Wednesday, February 29, 2012

Google Alert - Metasploit

=== Web - 2 new results for [Metasploit] ===

Metasploit Low Level View ≈ Packet Storm
Whitepaper called Metasploit: Low Level View. It touches on topics such as
code injection and malware detection evasion / Metasploit encoders. tags |
paper ...
<http://packetstormsecurity.org/files/110259/metasploit-lowlevel.pdf>

Db_autopwn Not Working In Metasploit V4.2.0 - Hak5 Forums
Hi there i have some issue related metasploit v4.2.0. i just update it from
3 to 4.2. 0. now when i going to try db_autopwn option it just say ...
<http://forums.hak5.org/index.php?showtopic=25624>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 8 new results for [Vulnerabilities] ===

Grindr hack probed by Congress
Sydney Morning Herald
The popular gay hook-up app Grindr, which spawned a sexual revolution in
Australia and across the world, is facing an investigation by the US
Congress after it emerged that a number of vulnerabilities allowed for the
app to be easily hacked.
<http://www.smh.com.au/technology/technology-news/grindr-hack-probed-by-congress-20120228-1u135.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.smh.com.au/technology/technology-news/grindr-hack-probed-by-congress-20120228-1u135.html&hl=en&geo=us>

Windows Phone, Only Smartphone OS Not Affected by Webkit Malware
Vulnerability
Zunited
George Kurtz, CEO of the security firm CrowdStrike warns of a new
vulnerability in Webkit based mobile browsers. Webkit is the mobile browser
kit which most major smart phone OS's use as their mobile web browser. The
vulnerability that CrowdStrike ...
<http://zunited.net/2012/02/windows-phone-only-smartphone-os-not-affected-by-webkit-malware-vulnerability/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://zunited.net/2012/02/windows-phone-only-smartphone-os-not-affected-by-webkit-malware-vulnerability/&hl=en&geo=us>

Report: Anonymous Turns To Denial Of Service Attacks As A Last Resort
Forbes
On Day 19, the group started scanning the target's Web site, looking for
vulnerabilities such as cross-site scripting (XSS), SQL injection, and
Directory Trasversal. What Imperva learned from its logs during this period
were the exact tools used by ...
<http://www.forbes.com/sites/robertvamosi/2012/02/28/report-anonymous-turns-to-denial-of-service-attacks-as-a-last-resort/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.forbes.com/sites/robertvamosi/2012/02/28/report-anonymous-turns-to-denial-of-service-attacks-as-a-last-resort/&hl=en&geo=us>

LockPath Joins McAfee Security Innovation Alliance
MarketWatch (press release)
Under the auspices of the McAfee SIA program, LockPath will integrate its
Keylight platform with McAfee Vulnerability Manager, McAfee(R) ePolicy
Orchestrator(R) platform, and McAfee Policy Auditor. McAfee SIA enables
customers to leverage their ...
<http://www.marketwatch.com/story/lockpath-joins-mcafee-security-innovation-alliance-2012-02-28>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/lockpath-joins-mcafee-security-innovation-alliance-2012-02-28&hl=en&geo=us>

Secunia PSI 3.0 Beta: plugging security vulnerabilities made easy
The H
Danish security services provider Secunia has announced the availability of
a public beta for version 3.0 of its Personal Software Inspector (PSI)
application for identifying security vulnerabilities. PSI scans Windows
systems for known security ...
<http://www.h-online.com/security/news/item/Secunia-PSI-3-0-Beta-plugging-security-vulnerabilities-made-easy-1444210.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.h-online.com/security/news/item/Secunia-PSI-3-0-Beta-plugging-security-vulnerabilities-made-easy-1444210.html&hl=en&geo=us>

'Anatomy of an Anonymous Attack' Laid Bare By Imperva
CSO
The second, dubbed "reconnaissance and application layer attacks," involved
a small number of professional hackers, using common vulnerability
assessment tools to probe for security holes and launch application
attacks, like SQL injection, ...
<http://www.csoonline.com/article/701077/-anatomy-of-an-anonymous-attack-laid-bare-by-imperva>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.csoonline.com/article/701077/-anatomy-of-an-anonymous-attack-laid-bare-by-imperva&hl=en&geo=us>

Veracode's Latest Reporting Innovation Breaks Negative Paradigms
Associated ...
EON: Enhanced Online News (press release)
"The Veracode platform transforms the developer experience by providing
positive feedback when developers have successfully protected against
vulnerabilities, and offers managers and CISOs a more effective way to
track positive progress and roll out ...
<http://eon.businesswire.com/news/eon/20120228006074/en/Veracode/Application-Security/XSS>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://eon.businesswire.com/news/eon/20120228006074/en/Veracode/Application-Security/XSS&hl=en&geo=us>

IT chiefs warned over patching priorities
Siliconrepublic.com
IT managers who spend their time patching their Microsoft applications to
avoid leaving vulnerabilities for cyber criminals to exploit may be
focusing on the wrong target, a recent report has suggested. Almost four
out of five flaws affecting PCs ...
<http://www.siliconrepublic.com/strategy/item/26000-it-chiefs-warned-over/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.siliconrepublic.com/strategy/item/26000-it-chiefs-warned-over/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Tuesday, February 28, 2012

Google Alert - Metasploit

=== Web - 1 new result for [Metasploit] ===

n900 vnc client for metasploit / meterpreter ? - maemo.org - Talk
n900 vnc client for metasploit / meterpreter ? Nokia N900.
<http://talk.maemo.org/showthread.php?p=1169721>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

Rapid7 And Modulo Deliver Integrated Vulnerability Risk And IT GRC
Solutions ...
Dark Reading
SAN FRANCISCO--(BUSINESS WIRE)--Rapid7 and Modulo today announced they are
working together to deliver an holistic view of threat and vulnerability
risk, correlated with broader regulatory, policy and compliance risk
analysis.
<http://www.darkreading.com/compliance/167901112/security/news/232601593/rapid7-and-modulo-deliver-integrated-vulnerability-risk-and-it-grc-solutions-to-empower-risk-management-programs.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/compliance/167901112/security/news/232601593/rapid7-and-modulo-deliver-integrated-vulnerability-risk-and-it-grc-solutions-to-empower-risk-management-programs.html&hl=en&geo=us>

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap
Business Insider
If you want to exploit vulnerabilities and root boxes, you'll need to learn
how to perform the necessary reconnaissance first. In fact, you will spend
far more time researching your target then you will exploiting it. In this
article, I am going to ...
<http://www.businessinsider.com/hacking-reconnaissance-finding-vulnerabilities-in-your-target-using-nmap-2012-2>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.businessinsider.com/hacking-reconnaissance-finding-vulnerabilities-in-your-target-using-nmap-2012-2&hl=en&geo=us>

