vulnerability Assessment Program - Discussions, (Sat, May 5th) |
| Vulnerability Exploit for Snow Leopard, (Sat, May 5th) |
| Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (913580) |
| Vulnerability in Microsoft Exchange Could Allow Remote Code Execution (916803) |
| Vulnerability in proprietary NVIDIA driver for Linux |
| Vulnerability in tcpdump, Increase in UDP/1027 activity, Save Your Ship article |
| w00tw00t |
| W32.Netsky.Q@mm Code indicates a DoS attack |
| W32/Feebs again |
| W32/HLLP.Phillis.bq - Early release of McAfee DAT file |
| Walgreens To Build First Self-Powered Retail Store |
| Wal-Mart To Join Amazon In Providing In-Store Locker Service |
| Want To Buy a Used Spaceport? |
| Wanted: Hackers For Large-Scale Attacks On American Banks |
| Warp Drive Might Be Less Impossible Than Previously Thought |
| Was the Brazilian version of Google hijacked two days ago? |
| Wash. officials say state courts office was hacked |
| Washington's Exploding Manholes Explained? |
| Water Bottle Fills Itself From the Air |
| Watchdog "Not Ready" To Probe Cookie Complaints |
| WD Builds High-Capacity, Helium-Filled HDDs |
| WD Explains Its Windows-Only Software-Based SSHD Tech |
| We Didn't Need Google's Schmidt To Tell Us Android and Chrome Wouldn't Merge |
| We Gonna Do What They Say Can't Be Done |
| We The People</em> Petition Signature Requirement Bumped To 100,000 |
| Weak Passwords Still Subvert IT Security |
| Weakened password hashing found in Cisco devices |
| Web attacks use smart redirection to evade URL security scanners |
| Web based GDI Vulnerability Scanner; Yet even more fun with bots; Spybot.Worm and Gaobot; MSN Chat access troubles |
| Web Log Analysis and Defense with Mod_Rewrite |
| WebCalendar Exploitation |
| Webcast archive available |
| WEBDAV Exploits on the rise |
| Website of North Korea human rights group also hacked |
| Website Pitches Scientific Solutions In Search of Problems |
| Website vulnerabilities fall, but hackers become more skilled |
| Website with Malware |
| Week of Oracle 0-Day |
| Week of Oracle bugs cancelled |
| Weekend blues |
| Weekend Predictions. |
| Weekend Vulnerability Roundup |
| Weev gets 41 months in prison for exposing iPad strokers' privates |
| Welcome New Users; SANSFIRE; Webcast Date Change; Emerging Threats |
| Well, it has always worked well, even in Production . . . until just recently. |
| Wells Fargo website hit by access issues amid cyber threats |
| We're Phull... Article about Bank Fraud. Google Strangeness. SSH Probe Reveals Big-Time Hack. |
| WFTPD Patch available, Dell Open Manager vulnerability |
| WFTPD unpatched exploit and potential DDoS against anti-spyware forums |
| What Appsec can learn from Devops |
| What are my plans for the IOD 2012 Conference next week in Las Vegas |
| What Are the Unwritten Rules of Deleting Code? |
| What are you Concerned the Most in 2016? |
| What are YOU doing to give back to the security community? |
| What are your 2017 infosec predictions? |
| What Birds Know About Fractal Geometry |
| What can I say? |
| What can IT learn from CE? |
| What Can You Find Out From Metadata? |
| What crime is this? |
| What do the bad guys do with WMF? |
| What do you do Matt? |
| What Does a Pentest Look Like? |
| What Early Software Was Influential Enough To Deserve Acclaim? |
| What Happened To Diaspora, the Facebook Killer? It's Complicated |
| What Happens To Google Employees When They Die? |
| What I should have said today at IDUG about EXPLAIN and DB2 10 for z/OS |
| What if..... |
| What I'm reading today |