Security vulnerabilities discovered on 25 "Verisign Trusted" UK retailers'
sites
Security Park
"Cross-site scripting security vulnerabilities are like an open door to
attackers, as they are able to easily inject script and access control of
the site in question. For retailers, this is especially risky given the
personal and financial customer ...
<http://www.securitypark.co.uk/security_article267292.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.securitypark.co.uk/security_article267292.html&hl=en&geo=us>

nCircle Suite360™ Now Detects Over 55000 Conditions
EON: Enhanced Online News (press release)
SAN FRANCISCO--(EON: Enhanced Online News)--nCircle, the leader in
information risk and security performance management solutions, today
announced that Suite360™ now detects over 55000 conditions including
vulnerabilities, configurations, ...
<http://eon.businesswire.com/news/eon/20120227006753/en/IT-security/IT-metrics/vulnerability-management>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://eon.businesswire.com/news/eon/20120227006753/en/IT-security/IT-metrics/vulnerability-management&hl=en&geo=us>

nCircle Suite360(TM) Now Detects Over 55000 Conditions
MarketWatch (press release)
SAN FRANCISCO, Feb 27, 2012 (BUSINESS WIRE) -- nCircle, the leader in
information risk and security performance management solutions, today
announced that Suite360(TM) now detects over 55000 conditions including
vulnerabilities, configurations, ...
<http://www.marketwatch.com/story/ncircle-suite360tm-now-detects-over-55000-conditions-2012-02-27>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/ncircle-suite360tm-now-detects-over-55000-conditions-2012-02-27&hl=en&geo=us>

Secunia Launches New Version Of Personal Security Inspector
Dark Reading
According to Secunia's latest Yearly Report -
http://secunia.com/company/2011_yearly_report - the number of end-point
vulnerabilities increased once again in 2011 to over 800 vulnerabilities
– a tripling within only a few years - more than half of ...
<http://www.darkreading.com/vulnerability-management/167901026/security/news/232601538/secunia-launches-new-version-of-personal-security-inspector.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability-management/167901026/security/news/232601538/secunia-launches-new-version-of-personal-security-inspector.html&hl=en&geo=us>

The Anonymous DDOS: A Tool of Last Resort?
PC Magazine
During the second phase, lasting four days or so, the core of the group
sniffed around, using hacking tools to search for and try to exploit
vulnerabilities in the applications used by the site, said to be an
e-commerce site used by the Vatican to ...
<http://www.pcmag.com/article2/0,2817,2400842,00.asp>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcmag.com/article2/0,2817,2400842,00.asp&hl=en&geo=us>

Inside a failed Anonymous attack: report
ZDNet Australia
The second phase of the operation was a quick reconnaissance and
application attack, aimed at surveying the target's state of security and
identifying any vulnerabilities ahead of the scheduled attack that might
aid in increasing the effectiveness of ...
<http://www.zdnet.com.au/inside-a-failed-anonymous-attack-report-339332608.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com.au/inside-a-failed-anonymous-attack-report-339332608.htm&hl=en&geo=us>

Companies should secure their websites before worrying about DDoS attacks
from ...
Computerworld
Following the recruitment phase, 10 to 15 skilled hackers began performing
reconnaissance by scanning the targeted organization's websites for
vulnerabilities like SQL injection, cross-site scripting (XSS) and
directory traversal.
<http://www.computerworld.com/s/article/9224660/Companies_should_secure_their_websites_before_worrying_about_DDoS_attacks_from_Anonymous?taxonomyId=140>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computerworld.com/s/article/9224660/Companies_should_secure_their_websites_before_worrying_about_DDoS_attacks_from_Anonymous%3FtaxonomyId%3D140&hl=en&geo=us>

Pwnie Express Rolls Out Pwn Plug
Dark Reading
Penetration testing (pentesting) tests a network's vulnerabilities by
having an authorized person attempt to break into the network. Penetration
testing safeguards organizations against failure by identifying network
vulnerabilities so that they may be ...
<http://www.darkreading.com/vulnerability-management/167901026/security/news/232601565/pwnie-express-rolls-out-pwn-plug.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability-management/167901026/security/news/232601565/pwnie-express-rolls-out-pwn-plug.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Monday, February 27, 2012

Google Alert - Metasploit

=== Web - 1 new result for [Metasploit] ===

urlQuery: metasploit.com
(["n=http%3A%2F%2Fwww.metasploit.com%2F&u=oeu1330188988403r0. .... <li ><a
href="https://community.rapid7.com/community/metasploit/blog/2012/02/03/
...
<http://urlquery.net/report.php?id=24941>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 7 new results for [Vulnerabilities] ===

Android vulnerability opens device to outside control – Experts
MyBroadband
In such instances, hackers find previously unknown vulnerabilities in
software, then exploit those flaws with malicious software that is
delivered via tainted links or attached documents. He said smartphone users
need to prepare for this type of attack ...
<http://mybroadband.co.za/news/cellular/44279-android-vulnerability-opens-device-to-outside-control-experts.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://mybroadband.co.za/news/cellular/44279-android-vulnerability-opens-device-to-outside-control-experts.html&hl=en&geo=us>

Cheeky riders make a point
Fraser Coast Chronicle
"In a regional area the reality is people do need to use cars, but the ride
exposes our vulnerabilities as bike riders and hitchhikers," Mij- inberi
said. "I believe in sustainability and finding alternatives to cars -
alter- natives that are softer on ...
<http://www.frasercoastchronicle.com.au/story/2012/02/27/naked-ride-shows-the-softer-side-of-cyclists/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.frasercoastchronicle.com.au/story/2012/02/27/naked-ride-shows-the-softer-side-of-cyclists/&hl=en&geo=us>

Is that new car cyber secure?
Meriden Record-Journal
A number of experts, however, caution that as cars become more advanced
with internal computer systems, the need to pay attention to potential
vulnerabilities also increases. Many cars now come equipped with
voice-activation features and internal GPS ...
<http://www.myrecordjournal.com/local/article_0b2f8362-60f1-11e1-a12c-001871e3ce6c.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.myrecordjournal.com/local/article_0b2f8362-60f1-11e1-a12c-001871e3ce6c.html&hl=en&geo=us>

Early Oscars for Hugo and The Artist
The Independent
Possibly the best episode of the series so far, this week exposed the
vulnerabilities of the superna... Ezra Miller is the 19-year-old star of We
Need to Talk About Kevin, Lynne Ramsay's film adaptation o... The curtain
rose on Hollywood's Oscars last ...
<http://www.independent.co.uk/arts-entertainment/films/news/early-oscars-for-hugo-and-the-artist-7441387.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.independent.co.uk/arts-entertainment/films/news/early-oscars-for-hugo-and-the-artist-7441387.html&hl=en&geo=us>