| What is Cloud? Infrastructure as a Service |
| What is Cloud? Platform as a Service |
| What is Cloud? Software as a Service |
| What is DB2 for z/OS Accounting Class 2 Not Accounted Time? - - A follow-up |
| What is Normal? Fake RedHat Advisory; JPEG Repair Utility |
| What is the purpose of canonical data model? |
| What is this "/smoke/" about? |
| What should I do with these gift cards? |
| What Signs Are You Missing? |
| What the new IBM PureData System for Analytics N2001 could do for the DB2 Analytics Accelerator |
| What To Do After You Fire a Bad Sysadmin Or Developer |
| What To Do When an Advised BIOS Upgrade Is Bad? |
| What To Do With Those First Generation Photo Frames? |
| What to watch out For on Election Day, (Tue, Nov 6th) |
| What to watch with your FIM? |
| What WAN Optimization Can Teach SDN about Tunneling |
| What Was Old is New Again: Honeypots! |
| What will 2006 have in store? |
| What will the big security stories of 2007 be? |
| What You Can Do About the Phone Unlocking Fiasco |
| What You Need To Know About Phone Unlocking |
| What? No URL? |
| What’s the point of application pen testing? |
| Whatever Happened to tmUnblock.cgi ("Moon Worm") |
| What's a super.proxy.scanner and why is it in my logs? |
| What's Cool at #MC13LV and Why You Should Care |
| What's important on your network?, (Sun, Nov 4th) |
| What's In Store For 2004! |
| What's in your DB2 for z/OS library? |
| What�s Running on Your Network? |
| What's the situation this week for Neutrino and Angler EK? |
| What's the threat? And who is noticing it? Nyxem_e versus CME 508 |
| What's up on Port 139? |
| What's up with Oracle and Sun? |
| When encoding saves the day |
| When Google Got Flu Wrong |
| When Hotel Alarms Sound, (Fri, Jun 14th) |
| When Hunting BeEF, Yara rules (Part 2) |
| When Hunting BeEF, Yara rules. |
| When solid state drives should be part of your enterprise storage strategy |
| Where are all of the articles? |
| Where does all the data come from? |
| Where Have All the Gadgets Gone? |
| Where the Candidates Stand On Net Neutrality |
| Which Debian-based Linux distributions work best for me and why |
| While working for spies, Snowden was secretly prolific online |
| White House launches coordinated effort to battle botnets |
| White House Pulls Down TSA Petition |
| White House pushes for stalled cybersecurity bill |
| White House raises concerns over CISPA bill |
| White House review reportedly clears Huawei of spy charges |
| White House said to plan executive order on cybersecurity |
| White House threatens veto of CISPA bill |
| White House: Use Metric If You Want, We Don't Care |
| White House-ordered review found no evidence of Huawei spying: sources |
| Who Holds the Keys? |
| Who is' your friend! |
| Who needs .info/.biz, anyway ? ; Cisco IPV6 vuln ; NIST minimum security requirements |
| Who ya gonna contact?, (Sun, Aug 26th) |
| WHO: Intellectual Property Claims Hindering Research On Deadly Novel Coronavirus |
| Whole Rack Servers |
| Who's Attacking Me? |
| Who's tracking phone calls that target your computer? Stay Tuned to the ISC, (Sun, Apr 29th) |
| WHSmith Putting DRM In EBooks Without Permission From the Authors |
| Why America Is Losing the War Against China's Hacker Spies |
| Why America's School "Lag" Has Never Mattered |
| Why Apple Is Suing Every Android Manufacturer In Sight |
| Why are Syrian hackers targeting Western media Twitter accounts? |
| Why Bad Directors Aren't Thrown Out |
| Why Big Data Could Sink Europe's 'Right To Be Forgotten' |
| Why Can't We Be Friends? |
| Why Corporate File Sharing Services Can't Compete |
| Why DOJ Didn't Need a "Super Search Warrant" To Snoop On Fox News' E-mail |
| Why Everyone Gets It Wrong About BYOD |
| Why I Hate Synonyms, Part II: NON-EXISTENT Issues |
| Why I think you should try Bro, (Mon, Feb 25th) |
| Why Iron Dome Might Only Work For Israel |
| WHY IT MATTERS: Cybersecurity |
| Why It's Bad That Smartphones Have Banished Boredom |
| Why JavaScript Is the New Perl |
| Why Mars Is Not the Limit For Human Space Flight |
| Why Microsoft Got Into the Console Business |
| Why Microsoft Office For iOS Will Likely Never See the Light of Day |
| Why Ray Kurzweil's Google Project May Be Doomed To Fail |
| Why risk management can succeed in IT |
| Why shy away from Volunteering Opportunities |
| Why Social Media is not CNN or BBC or The Times of Lithuania |
| Why Ultrabooks Are Falling Well Short of Intel's Targets |
| Why Users Fall For Ransomware |
| Why We'll Never Meet Aliens |
| Why Working Remotely Needs To Make a Comeback |
| Why Worms In the Toilet Might Be a Good Idea |
| Why Would a Mouse Need To Connect To the Internet? |
| Why Your Next Phone Will Include Biometric Security |
| wicd Local Privilege Esclation Exploit |
| Widespread Compromise Of Yahoo-Backed Email In New Zealand |
| Widespread Routing Outages |
| Widespread use of RPC DCOM Exploit |
| WiFi Device Driver Issues |
| Wi-Fi Enabled Digital Cameras Easily Exploitable |
| WiFi Still Remains a Good Attack Vector |
| Wi-Fi Worm Rumors |
| WikiLeaks Party Launching This Week |
| Wikileaks Releases Docs Before Trial of TPB Founder Warg |
| WikiLeaks' secrets weren't, says former MI5 chief |
| WikiLeaks to publish security think tank emails (Reuters) |
| Wikimedia Foundation Launches Wikivoyage |
| Wikipedia Scandal: High Profile Users Allegedly Involved In Paid-Editing |
| Will Developers Finally Start Coding On the iPad? |
| Will Legitimacy Spoil Bitcoin? |
| Will Obama preside over the coming of Big Brother? |
| Will the <em>Star Citizen</em> Project Fund Linux and Mac Ports For CryENGINE 3? |
| Will Your Next iPhone Be Built By Robots? |
| Willpower |
| Wilma Lessons Learned |
| Win XP SP 2 and You |
| Winamp 5.x Remote Code Execution via Playlists |
| Winamp buffer overflow |
| Winamp Vulnerability / IFrame - more info / Following the Bouncing Malware - IV |
| Window Injection Vulnerability in Browsers/Request for Specific UDP Fragment Data |
| Window Size 55808 packets |
| Windows "Atom Bombing" Attack |
| Windows 0 day exploit? ; Yet another trojan; .US resolution response; How to identify when your DNS is not poisoned; and a last minute query tcp port 7393 |
| Windows 10 and System Protection for DATA Default is OFF |
| Windows 10 Anniversary Update Available |
| Windows 7 Still Being Sold On Up To 93% of British PCs |
| Windows 8 Defeats 85% of Malware Detected In the Past 6 Months |
| Windows 8 Changes Host File Blocking |
| Windows 8 Security: What's New |
| Windows 8 will require immediate activation |
| Windows 98 support extended. Reports of SQL Slammer, Solaris TTYPROMPT compromises |
| Windows Alternate Data Streams Revisited |
| Windows Blue 9364 Screenshots Show Feature Enhancements |
| Windows buffer overflow protection |
| Windows Command-Line Kung Fu with WMIC |
| Windows Defender expires today |
| Windows Events log for IR/Forensics ,Part 1 |
| Windows Events log for IR/Forensics ,Part 2 |
| Windows Firewall Article; Hardware Firewall; Follow up on Previous Diaries |
| Windows HIDS; Port 80, IP-hopping scan;Why old exploits are still popular; A Simple Phishing Investigation Tip |