Review of Being Human 'A Spectre Calls'
The Independent (blog)
By Neela Debnath Possibly the best episode of the series so far, this week
exposed the vulnerabilities of the supernatural trio when they were visited
by a supposedly friendly ghost. For the first time in this series viewers
were shown just how reliant ...
<http://blogs.independent.co.uk/2012/02/26/review-of-being-human-%E2%80%98a-spectre-calls%E2%80%99/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://blogs.independent.co.uk/2012/02/26/review-of-being-human-%25E2%2580%2598a-spectre-calls%25E2%2580%2599/&hl=en&geo=us>

Cheeky riders make a point
Gympie Times
The celebratory exposure of "dangly bits" will raise awareness of the
vulnerability of bike riders and pedestrians as part of the annual World
Naked Bike Ride. Organiser Mijimberi, a teacher from Nimbin, said the ride
encourages participants to strip ...
<http://www.gympietimes.com.au/story/2012/02/27/naked-ride-shows-the-softer-side-of-cyclists/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.gympietimes.com.au/story/2012/02/27/naked-ride-shows-the-softer-side-of-cyclists/&hl=en&geo=us>

In Attack on Vatican Web Site, a Glimpse of Hackers' Tactics
New York Times
Others searched for vulnerabilities on a Vatican Web site and, when that
failed, enlisted amateur recruits to flood the site with traffic, hoping it
would crash, according to a computer security firm's report to be released
this week.
<http://www.nytimes.com/2012/02/27/technology/attack-on-vatican-web-site-offers-view-of-hacker-groups-tactics.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.nytimes.com/2012/02/27/technology/attack-on-vatican-web-site-offers-view-of-hacker-groups-tactics.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Sunday, February 26, 2012

Google Alert - Metasploit

=== Web - 5 new results for [Metasploit] ===

Metasploit Identifies IPv6 Security Risks - Rapid7
Penetration Testing Solution Assesses Virtual Datacenter Security.
<http://www.rapid7.com/news-events/press-releases/2012/2012-metasploit-ipv6.jsp>

xss Attack From METASPLOIT
Cross-site scripting (XSS) is a type of computer security vulnerability
typically found in Web ...
<http://www.dis9.com/xss-attack-from-metasploit.html>

New Version of Metasploit Targets IPv6 Risks | LIVE HACKING
Com) – Rapid7 has released a new version of Metasploit, its popular
penetration testing toolkit, with new functionality to assess the security
of IPv6 enabled ...
<http://www.livehacking.com/2012/02/23/new-version-of-metasploit-targets-ipv6-risks/>

Metasploit The Penetration Tester's Guide - Hak5 Forums
Hi All, Unfortunately, I cannot get very many of the commands that are
printed in the book metasploit the penetration tester's guide to work
pro...
<http://forums.hak5.org/index.php?showtopic=25608>

Ipwn metasploit not working - iHackMyi
Hey I'm new.I was on ininjas.com but they banned me for no reason.anyway.
I'm using ipwn2.c and whenever I run metasploit it goes fine then...
<http://ihackmyi.com/topic/114191-ipwn-metasploit-not-working/>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 5 new results for [Vulnerabilities] ===

McAfee Avert Labs Blog: Another overview of exploit packs
NewsFactor Network
In that post I showed a table that had ten common malware kits which I
listed the vulnerabilities used, referenced by their Common Vulnerabilities
& Exposures (CVE) names. They were 45 vulnerabilities in the table. From
this data, this idea was taken ...
<http://www.newsfactor.com/blog_article.php?aid=3953815>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.newsfactor.com/blog_article.php%3Faid%3D3953815&hl=en&geo=us>

Chinese Nickispy malware targets smartphones
Sydney Morning Herald
WASHINGTON: Just as US companies are coming to grips with threats to their
computer networks emanating from cyber-spies based in China, a noted expert
is highlighting what he says is an even more pernicious vulnerability in
smartphones.
<http://www.smh.com.au/technology/chinese-nickispy-malware-targets-smartphones-20120225-1tuve.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.smh.com.au/technology/chinese-nickispy-malware-targets-smartphones-20120225-1tuve.html&hl=en&geo=us>

CrowdStrike to make RSA 2012 debut with Android attack via Webkit
SearchSecurity.com
If the recipient clicks on the link the attack targets a vulnerability in
the Android browser. The firm is being led by George Kurtz, the former CEO
of Foundstone and CTO of McAfee as well as Dmitri Alperovitch who was vice
president of threat research ...
<http://searchsecurity.techtarget.com/news/2240118489/CrowdStrike-to-make-RSA-2012-debut-with-Android-attack-via-Webkit>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://searchsecurity.techtarget.com/news/2240118489/CrowdStrike-to-make-RSA-2012-debut-with-Android-attack-via-Webkit&hl=en&geo=us>

Older women in dangerof falling into poverty
Irish Examiner
The Older Women Workers Access to Pensions: Vulnerabilities, Perspectives
and Strategies document, published yesterday, was drawn up by researchers
at NUI Galway and Queens University Belfast. It found that despite the
increased focus on equal working ...
<http://www.irishexaminer.com/ireland/older-women-in-dangerof-falling-into-poverty-185035.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.irishexaminer.com/ireland/older-women-in-dangerof-falling-into-poverty-185035.html&hl=en&geo=us>

Trojan virus tricks Apple Mac users to steal passwords
Telegraph.co.uk
Two exploit vulnerabilities in Java, a software language commonly used by
websites to deliver interactive elements, and require no intervention from
the user to succeed. If Java is not installed or all its security patches
are up-to-date, however, ...
<http://www.telegraph.co.uk/technology/apple/9104229/Trojan-virus-tricks-Apple-Mac-users-to-steal-passwords.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.telegraph.co.uk/technology/apple/9104229/Trojan-virus-tricks-Apple-Mac-users-to-steal-passwords.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Saturday, February 25, 2012

Google Alert - Metasploit

=== Web - 2 new results for [Metasploit] ===

Metasploit Framework 4.2.0 : IPv6, VMware, and Tons of Modules ...
Metasploit Framework 4.2.0 : IPv6, VMware, and Tons of Modules!. THN
Magazine and The Hacker News is Most Comprehensive resource in providing
news ...
<http://thehackernews.com/2012/02/metasploit-framework-420-ipv6-vmware.html>

Virtual Intelligence Briefing » Metasploit Framework 4.2.0 : IPv6 ...
Metasploit 4.2 now ships with fourteen new resource scripts, nearly all of
which were provided by open source community contributors. These scripts
...
<http://www.vibriefing.com/2012/02/metasploit-framework-4-2-0-ipv6-vmware-and-tons-of-modules/>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Canada Fin Min: G20 Must Act Swiftly To Address Vulnerabilities
Wall Street Journal
OTTAWA (Dow Jones)--Canadian Finance Minister Jim Flaherty said Friday the
Group of 20 developed and emerging economies must move quickly to fulfill
pledges on deficit levels and strengthen medium-term foundations for
growth.
<http://online.wsj.com/article/BT-CO-20120224-712732.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://online.wsj.com/article/BT-CO-20120224-712732.html&hl=en&geo=us>