| Windows local privilege escalation - Windows access control |
| Windows Media Player - ASX Playlist Buffer Overflow |
| Windows Phone 8 Users Hit Some Snags |
| Windows Phone Actually Gaining Market Share In Some Countries |
| Windows RT Jailbreak Tool Released |
| Windows Service Accounts - Why They're Evil and Why Pentesters Love them! |
| Windows Service Trusted Path Privilege Escalation |
| Windows Source Code; How to Detect ASN.1 Exploits |
| Windows Vista Firewall |
| Windows Vista security patches |
| Windows WMIObjectBroker 0-Day Exploit |
| Windows XP SP2 Experience Forum / Exchange 5.5 Security Bulletin / Mac OS X Bulletins |
| Windows XP SP2 Patch released; New phpBB Release; Apple Java Update; Wireless Standards |
| Windows XP Support Extended |
| WinGate HTTP proxy vulnerability, remote DoS & Code Execution |
| WinGate Update |
| Winners of Bonus Points from Yesterday’s FTBM |
| WinRAR and RAR 3.51 Released |
| WINS increase, UDP Mystery Solved(?), Black Tuesday Teaser |
| WINS Server Vulnerability - Password Aging |
| winsnort defaced - use caution |
| Winternals/SysInternals acquired by Microsoft |
| WinZip 10.0 build 7245 released |
| WinZip Vulnerabilities Highlight User Threat |
| Wipe the drive! Stealthy Malware Persistence - Part 2, (Thu, Mar 14th) |
| Wipe the drive! Stealthy Malware Persistence - Part 4, (Fri, Mar 22nd) |
| Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1, (Wed, Mar 13th) |
| Wireless security? |
| Wireless Thoughts - Part II; Netgear Vulnerabilties;Phishing Creativity |
| Wireshark (ex Ethereal) multiple vulnerabilities |
| Wireshark 1.10.0rc2 is now available http://www.wireshark.org/download.html, (Thu, May 23rd) |
| Wireshark Fixes Several Bugs and Vulnerabilities |
| Wireshark releases v1.8.5 and 1.6.13 - http://www.wireshark.org/download.html and http://www.wireshark.org/docs/relnotes/, (Wed, Jan 30th) |
| Wireshark Vulnerability |
| With Customers, Emotion, not Reason, the Key to Buying Decisions |
| With Every Patch Tuesday there is a Black Wednesday, Juniper Update, COAST (adware-spyware) is toast, Virus Spreading through MSN?, Comcast downtime |
| With troops and techies, U.S. prepares for cyber warfare |
| Witty Traffic Request / Mailbag |
| Witty Worm Wrap-up |
| WMF and Indexing |
| WMF FAQ |
| WMF Generator |
| WMF mitigation may cause printer problems. |
| WMF: patches and workarounds explained |
| WMF: Status of Windows 98 and Windows ME ? |
| Word 0-day, recommended defenses. |
| Word macro trojan dropper and (another) downloader |
| Word Zero-Day, So Sayeth Microsoft |
| Wordpress 3.5.1 |
| Wordpress Plugin spider calendar Multiple Vulnerabilities |
| WordPress security update patches external libraries, several vulnerabilities |
| Wordpress to accept Bitcoin without confirmations |
| Working with base64 |
| World of Warcraft Character Becomes Campaign Issue |
| World of Warcraft Loses 1.3 Million Players in First Quarter of 2013 |
| worldnic DNS servers down |
| Worldnic outage |
| World's First Bitcoin ATM |
| World's First Linux Powered Rifle Announced |
| World's Oldest Tumor Found In a Neanderthal Bone |
| Worldwide Shortage of Barium |
| Worm manipulates databases in Iran |
| Worth Reading: Bypassing Windows' Address Space Layout Randomisation |
| Worth Reading: Confessions of a botnet operator |
| Worth Reading: Dropbox is "quite secure" |
| Would Charles Darwin Have Made a Good Congressman? |
| WoW cities wiped out by 'exploit' |
| Woz Applying For Australian Citizenship Because of the NBN |