Flashback.G trojan seen exploiting ancient Java vulnerabilities to infect
Macs
9 to 5 Mac
G" is reportedly out in the wild and able to exploit a pair of
vulnerabilities found in an older version of Java run-time, according to a
blog post by antivirus maker Intego yesterday. People running Snow Leopard
and an older Java run-time are at high ...
<http://9to5mac.com/2012/02/24/if-you-havent-updated-your-mac-in-a-long-time-you-might-be-vulnerable-to-data-sucking-flashback-g-malware/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://9to5mac.com/2012/02/24/if-you-havent-updated-your-mac-in-a-long-time-you-might-be-vulnerable-to-data-sucking-flashback-g-malware/&hl=en&geo=us>

New WordPress Plugin Locks Down Your Website's Security
PCWorld
If you rely on your site for any aspect of your business, a new plugin from
6Scan helps you find and manage vulnerabilities quickly and easily. While
WordPress and other content management systems including Drupal and Joomla
are built to be secure, ...
<http://www.pcworld.com/businesscenter/article/250549/new_wordpress_plugin_locks_down_your_websites_security.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/250549/new_wordpress_plugin_locks_down_your_websites_security.html&hl=en&geo=us>

The Sahel's Complex Vulnerability to Food Crises
New Security Beat
The coming "lean season" is predicted to be the third food crisis in
less than a decade and highlights a set of glaring vulnerabilities in a
region facing severe long-term threats to health, livelihoods, and
security. However, as international agencies ...
<http://www.newsecuritybeat.org/2012/02/sahels-complex-vulnerability-to-food.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.newsecuritybeat.org/2012/02/sahels-complex-vulnerability-to-food.html&hl=en&geo=us>

Cyber Security Expert Proves Smartphones' Vulnerability to Malware Attacks
International Business Times
Browsers must secretly install the malware if they want to exploit the
so-called zero-day vulnerability in smartphone. Zero-day vulnerabilities
are those that are not yet known by the manufacturers and anti-virus
companies. "The minute you go the site, ...
<http://www.ibtimes.com/articles/304002/20120224/cyber-security-expert-finds-flaw-smartphones.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ibtimes.com/articles/304002/20120224/cyber-security-expert-finds-flaw-smartphones.htm&hl=en&geo=us>

Microsoft Internet Explorer Multiple Vulnerabilities
Help Net Security
Microsoft Internet Explorer is a web browser available for Microsoft
Windows. The application is exposed to multiple security issues. See
reference for detailed information. Internet Explorer 7, Internet Explorer
8 and Internet Explorer 9 on Windows ...
<http://www.net-security.org/vuln.php?id=16173>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/vuln.php%3Fid%3D16173&hl=en&geo=us>

CubeCart Multiple URI Redirection Vulnerabilities
Help Net Security
CubeCart is a web-based e-commerce application. The application is exposed
to multiple URI redirection issues because the application fails to
properly sanitize user-supplied input submitted to the "goto" and "r"
parameters of the "switch.php" and ...
<http://www.net-security.org/vuln.php?id=16177>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/vuln.php%3Fid%3D16177&hl=en&geo=us>

Researcher claims to have found further vulnerabilities in pcAnywhere
Computing
"I've been working on the remote pcAnywhere vulnerability reported a few
weeks ago and stumbled on a few other flaws during my research. This works
on patched versions as well," he stated. The source code for pcAnywhere and
Symantec's flagship Norton ...
<http://www.computing.co.uk/ctg/news/2154732/researcher-claims-vulnerabilities-pcanywhere>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computing.co.uk/ctg/news/2154732/researcher-claims-vulnerabilities-pcanywhere&hl=en&geo=us>

XSS Flaw discovered in Skype's Shop, user accounts targeted
ZDNet (blog)
By Dancho Danchev | February 24, 2012, 2:10am PST Summary: The independent
security researcher Ucha Gobejishvili has detected a cross site scripting
(XSS) vulnerabilities affecting shop.skype.com and api.skype.com. Upon
successful exploitation the ...
<http://www.zdnet.com/blog/security/xss-flaw-discovered-in-skypes-shop-user-accounts-targeted/10418>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com/blog/security/xss-flaw-discovered-in-skypes-shop-user-accounts-targeted/10418&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Friday, February 24, 2012

Google Alert - Metasploit

=== Web - 4 new results for [Metasploit] ===

Reverse Metasploit payload BAT – Pure ASCII | Astrobaby's random ...
The first part is a CM3 encoded decoder decbin.com which would decode the
metasploit payload exe. The second part is also CM3 encoded encoder which
...
<http://astr0baby.wordpress.com/2012/02/20/reverse-metasploit-payload-bat-pure-ascii/>

Armitage For Metasploit 4.2 - What's New?
Description: This video shows some of the new features in Armitage for
Metasploit 4.2. The latest Armitage is a solid performer and works great
for managing ...
<http://www.securitytube.net/video/2862>

Metasploit Tutorial on Backtrack 5 R1 to Hack Linux - YouTube
http://www.ehacking.net/2012/02/how-to-hack-linux-metasploit-tutorial.html
How to hack ...
<http://www.youtube.com/watch?v=CxwmExVFJH0>

Metasploit 4.2 release: Brute force of vSphere API – flyingpenguin
Rapid 7 has announced with Metasploit 4.2 a brute force attack on weak
passwords in vSphere web services APIs (vmware-api). Their repository also
shows ...
<http://www.flyingpenguin.com/?p=15775>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Average Aggregate Host Risk Score for Top 25% of nCircle Benchmark ...
MarketWatch (press release)
SAN FRANCISCO, Feb 23, 2012 (BUSINESS WIRE) -- nCircle, the leader in
automated security and compliance auditing solutions, today announced as
part of their Bellwether Metric series that the top 25% of nCircle
Benchmark vulnerability management ...
<http://www.marketwatch.com/story/average-aggregate-host-risk-score-for-top-25-of-ncircle-benchmark-vulnerability-management-community-is-688-2012-02-23>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/average-aggregate-host-risk-score-for-top-25-of-ncircle-benchmark-vulnerability-management-community-is-688-2012-02-23&hl=en&geo=us>

Are small vulnerabilities the real enemy?
ZDNet Australia
Businesses accepting small security risks may be leaving the door open to
hackers who have realised that chaining small vulnerabilities together
represents an easy way to destroy companies, according to researchers from
Securus Global.
<http://www.zdnet.com.au/are-small-vulnerabilities-the-real-enemy-339332377.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com.au/are-small-vulnerabilities-the-real-enemy-339332377.htm&hl=en&geo=us>

New pcAnywhere Vulnerability Identified, 200000 Systems At Risk
RedOrbit
Malicious code targeting a newly identified vulnerability in Symantec's
pcAnywhere remote control product has been published online, exposing users
to potential attacks that disrupt the software's capabilities. The
disclosure comes just one month after ...
<http://www.redorbit.com/news/technology/1112480313/new-pcanywhere-vulnerability-identified-200000-systems-at-risk/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.redorbit.com/news/technology/1112480313/new-pcanywhere-vulnerability-identified-200000-systems-at-risk/&hl=en&geo=us>

New Oracle ERP Vulnerabilities Unmasked
Dark Reading
Design flaws could allow attackers to access, alter, or take over ERP
systems -- but will enterprises do anything about the vulnerabilities? By
Kelly Jackson Higgins Researchers today issued security advisories for
eight vulnerabilities, ...
<http://www.darkreading.com/database-security/167901020/security/application-security/232601382/new-oracle-erp-vulnerabilities-unmasked.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/database-security/167901020/security/application-security/232601382/new-oracle-erp-vulnerabilities-unmasked.html&hl=en&geo=us>

Symantec Still Struggling with pcAnywhere Vulnerabilities
Investorplace.com
Rapid7's chief security officer, HD Moore, told Computer World that he
discovered the vulnerabilities while scanning the Internet for the
transmission-control protocol port the software leaves open for incoming
commands. More-targeted scans revealed ...
<http://www.investorplace.com/2012/02/symantec-still-struggling-to-tame-pcanywhere-vulnerabilities-symc/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.investorplace.com/2012/02/symantec-still-struggling-to-tame-pcanywhere-vulnerabilities-symc/&hl=en&geo=us>

Anonymous, NSA Square Off On Power Grid Attacks
InformationWeek
Notably, some of the industrial control systems used to manage power grids
can already be hacked into using known vulnerabilities. "This whole thing
about [how] it's going to take [Anonymous] a year or two [to hack the power
grid]?
<http://www.informationweek.com/news/security/vulnerabilities/232601362>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.informationweek.com/news/security/vulnerabilities/232601362&hl=en&geo=us>

Tenable Network Security Adds IBM iSeries Support To Nessus(R)
MarketWatch (press release)
Tenable's iSeries support is provided through plugins to the Nessus
Vulnerability Scanner, the industry's most powerful and comprehensive
vulnerability and configuration assessment solution for enterprises and
security professionals.
<http://www.marketwatch.com/story/tenable-network-security-adds-ibm-iseries-support-to-nessusr-2012-02-23>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/tenable-network-security-adds-ibm-iseries-support-to-nessusr-2012-02-23&hl=en&geo=us>

Rapid7 Researcher Warns Of Potential Hacking Of 200000 Windows PCs
ITProPortal
In a shocking revelation, a researcher at Rapid7 has claimed that
approximately 200000 systems worldwide with Internet connectivity could be
hijacked by cyber criminals exploiting vulnerabilities present in the
security vendor Symantec's popular ...
<http://www.itproportal.com/2012/02/23/rapid7-researcher-warns-of-potential-hacking-of-200000-windows-pcs/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itproportal.com/2012/02/23/rapid7-researcher-warns-of-potential-hacking-of-200000-windows-pcs/&hl=en&geo=us>

Hackers Target Ivy League Universities
eSecurity Planet
Members of TeamHav0k and Zer0Lulz have identified several vulnerabilities
in leading universities' official Web sites. Two hacker groups recently
launched "Op Ivy," which is aimed at revealing vulnerabilities in the Web
sites of leading universities.
<http://www.esecurityplanet.com/hackers/hackers-target-ivy-league-universities.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.esecurityplanet.com/hackers/hackers-target-ivy-league-universities.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Thursday, February 23, 2012

Google Alert - Metasploit

=== News - 1 new result for [Metasploit] ===

Metasploit Identifies IPv6 Security Risks
Business Wire
Metasploit users can now fully test whether IPv6 addresses on their network
are vulnerable to cyber-attacks. This is particularly important for ...
<http://www.businesswire.com/news/home/20120222006086/en/Metasploit-Identifies-IPv6-Security-Risks>

=== Web - 5 new results for [Metasploit] ===

Metasploit Updated to Address Risks Within IPv6 | SecurityWeek.Com
IPv6 is like a parallel universe for intruders. Since most companies focus
on the IPv4 side of their networks, security assessments must audit
IPv6-enabled ...
<http://www.securityweek.com/metasploit-updated-address-risks-within-ipv6>

Metasploit Identifies IPv6 Security Risks - Yahoo! Finance
From Yahoo! Finance: Rapid7, the leading provider of security risk
intelligence solutions, today announced that the new version of its leading
penetration testing ...
<http://finance.yahoo.com/news/metasploit-identifies-ipv6-security-risks-160000621.html>

backtrack 5-metasploit.png | Flickr - Photo Sharing!
backtrack 5-metasploit.png. ... This photo belongs to. CyberHades'
photostream ( 1880). Newest photo →; backtrack 5-metasploit.png ·
62374.gif · Realm ...
<http://www.flickr.com/photos/cyberhades/6922129053/>

metasploit tutorial : exec via metasploit
Posted by TrOoN Filed under: Videos / Demo - 18 Feb 2012 Tags: Metasploit,
phpshell, Web Application. Thank bro TrOoN! ♥ i love u ^____^. facebook
home ...
<http://www.dis9.com/metasploit-tutorial-the-the-exec-via-metasploit.html>

Feature #6405: IIS Internal IP disclosure - Metasploit Framework ...
Sometimes IIS discloses internal IP addresses with redirects using common
URLs. (ref: http://support.microsoft.com/kb/967342) This module attempts to
grab ...
<http://dev.metasploit.com/redmine/issues/6405>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Vulnerability still in pcAnywhere program
UPI.com
While Symantec said it had patched all the known vulnerabilities in
pcAnywhere, it declined to declare that the product was safe to use,
Computerworld.com said. Moore said the ongoing vulnerabilities are a
serious problem.
<http://www.upi.com/Science_News/2012/02/22/Vulnerability-still-in-pcAnywhere-program/UPI-80141329954483/?spt=hs&or=sn>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.upi.com/Science_News/2012/02/22/Vulnerability-still-in-pcAnywhere-program/UPI-80141329954483/%3Fspt%3Dhs%26or%3Dsn&hl=en&geo=us>

Country's Vulnerability to Climate Change Chronicled in Landmark Assessment
AllAfrica.com
Cape Verde presents a dual vulnerability to climate change, both as a small
island developing State, and as an arid country in the Africa's Sahel
region, and is already battling with increased pressure on scarce water
resources, and more frequent ...
<http://allafrica.com/stories/201202221073.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://allafrica.com/stories/201202221073.html&hl=en&geo=us>