| Woz Worries Microsoft Is Now More Innovative Than Apple |
| Wozniak On the Samsung Patent Verdict |
| Wrap-up: What? No Link? |
| Wrong Fuel Chokes Presidential Limo |
| WS domain, audio applications, and IP addressing |
| WS_FTP buffer overflow, DomainKeys effective?, Phishing explained |
| WTFM: Write the Freaking Manual |
| www.sco.com unreachable |
| x86_64 Linux bind TCP port shellcode |
| XBMC 12.0 'Frodo' Released: PVR-Support, HD Audio and More |
| Xbox 360 credit card slurp alert under fire |
| Xbox 720 Could Require Always-On Connection, Lock Out Used Games |
| Xbox Originator: "Stupid, Stupid Xbox!!" |
| Xen-Based Secure OS Qubes Hits 1.0 |
| Xirrus Primes the 802.11ac Pump |
| xkcd on a Bad Threat Model |
| Xkcd's Long-running "Time" Comic: Work of Art Or Nerd Sniping? |
| XML RPC worm - New Variant - ELF_LUPPER.B |
| XML-RPC for PHP Vulnerability Attack |
| xmlrpc.php - Are you patched? |
| XP local privilege escalation demonstated |
| XP SP2 Preview, Apache Update,Don't click on that attachment |
| XP SP2 Release to manufacturing, and Continued Scanning Trends |
| X-Ray Laser For Creating Supercharged Particles |
| xt:Commerce <= v3.04 SP2.1 Time Based Blind SQL Injection |
| Xtreme RAT 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability |
| YAFP (Yet Another Flash Patch) |
| Yahoo Board Approves a $1.1B Pricetag For Tumblr |
| Yahoo Buys UK Teen's Smartphone News App |
| Yahoo debuts trailer for Anthony Zuiker's "Cybergeddon" |
| Yahoo Messenger critical update |
| Yahoo Messenger worm?; exploited.lsass.cc bot traffic |
| Yahoo! et al Status |
| Yahoo! Japan says 22 MEELLION User IDs may have been nabbed |
| Yahoo! Login Server Problems |
| Yahoo! mass-mailer |
| Yahoo! user account phishing |
| Yahoo's Code Verification; Prevalent of Malcodes; Hidden File Finding Problem in XP Pro and Home |
| Yatze telnet worm; InfoCon update; rlogin link to telnet maybe? |
| Year End Poll |
| Year End Surveys |
| Yellow: MSIE VML exploit spreading |
| Yellow: WebViewFolderIcon setslice exploit spreading |
| Yes Virginia, Stored XSS's Do Exist! |
| Yet another Adobe Flash Player Update |
| Yet Another Bagle |
| Yet another hacked web site–This time it’s NVidia |
| Yet Another IE Flaw (YAIEF) |
| Yet another MSIE 0-day: VML |
| Yet another OSX/Java Trojan spotted in the wild |
| You dirty RAT: Trend Micro spots new Asia-wide attack |
| You Have Got a New Audio Message - Guest Diary by Pasquale Stirparo |
| You know about XSS. How about XSRF/CSRF? |
| You never know...; Exploit for MS04-038 |
| Young Students Hiding Academic Talent To Avoid Bullying |
| Your Bill Is Not Overdue today! |
| Your Security Policy Is So Lame |
| Your SSH Server On Port 8080 Is No Longer "Hidden" Or "Safe" |
| You're not cool enough for some malware |
| YouTube Alters Copyright Algorithms, Will 'Manually' Review Some Claims |
| YouTube is 8 years old. Here’s the first video ever uploaded to the site! |
| YYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update, (Tue, Aug 21st) |
| YYABCAU - Yes Yet Another Bleeping Critical Adobe Flash Update, (Tue, Aug 21st) |
| Zen approach to backups |
| Zero Day MySQL Buffer Overflow, (Sun, Dec 2nd) |
| Zeroday Emergency Response Team (ZERT) |
| ZIP With Comment |
| zlib Security Vulnerability; Protecting Your Privacy |
| ZoneAlarm shutdown problem update, MS Black Tuesday |
| ZoneAlarm Update, RoadRunner Email, Network Monitoring, Mailbag |
| ZTE drops spy tech subsidiary |
| ZTE posts a first quarterly loss, margins bleed |
| ZTE sharpens focus on high-end smartphones to boost margins |
| |