Researcher Releases Exploit Code That Can Allegedly Crash PcAnywhere
PCWorld
By Lucian Constantin, IDG News Exploit code targeting a newly identified
vulnerability in Symantec's pcAnywhere computer remote control product has
been published on the Internet, exposing its users to possible attacks that
disrupt the software's ...
<http://www.pcworld.com/businesscenter/article/250456/researcher_releases_exploit_code_that_can_allegedly_crash_pcanywhere.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/250456/researcher_releases_exploit_code_that_can_allegedly_crash_pcanywhere.html&hl=en&geo=us>

Symantec pcAnywhere Exposes 200000 Systems To Attack
CRN
By Antone Gonsalves, CRN As many as 200000 corporate systems could be
commandeered by cyber-criminals as a result of recently discovered
vulnerabilities in Symantec's pcAnywhere software for PC-to-PC remote
control, a security vendor says.
<http://www.crn.com/news/security/232601301/symantec-pcanywhere-exposes-200-000-systems-to-attack.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.crn.com/news/security/232601301/symantec-pcanywhere-exposes-200-000-systems-to-attack.htm&hl=en&geo=us>

6Scan Delivers Enterprise Level Website Security With Affordable TCO for
SMBs
San Francisco Chronicle (press release)
6Scan's Patrol™ scanner runs in the cloud and acts like a white-hat
hacker, constantly scouring every page, form and script on your website for
security vulnerabilities that a hacker could exploit. "Most website
'protection' packages stop there," ...
<http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/02/22/prweb9220494.DTL>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sfgate.com/cgi-bin/article.cgi%3Ff%3D/g/a/2012/02/22/prweb9220494.DTL&hl=en&geo=us>

200000 Windows PCs Vulnerable to pcAnywhere Hijacking
CIO India
Several days later, Symantec said it had patched all the known
vulnerabilities in pcAnywhere, but declined to declare that the product was
safe to use. According to Rapid7, which prowled the Web looking for
pcAnywhere systems, an estimated ...
<http://www.cio.in/news/200000-windows-pcs-vulnerable-pcanywhere-hijacking-230122012>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cio.in/news/200000-windows-pcs-vulnerable-pcanywhere-hijacking-230122012&hl=en&geo=us>

Metasploit Identifies IPv6 Security Risks
MarketWatch (press release)
The first step of this vision was the ability to dynamically discover and
scan virtual assets, introduced in Rapid7's vulnerability management
solution, Nexpose. This resulted in Rapid7 becoming the first vulnerability
management vendor to be included ...
<http://www.marketwatch.com/story/metasploit-identifies-ipv6-security-risks-2012-02-22>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/metasploit-identifies-ipv6-security-risks-2012-02-22&hl=en&geo=us>

Symantec pcAnywhere hack exposes 200000 PCs: analyst
SlashGear
The company even admits that its patch may not be strong enough to prevent
other vulnerabilities from being exposed. Rapid7 said that around 2.5% of
the infected PCs that haven't been patched are computers that act as
point-of-sale systems in retail ...
<http://www.slashgear.com/symantec-pcanywhere-hack-exposes-200000-pcs-analyst-22214844/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.slashgear.com/symantec-pcanywhere-hack-exposes-200000-pcs-analyst-22214844/&hl=en&geo=us>

pcAnywhere exploit code published on Pastebin by security researcher
Techworld.com
By Lucian Constantin | Published: 16:41, 22 February 2012 Exploit code
targeting a newly identified vulnerability in Symantec's pcAnywhere
computer remote control product has been published on the internet,
exposing its users to possible attacks that ...
<http://news.techworld.com/security/3339471/pcanywhere-exploit-code-published-on-pastebin-by-security-researcher/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://news.techworld.com/security/3339471/pcanywhere-exploit-code-published-on-pastebin-by-security-researcher/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Wednesday, February 22, 2012

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Digital Defense's Frontline(TM) 5.0 Spurs Rapid Vulnerability Remediation
via ...
San Francisco Chronicle (press release)
Digital Defense, Inc. (DDI), a leading provider of managed cloud-based
security assessments, announced the release of Frontline™ Solutions
Platform (FSP) Release 5.0, an eagerly awaited enhancement of the
organization's online proprietary ...
<http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/02/21/prweb9214535.DTL>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sfgate.com/cgi-bin/article.cgi%3Ff%3D/g/a/2012/02/21/prweb9214535.DTL&hl=en&geo=us>

Symantec pcAnywhere Remote Attack Code Surfaces
InformationWeek
Symantec last month recommended that users disable pcAnywhere unless
absolutely required, until the company had an opportunity to release a
patch (which it did last month) to address a critical vulnerability that
would allow attackers to remotely ...
<http://www.informationweek.com/news/security/vulnerabilities/232601182>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.informationweek.com/news/security/vulnerabilities/232601182&hl=en&geo=us>

Stanford researchers expose audio and video CAPTCHA vulnerabilities
SmartCompany.com.au
The news comes half a year after the same researchers announced that they
could decode the audio CAPTCHAs with a 50% success rate. The purpose of the
research is to identify security vulnerabilities in the methods before
malicious hackers or spammers ...
<http://www.smartcompany.com.au/information-technology/048341-stanford-researchers-expose-audio-and-video-captcha-vulnerabilities.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.smartcompany.com.au/information-technology/048341-stanford-researchers-expose-audio-and-video-captcha-vulnerabilities.html&hl=en&geo=us>

Google fixes another seven serious security flaws in Chrome
Computing
By Stuart Sumner Google has released a patch for its Chrome browser that
fixes 13 security vulnerabilities, seven of which it has classified as high
risk. If left unpatched, some of the vulnerabilities targeted by the update
could allow a malicious ...
<http://www.computing.co.uk/ctg/news/2153781/google-fixes-seven-security-flaws-chrome>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computing.co.uk/ctg/news/2153781/google-fixes-seven-security-flaws-chrome&hl=en&geo=us>

We bully our celebrities
Windsor Star
By Donna Jenner, The Windsor Star February 21, 2012 Stars like Whitney
Houston entertain us, and then we exploit their vulnerabilities, says
letter writer Donna Jenner. I've been thinking about it since the passing
of Whitney Houston, that we sincerely ...
<http://www.windsorstar.com/entertainment/bully+celebrities/6182787/story.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.windsorstar.com/entertainment/bully%2Bcelebrities/6182787/story.html&hl=en&geo=us>

To Lock Down Mobile Apps, Cenzic Launches New App Testing Tools
TechCrunch
The service will then be able to tell what sorts of security
vulnerabilities an app has, what sensitive data it could leak, what other
sorts of security threats it may be vulnerable to, and what to do about it.
The security risk inherent in using ...
<http://techcrunch.com/2012/02/21/to-lock-down-mobile-apps-cenzic-launches-new-app-testing-tools/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://techcrunch.com/2012/02/21/to-lock-down-mobile-apps-cenzic-launches-new-app-testing-tools/&hl=en&geo=us>

UK Facebook Hacker Jailed for 8 Months
CSO
Yahoo had "rewarded" Mangham (with APS7,000) for revealing its
vulnerabilities previously, his lawyer Tom Ventham said. However,
prosecutor Sandip Patel said that Mangham had acted "with determination,
undoubted ingenuity and it was sophisticated, ...
<http://www.csoonline.com/article/700510/uk-facebook-hacker-jailed-for-8-months>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.csoonline.com/article/700510/uk-facebook-hacker-jailed-for-8-months&hl=en&geo=us>

Malvern 'dirty lab' to tackle cyber crime
BBC News
By Phil Mackie Reporter, BBC Radio 5 live A research unit to test the
vulnerability of computer security systems at small businesses has been set
up in Worcestershire. The so-called "dirty lab'" in Malvern has been
part-funded by the government.
<http://www.bbc.co.uk/news/uk-england-hereford-worcester-17118464>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.bbc.co.uk/news/uk-england-hereford-worcester-17118464&hl=en&geo=us>

Symantec's PCAnywhere Vulnerable to Source Code Attack
eWeek
Despite Symantec's claims to the contrary, security researchers now believe
that malicious developers can look at the leaked pcAnywhere source code and
find vulnerabilities that can be exploited in current versions. A
researcher found that pcAnywhere's ...
<http://www.eweek.com/c/a/Security/Symantecs-PCAnywhere-Vulnerable-to-Source-Code-Attack-514323/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eweek.com/c/a/Security/Symantecs-PCAnywhere-Vulnerable-to-Source-Code-Attack-514323/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Tuesday, February 21, 2012

Google Alert - Metasploit

=== Web - 4 new results for [Metasploit] ===

How to Hack Linux -Metasploit Tutorial Backtrack 5 R1 | Ethical ...
Metasploit is a wonderful tool for penetration testing that contain a
database of publicly known exploits for various operating system and
software's, we have ...
<http://www.ehacking.net/2012/02/how-to-hack-linux-metasploit-tutorial.html>

Developing the LNK Metasploit post module with Mona - Blog ...
I have been using the LNK trick I talked about in my last post for a while,
but always needing a Windows machine to create the LNK file. When I decided
to write a ...
<http://www.room362.com/blog/2012/2/19/developing-the-lnk-metasploit-post-module-with-mona.html>

Metasploit Mastery at InfoSec SouthWest, April 2nd and 3rd | Net ...
Posted by egypt on Feb 15 Come play A Game of Shells with egypt and mubix,
in Austin, TX, April 2nd and 3rd for the best Metasploit training
available.
<http://www.netcleaner.it/metasploit-mastery-at-infosec-southwest-april-2nd-and-3rd/>

metasploit pro full keygen 2011
View more of the Metasploit Pro Full Keygen 2011: METASPLOIT PRO FULL
KEYGEN 2011 Operating System: Windows2003/Server 2008/7/Vista/NT Type File:
<http://www.zm101.com/base/metasploit-pro-full-keygen-2011.html>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Apple has trademark vulnerabilities: experts
China Post
BEIJING--The names of iPhone and iPad could wind up on hiking shoes,
veterinary drugs or even diapers in China if Apple fails to remedy flaws in
its brand strategy, experts say. At least 39 Chinese companies and
individuals in recent years have ...
<http://www.chinapost.com.tw/business/company-focus/2012/02/21/332185/Apple-has.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.chinapost.com.tw/business/company-focus/2012/02/21/332185/Apple-has.htm&hl=en&geo=us>

British Facebook hacker sentenced to eight months in prison
TG Daily
Unfortunately, that was not case for a British software development student
named Glenn Mangham, who had previously identified vulnerabilities in Yahoo
systems and was rewarded accordingly. The 26-year-old hacker subsequently
turned his attentions to ...
<http://www.tgdaily.com/security-brief/61575-british-facebook-hacker-sentenced-to-eight-months-in-prison>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.tgdaily.com/security-brief/61575-british-facebook-hacker-sentenced-to-eight-months-in-prison&hl=en&geo=us>

Hackers Can Track Your Cellphone Without Your Knowledge
Tom's Guide
We may not address security concerns as quickly as operating system or
browser vulnerabilities, but there is no doubt that we should be paying
more attention to our phones. Researchers at the University of Minnesota
have discovered that it is fairly ...
<http://www.tomsguide.com/us/cellphone-smartphone-security-location-tracking,news-14217.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.tomsguide.com/us/cellphone-smartphone-security-location-tracking,news-14217.html&hl=en&geo=us>

Save the Children, US introduce MBMS project
Times of Swaziland
The project was initiated in 2010 by the organisation upon realising the
level of vulnerabilities brought about by drought and poverty in the area.
About 26 children are beneficiaries under this project. Communications and
Marketing Officer Senelile ...
<http://www.times.co.sz/index.php?news=72697>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.times.co.sz/index.php%3Fnews%3D72697&hl=en&geo=us>

Google Chrome, Mozilla Firefox Fix Serious Flaws
TechWeekEurope UK
Google's 15 February security update had fixed the libpng vulnerability
along with 12 other high- and medium-risk integer and heap overflow and
use-after-free vulnerabilities. The latest version of Chrome also included
the new version of the Adobe ...
<http://www.techweekeurope.co.uk/news/google-chrome-mozilla-firefox-fix-serious-flaws-61565>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.techweekeurope.co.uk/news/google-chrome-mozilla-firefox-fix-serious-flaws-61565&hl=en&geo=us>

Google Chrome Makes Critical Security Fixes
Infoboom
Much of the credit for the quick response goes to white hat hackers, who
search for vulnerabilities in systems and applications and inform vendors
of their findings. As reported by Lucian Constantin at InfoWorld, the new
release of Google Chrome was ...
<http://www.theinfoboom.com/articles/google-chrome-makes-critical-security-fixes/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.theinfoboom.com/articles/google-chrome-makes-critical-security-fixes/&hl=en&geo=us>

Glenn Mangham: Facebook Hacker Gets 8 Months in Jail
International Business Times
Mangham told London's Southwark Crown Court that he hacked into Facebook to
discover the site's vulnerabilities, which he claimed he would then turn
over to Facebook to help them beef up security. "It was to identify
vulnerabilities in the system so I ...
<http://www.ibtimes.com/articles/301499/20120220/glenn-mangham-facebook-hacker-8-months-jail.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ibtimes.com/articles/301499/20120220/glenn-mangham-facebook-hacker-8-months-jail.htm&hl=en&geo=us>

EAGLES Economic Outlook: Cross-Country Emerging Markets Analysis
FXstreet.com
Macroeconomic vulnerabilities in the EAGLEs countries remain relatively
limited, at least when compared with the developed world. However, the
degree of vulnerability varies widely from country to country. The report
offers a map of vulnerability by ...
<http://www.fxstreet.com/fundamental/analysis-reports/eagles-economic-outlook/2012/02/20/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.fxstreet.com/fundamental/analysis-reports/eagles-economic-outlook/2012/02/20/&hl=en&geo=us>

Gold, Silver and the US National Bird
The Market Oracle
With its head buried in the sand to avoid facing critical issues, the US
may be ignoring the vulnerabilities in today's world. For those that are
not familiar with the old story of the ostrich with its head in the sand,
we submit the following picture ...
<http://www.marketoracle.co.uk/Article33233.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketoracle.co.uk/Article33233.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Monday, February 20, 2012

Google Alert - Metasploit

=== Web - 3 new results for [Metasploit] ===

Hacking Articles and Tools: Metasploit Tutorial for Beginners (Part 1)
The Metasploit Project is an open-source, computer security project which
provides information about security vulnerabilities and aids in penetration
testing and ...
<http://rajhackingarticles.blogspot.com/2012/02/metasploit-tutorial-for-beginners-part.html>

Graphical cyber attack management tool for Metasploit | Cyber ...
Armitage is a graphical cyber attack management tool for Metasploit that
visualizes your targets, recommends exploits, and exposes the advanced
capabilities of ...
<http://www.cyberwarzone.com/cyberwarfare/graphical-cyber-attack-management-tool-metasploit>

Metasploit Lesson 4: Win7 Trojan - YouTube
In this tutorial we will create a trojan for a windows machine and make it
connect to us. Keep in ...
<http://www.youtube.com/watch?v=g07CKOhQN6E>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

Acunetix Web Vulnerability Scanner 8 released
Help Net Security
Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking
experience through its new ability to lock hackers out by integrating scan
results into Imperva's Web Application Firewall, and by recognizing a new
breed of vulnerabilities ...
<http://www.net-security.org/secworld.php?id=12428>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/secworld.php%3Fid%3D12428&hl=en&geo=us>

Adobe Patches Crucial Vulnerabilities within Shockwave Player
SPAMfighter News
Another security update, which Adobe has made available, is for RoboHelp in
the context of Word ever-since a crucial vulnerability was detected within
RoboHelp's 8th and 9th versions. But, separately, Adobe patched one flaw
rated "important" within ...
<http://www.spamfighter.com/News-17433-Adobe-Patches-Crucial-Vulnerabilities-within-Shockwave-Player.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.spamfighter.com/News-17433-Adobe-Patches-Crucial-Vulnerabilities-within-Shockwave-Player.htm&hl=en&geo=us>

Cyber experts show vulnerability of GSM networks
Zee News
Panaji: A group of cyber experts stunned a conference here when they showed
the vulnerability of GSM mobile networks which can be easily exploited by
hackers enabling them to impersonate a user's identity and make calls from
his account without a clue ...
<http://zeenews.india.com/news/net-news/cyber-experts-show-vulnerability-of-gsm-networks_759318.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://zeenews.india.com/news/net-news/cyber-experts-show-vulnerability-of-gsm-networks_759318.html&hl=en&geo=us>

The Women of Notre Dame
National Review Online
And another answer was evident to me just days before, on the campus of the
University of Notre Dame in South Bend, Ind. A group of young women there
invited me, among others, to speak about the "vulnerability" of all
things, at their seventh annual ...
<http://www.nationalreview.com/articles/291401/women-notre-dame-kathryn-jean-lopez>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.nationalreview.com/articles/291401/women-notre-dame-kathryn-jean-lopez&hl=en&geo=us>

Software Patches, Nortel, User Privacy Top Week's Security News
eWeek
Microsoft fixed 21 vulnerabilities, of which XXX was critical, as part of
its February Patch Tuesday. This month's patches were unusual in the number
of vulnerabilities fixed in newer versions of Internet Explorer and
Windows.
<http://www.eweek.com/c/a/Security/Software-Patches-Nortel-User-Privacy-Top-Weeks-Security-News-378094/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eweek.com/c/a/Security/Software-Patches-Nortel-User-Privacy-Top-Weeks-Security-News-378094/&hl=en&geo=us>

Adobe issues emergency Flash patch
iT News
By Dan Kaplan on Feb 20, 2012 12:00 PM (6 hours ago) Adobe on Wednesday
unexpectedly pushed an update to its popular Flash Player to address seven
vulnerabilities, including one that was being publicly exploited. The
update to version 11.1.102.62 for ...
<http://www.itnews.com.au/News/290921,adobe-issues-emergency-flash-patch.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itnews.com.au/News/290921,adobe-issues-emergency-flash-patch.aspx&hl=en&geo=us>

Southwest pueblo-dwellers key to modern climate policy?
EurekAlert (press release)
Vulnerability to climate change presents policy challenges to local, state,
regional, national and international entities, particularly at a time when
the public and policy-makers still struggle conceptually with the
complexities of rising ocean levels ...
<http://www.eurekalert.org/pub_releases/2012-02/asu-spk020812.php>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eurekalert.org/pub_releases/2012-02/asu-spk020812.php&hl=en&geo=us>

"Celebrity Apprentice:" A model for firing
CBS News
In the two-hour premiere Sunday night, the stars showed their aggressions,
peeves and vulnerabilities, providing the promise of some conflict-riddled
shows ahead. (SPOILER ALERT) The cast was divided into men's and women's
team and each team had to run ...
<http://www.cbsnews.com/8301-31749_162-57381180-10391698/celebrity-apprentice-a-model-for-firing/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cbsnews.com/8301-31749_162-57381180-10391698/celebrity-apprentice-a-model-for-firing/&hl=en&geo=us>

E-con fails to move banks
Deccan Chronicle
Yash KS, who is reluctant to be described as an 'ethical hacker',
demonstrated the vulnerability of the online banking system of a private
bank in front of a panel of experts at the National Law School recently.
The malware prepared by Yash had ...
<http://www.deccanchronicle.com/channels/cities/bengaluru/e-con-fails-move-banks-854>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.deccanchronicle.com/channels/cities/bengaluru/e-con-fails-move-banks-854&hl=en&geo=us>

How bad password management can expose critical databases
InformationWeek India
As security experts analyze the ramifications of the nearly decade-long
Nortel breach, one of the clearest lessons bubbling to the surface is that
all of the encryption and vulnerability management in the world won't keep
hackers out if they already ...
<http://informationweek.in/Security/12-02-20/How_bad_password_management_can_expose_critical_databases.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://informationweek.in/Security/12-02-20/How_bad_password_management_can_expose_critical_databases.aspx&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail