Saturday, March 31, 2012

Google Alert - Metasploit

=== Web - 1 new result for [Metasploit] ===

Metasploit post exploitation
Hello all, I got a shell on windows server 2008 r2. its meterpreter
shell..now i m not able to exploit ...
<http://hackit.co/forum/Thread-Metasploit-post-exploitation>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Google fixes Pwnium vulnerabilities in Chrome 18
Inquirer
By Lawrence Latif SOFTWARE DEVELOPER Google has released Chrome 18 into the
stable channel, bringing a number of security fixes for vulnerabilities
that were highlighted at the Pwnium competition. Google's Chrome web
browser was well and truly beaten ...
<http://www.theinquirer.net/inquirer/news/2165056/google-fixes-pwnium-vulnerabilities-chrome>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.theinquirer.net/inquirer/news/2165056/google-fixes-pwnium-vulnerabilities-chrome&hl=en&geo=us>

Security companies and governments conspire to discover and hide
software ...
Boing Boing
By Cory Doctorow at 3:42 pm Friday, Mar 30 The Electronic Frontier
Foundation's Marcia Hoffman writes about security research companies that
work to discover "zero day" vulnerabilities in software and operating
systems, then sell them to governments ...
<http://boingboing.net/2012/03/30/security-companies-and-governm.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://boingboing.net/2012/03/30/security-companies-and-governm.html&hl=en&geo=us>

Forensic Approach To Mobile App Vulnerability Research
Dark Reading (blog)
By John H. Sawyer I recently gave a presentation at the SANS Mobile Device
Security Summit in Nashville, titled "Smart Bombs: Mobile Application
Vulnerabilities and Exploitation." The talk was a bit of a preview of a
talk of the same name that Kevin ...
<http://www.darkreading.com/blog/232800023/forensic-approach-to-mobile-app-vulnerability-research.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/blog/232800023/forensic-approach-to-mobile-app-vulnerability-research.html&hl=en&geo=us>

How to Secure Your Company's Videoconferencing System
eSecurity Planet
That changed two months ago, when security researchers at Rapid7 went
public with an analysis of significant vulnerabilities in corporate
videoconferencing systems. According to Rapid7 researchers HD Moore and
Mike Tuchen, those vulnerabilities could ...
<http://www.esecurityplanet.com/network-security/how-to-secure-videoconferencing-system-h323-rapid7-vulnerabilities.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.esecurityplanet.com/network-security/how-to-secure-videoconferencing-system-h323-rapid7-vulnerabilities.html&hl=en&geo=us>

Do Insecure Open Source Components Threaten Your Apps?
Computerworld New Zealand
For instance, Google Web Toolkit (GWT) was downloaded 17.7 million times
with known vulnerabilities. Other popular vulnerable libraries downloaded
included Xerces, Spring MVC and Struts 1.x. In many cases, newer, patched
versions of the components or ...
<http://computerworld.co.nz/news.nsf/security/do-insecure-open-source-components-threaten-your-apps>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://computerworld.co.nz/news.nsf/security/do-insecure-open-source-components-threaten-your-apps&hl=en&geo=us>

Repositories offer up vulnerable libraries says report
The H
A report by Aspect Security and Sonatype analysed 113 million downloads of
31 popular open source Java frameworks and security libraries and found
that, of those downloads, 26% of them had a known vulnerability. The report
says that this highlights the ...
<http://www.h-online.com/open/news/item/Repositories-offer-up-vulnerable-libraries-says-report-1498138.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.h-online.com/open/news/item/Repositories-offer-up-vulnerable-libraries-says-report-1498138.html&hl=en&geo=us>

Wireshark updates fix DoS vulnerabilities
The H
The updates to the cross-platform tool address several vulnerabilities that
could be exploited by an attacker to cause a denial-of-service (DoS)
condition. These include a memory allocation flaw in the MP2T dissector
that could cause it to allocate too ...
<http://www.h-online.com/security/news/item/Wireshark-updates-fix-DoS-vulnerabilities-1487215.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.h-online.com/security/news/item/Wireshark-updates-fix-DoS-vulnerabilities-1487215.html&hl=en&geo=us>

Report: Half Global 500 Vulnerable to Open Source Security Loopholes
Proformative
Aspect Security and Sonatype have recently collaborated to provide the
industry's first study of potential vulnerabilities in open-source
computing tools. These flexible components are used by members of the
Global 2000 and other leading organizations ...
<http://www.proformative.com/news/1473813/report-half-global-500-vulnerable-open-source-security-loopholes>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.proformative.com/news/1473813/report-half-global-500-vulnerable-open-source-security-loopholes&hl=en&geo=us>

50% Decline in Spam E-mail Announces IBM
SPAMfighter News
Apart from a decline in spam, IBM also observed a 30% decline in the new
exploit code that widely circulated hacking kit to pollute mutual software
vulnerabilities, presumably as there are less vulnerabilities popping up.
<http://www.spamfighter.com/News-17580-50-Decline-in-Spam-E-mail-Announces-IBM.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.spamfighter.com/News-17580-50-Decline-in-Spam-E-mail-Announces-IBM.htm&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Friday, March 30, 2012

Google Alert - Metasploit

=== News - 1 new result for [Metasploit] ===

Rapid7 Sponsors Androguard and Cuckoo Sandbox in the First Round ...
EON: Enhanced Online News
... complex security challenge we all face," said HD Moore, chief
security officer of Rapid7 and chief architect of the Metasploit open
source project.
<http://eon.businesswire.com/news/eon/20120329005869/en/rapid7/metasploit/AndroGuard>

=== Web - 1 new result for [Metasploit] ===

Metasploit Errors #3 - Pastebin.com
[unknown@PHAT64 ~]$ msf. /opt/metasploit-4.2.0/msf3/lib/fastlib.rb:368:in `
require': libcrypto.so.0.9.8: cannot open shared object file: No such file
or directory ...
<http://pastebin.com/s0RihQtH>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Adobe patches two critical Flash Player vulnerabilities
Computing
By Stuart Sumner Adobe has released a patch that fixes two critical
vulnerabilities in its Flash Player web browser plug-in. According to a
security bulletin released by the firm alongside the software update, the
patch upgrades Flash Player to version ...
<http://www.computing.co.uk/ctg/news/2164572/adobe-patches-critical-flash-player-vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computing.co.uk/ctg/news/2164572/adobe-patches-critical-flash-player-vulnerabilities&hl=en&geo=us>

New Flash Player Fixes Vulnerabilities
ITProPortal
The new version fixes two critical arbitrary code execution vulnerabilities
and introduces a silent update option. One of the now fixed vulnerabilities
is related to how older versions of the Flash Player checked URL security
domains.
<http://www.itproportal.com/2012/03/29/new-flash-player-fixes-vulnerabilities/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itproportal.com/2012/03/29/new-flash-player-fixes-vulnerabilities/&hl=en&geo=us>

Flash Player 11.2 fixes critical vulnerabilities and adds silent updates
Techworld.com
By Lucian Constantin | Published: 12:41, 29 March 2012 Adobe have released
Flash Player 11.2, addressing two critical arbitrary code execution
vulnerabilities and introducing a silent update option. One of the patched
vulnerabilities stems from how ...
<http://news.techworld.com/security/3347837/flash-player-112-fixes-critical-vulnerabilities-adds-silent-updates/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://news.techworld.com/security/3347837/flash-player-112-fixes-critical-vulnerabilities-adds-silent-updates/&hl=en&geo=us>

Lesson from Pwn2Own: Focus on Exploitability
Dark Reading
By Robert Lemos, Contributing Writer The Pwn2Own contest, which took place
earlier this month at the CanSecWest Conference, showed off the speed with
which knowledgeable security professionals can code exploits for known
vulnerabilities.
<http://www.darkreading.com/vulnerability-management/167901026/security/client-security/232800006/lesson-from-pwn2own-focus-on-exploitability.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability-management/167901026/security/client-security/232800006/lesson-from-pwn2own-focus-on-exploitability.html&hl=en&geo=us>

Chrome 18 Arrives with Nine Security Fixes
PCWorld
By Katherine Noyes, PCWorld Google on Wednesday released Chrome 18 to its
Stable channel complete with several new features and fixes for nine
security vulnerabilities. Officially named version18.0.1025.142, the new
version of Google's open source ...
<http://www.pcworld.com/businesscenter/article/252841/chrome_18_arrives_with_nine_security_fixes.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252841/chrome_18_arrives_with_nine_security_fixes.html&hl=en&geo=us>

Social Engineering: Hacking The Human Mind
Forbes
Social engineering is about hacking the human mind, something that in many
ways is significantly easier than finding a new software vulnerability and
using it as a gateway into your enterprise. These vulnerabilities, called
zero-days, can cost tens of ...
<http://www.forbes.com/sites/ciocentral/2012/03/29/social-engineering-hacking-the-human-mind/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.forbes.com/sites/ciocentral/2012/03/29/social-engineering-hacking-the-human-mind/&hl=en&geo=us>

Adobe fixes 2 Flash bugs, enables automatic updates
msnbc.com
Released yesterday (March 28), Adobe Flash 11.1.102.63 tackles memory
corruption vulnerabilities that could crash infected systems and allow an
attacker to remotely take them over, Adobe said in its press release. In
fixing the security bugs, ...
<http://www.msnbc.msn.com/id/46894760/ns/technology_and_science-security/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.msnbc.msn.com/id/46894760/ns/technology_and_science-security/&hl=en&geo=us>

Kurt Busch looks for a win at Martinsville
Motorsport.com
Vulnerability is something every athlete battles and works hard to
overcome. It isn't publicly discussed, but it is there in the background,
lingering like a shadow that silently follows one around. NASCAR drivers
battle their own vulnerabilities on a ...
<http://www.motorsport.com/nascar-cup/news/kurt-busch-looks-for-a-win-at-martinsville/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.motorsport.com/nascar-cup/news/kurt-busch-looks-for-a-win-at-martinsville/&hl=en&geo=us>

Adobe Fixes Critical Security Flaws In Flash Player
CRN
By Antone Gonsalves, CRN Adobe Systems has released a Flash Player update
that fixes two critical vulnerabilities and adds an automatic update
feature. If left unpatched, the flaws could cause a crash and allow an
attacker to take control of a computer ...
<http://www.crn.com/news/security/232700519/adobe-fixes-critical-security-flaws-in-flash-player.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.crn.com/news/security/232700519/adobe-fixes-critical-security-flaws-in-flash-player.htm&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Thursday, March 29, 2012

Google Alert - Metasploit

=== Web - 1 new result for [Metasploit] ===

Hacking With Metasploit | Java Exploit | Java_Rinho Module ...
Hacking into any system Win7 , Win xp , Vista, Linux , Mac , this vuln
works on any web browser that supports java ,IE ,Firefox, GoogleChrome, etc
... the af...
<http://www.youtube.com/watch?v=V2s6vL-GATE>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Flash Player 11.2 Fixes Critical Vulnerabilities, Adds Silent Updates
PCWorld
By Lucian Constantin, IDG News Adobe released Flash Player 11.2 on Tuesday,
addressing two critical arbitrary code execution vulnerabilities and
introducing a silent update option. One of the patched vulnerabilities
stems from how older versions of ...
<http://www.pcworld.com/businesscenter/article/252755/flash_player_112_fixes_critical_vulnerabilities_adds_silent_updates.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252755/flash_player_112_fixes_critical_vulnerabilities_adds_silent_updates.html&hl=en&geo=us>

Flash Player 11.2 fixes critical vulnerabilities
Australian Macworld
Adobe released Flash Player 11.2 on Wednesday, addressing two critical
arbitrary code execution vulnerabilities and introducing a silent update
option. One of the patched vulnerabilities stems from how older versions of
Flash Player checks URL security ...
<http://www.macworld.com.au/news/flash-player-11-2-fixes-critical-vulnerabilities-48740/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.macworld.com.au/news/flash-player-11-2-fixes-critical-vulnerabilities-48740/&hl=en&geo=us>

Boston Fed'​s Rosengren Talks on Vulnerabilities in Short-​Term Funding
Crane Data LLC
Rosengren says in the middle of his talk, "This past financial crisis was a
primer on vulnerabilities to short-​term funding. Specifically, wholesale
funding utilized by large global banks dried up during the financial
crisis.
<http://cranedata.com/archives/all-articles/3905/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://cranedata.com/archives/all-articles/3905/&hl=en&geo=us>

Sonatype not out to slam open source
ITworld.com
The problem, he explained, was just the opposite: open source was so freely
available, developers and organizations could have vulnerabilities buried
deep in their own code and not even know it. One of the cool things about
open source software is that ...
<http://www.itworld.com/security/263064/sonatype-not-out-slam-open-source>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itworld.com/security/263064/sonatype-not-out-slam-open-source&hl=en&geo=us>

Vulnerabilities Uncovered in Google, Facebook Single Sign-On
TechWeekEurope UK
"Vulnerabilities that do not show up on the protocol level could be
brought in by what the system actually allows each SSO party to do: an
example we discovered is that Adobe Flash's cross-domain capability totally
crippled Facebook SSO security," the ...
<http://www.techweekeurope.co.uk/news/google-facebook-security-69918>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.techweekeurope.co.uk/news/google-facebook-security-69918&hl=en&geo=us>

Kenneth Van Wyk: The case for Rugged Software
Computerworld
We've all spent years chasing patches and vulnerabilities, but we don't
seem to be making positive progress on that front. As John Wilander, my
fellow "invited expert" at Rugged Software sessions held this month in
Washington, wrote in a blog post, ...
<http://www.computerworld.com/s/article/9225630/Kenneth_Van_Wyk_The_case_for_Rugged_Software>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computerworld.com/s/article/9225630/Kenneth_Van_Wyk_The_case_for_Rugged_Software&hl=en&geo=us>

White House: no contingency plan if healthcare law rejected
Reuters
* Top officials have cited options in the past * Analysts see
vulnerabilities for Obama's base * Any action unlikely until after November
vote (Adds quotes, details and background) By David Morgan and Jeff Mason
WASHINGTON, March 28 (Reuters) - The ...
<http://www.reuters.com/article/2012/03/28/usa-healthcare-contingency-idUSL2E8QS19Q20120328>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.reuters.com/article/2012/03/28/usa-healthcare-contingency-idUSL2E8QS19Q20120328&hl=en&geo=us>

Adobe Streamlines Update Process with Flash 11.2
PCWorld
The update addresses a couple critical vulnerabilities, but the real news
from Flash 11.2 are the changes Adobe has made to the background updating
mechanics. The Flash update should be applied as soon as possible from a
security perspective.
<http://www.pcworld.com/businesscenter/article/252757/adobe_streamlines_update_process_with_flash_112.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252757/adobe_streamlines_update_process_with_flash_112.html&hl=en&geo=us>

Adobe streamlines Flash Player updates by going silent
Computerworld
By Gregg Keizer Computerworld - Adobe yesterday released Flash Player 11.2,
adding silent updating to speed patching of "zero-day" vulnerabilities in
the Windows edition. "Improving the update process is probably the single
most important challenge we ...
<http://www.computerworld.com/s/article/9225624/Adobe_streamlines_Flash_Player_updates_by_going_silent>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computerworld.com/s/article/9225624/Adobe_streamlines_Flash_Player_updates_by_going_silent&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Wednesday, March 28, 2012

Google Alert - Metasploit

=== Web - 2 new results for [Metasploit] ===

need help using metasploit
hey i'm new to penetration testing and new to linux.. but this section is
really interesting for me.. i'v been using for a couple of weeks an ubuntu
os as my main os ...
<http://www.backtrack-linux.org/forums/showthread.php?t=49036>

Security Override - Discussion Forum: Using Metasploit in Backtrack
Hey guys, I have been using the Metasploit Framework which is included in
the Linux Distribution of Backtrack for pen-testers and enthusiasts. I came
upon a ...
<http://206.214.216.120/forum/viewthread.php?thread_id=1795>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

Tibet.A malware for OS X uses Flashback Java vulnerabilities
CNET
As with the Flashback malware, since this vulnerability only requires
access to the user's account, no password is required to run or install it,
provided users are running older versions of Java and have Java enabled on
their browsers.
<http://reviews.cnet.com/8301-13727_7-57405449-263/tibet.a-malware-for-os-x-uses-flashback-java-vulnerabilities/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://reviews.cnet.com/8301-13727_7-57405449-263/tibet.a-malware-for-os-x-uses-flashback-java-vulnerabilities/&hl=en&geo=us>

IT Supply Chain Security Weak at Major US Agencies, Says GAO
PCWorld
With agencies buying hardware pieced together from components made all over
the world, they need to check their purchases for vulnerabilities that
could slip in at any point in the manufacturing and shipping process,
Gregory Wilshusen, GAO's director ...
<http://www.pcworld.com/businesscenter/article/252703/it_supply_chain_security_weak_at_major_us_agencies_says_gao.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252703/it_supply_chain_security_weak_at_major_us_agencies_says_gao.html&hl=en&geo=us>

Study: Open source libraries propagate security flaws
Java World
By Robert Lemos, InfoWorld, 03/27/12 Although companies such as Microsoft,
Adobe, and Mozilla have raised awareness of secure programming practices in
recent years, getting developers to adopt best practices to weed out
vulnerabilities in program code ...
<http://www.javaworld.com/javaworld/jw-03-2012/120327-open-source-libraries-propagate-security-flaws.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.javaworld.com/javaworld/jw-03-2012/120327-open-source-libraries-propagate-security-flaws.html&hl=en&geo=us>

Application Security, Inc. Streamlines the Database Security Process with
CVE ...
MarketWatch (press release)
CVE is a dictionary of common names for vulnerabilities and other
information security exposures, created by non-profit MITRE Corporation.
This certification ensures the AppSecInc product line and award-winning
research team continue to speak a common ...
<http://www.marketwatch.com/story/application-security-inc-streamlines-the-database-security-process-with-cve-compatible-product-line-and-teamshatter-research-website-2012-03-27>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/application-security-inc-streamlines-the-database-security-process-with-cve-compatible-product-line-and-teamshatter-research-website-2012-03-27&hl=en&geo=us>

What to do before and after a digital security breach
Washington Post
Reports show that during 2010, most Web sites were exposed to at least one
serious security vulnerability. This one vulnerability is enough to lead to
a large breach resulting in lost data. This doesn't mean you should abandon
all hope, but rather you ...
<http://www.washingtonpost.com/business/on-small-business/what-to-do-before-and-after-a-digital-security-breach/2012/03/10/gIQAdNCKeS_story.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.washingtonpost.com/business/on-small-business/what-to-do-before-and-after-a-digital-security-breach/2012/03/10/gIQAdNCKeS_story.html&hl=en&geo=us>

Are Open Source Libraries Any More Vulnerable Than Closed Source?
Network World
As noted in Ellen's article some of the biggest libraries that are used and
have known vulnerabilities are Google Web Toolkit (GWT); Apache Xerces;
Spring MVC; and Struts 1.x. The study was pretty exhaustive. Again from
Ellen's article: - 19.8 million ...
<http://www.networkworld.com/community/node/80139>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.networkworld.com/community/node/80139&hl=en&geo=us>

Android: a new OS needing a new approach
ITWeb
Vulnerabilities in Android devices and applications pose a potential threat
to users' security, says information security consultant Tyrone Erasmus.
Android devices and applications have a number of potential vulnerabilities
just waiting to be ...
<http://www.itweb.co.za/index.php?option=com_content&view=article&id=53003:android-a-new-os-needing-a-new-approach&catid=234>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itweb.co.za/index.php%3Foption%3Dcom_content%26view%3Darticle%26id%3D53003:android-a-new-os-needing-a-new-approach%26catid%3D234&hl=en&geo=us>

iOS Exploits Go for $250000 These Days
Tom's Guide
Software vulnerabilities can earn big money, and we are not talking about
$1000 or even a $10000 bonus Google pays out to its bug reporters. Finding
the right vulnerability and selling it as a zero-day exploit to the right
person could be just as ...
<http://www.tomsguide.com/us/hacker-security-exploit-zero-day-hacks,news-14585.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.tomsguide.com/us/hacker-security-exploit-zero-day-hacks,news-14585.html&hl=en&geo=us>

Bayshore Networks Founder, CEO Francis Cianfrocca to Present Securing
Critical ...
MarketWatch (press release)
... Center in Washington, DC Despite heightened recognition and awareness
of vulnerabilities in Industrial Control Systems (ICS), the widening gap
between ICS vulnerabilities and commonly deployed security technology
presents a troubling disparity.
<http://www.marketwatch.com/story/bayshore-networks-founder-ceo-francis-cianfrocca-to-present-securing-critical-infrastructure-april-5-at-appsec-dc-2012-2012-03-27>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/bayshore-networks-founder-ceo-francis-cianfrocca-to-present-securing-critical-infrastructure-april-5-at-appsec-dc-2012-2012-03-27&hl=en&geo=us>

Lawmakers push DoD, Energy for answers on IT supply chain security
FederalNewsRadio.com
... installation of counterfeit items, disruption in the production or
distribution of critical products, reliance on unqualified or malicious
service providers and installation of hardware or software containing
unintended vulnerabilities.
<http://www.federalnewsradio.com/?nid=473&sid=2804599>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.federalnewsradio.com/%3Fnid%3D473%26sid%3D2804599&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Tuesday, March 27, 2012

Google Alert - Metasploit

=== Web - 4 new results for [Metasploit] ===

ccsvm integration with metasploit | Symantec Connect Community
I was trying to integrate ccsvm with metasploit. I followed the below
article for ccsvm & metasploit integration.
<http://www.symantec.com/connect/forums/ccsvm-integration-metasploit>

Metasploit: Re: Exploit exception: execution expired
Unless those services or processes are facing the network (have listening
daemons) the answer is no ... It seems like ure somehow confused between a
local ...
<http://seclists.org/metasploit/2012/q1/124>

Metasploit Backdoors Making | Real Hacker Network
El video tutorial contiene: - Uso de shikata ga nai para embeber payload
dentro de código C++ para evadir antivirus - Modificación de registros
de.
<http://www.realhacker.net/videos/metasploit-backdoors-making>

SPcits Certified Metasploit Expert | Nitee.org
SPaul Complete IT Solution (SPcits) is organizing a 2 month, training
course on METASPLOIT. You can enroll for free demo class that will be
commencing on ...
<http://nitee.org/event/spcits-certified-metasploit-expert>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 8 new results for [Vulnerabilities] ===

Open Source Code Libraries Seen as Rife With Vulnerabilities
PCWorld
By Ellen Messmer, NetworkWorld A study of how 31 popular open-source code
libraries were downloaded over the past 12 months found that more than a
third of the 1261 versions of these libraries had a known vulnerability and
about a quarter of the ...
<http://www.pcworld.com/businesscenter/article/252593/open_source_code_libraries_seen_as_rife_with_vulnerabilities.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252593/open_source_code_libraries_seen_as_rife_with_vulnerabilities.html&hl=en&geo=us>

Command Injection Attacks, Automated Password Guessing On The Rise
Dark Reading
By Tim Wilson Spam and several of the most common vulnerabilities are on
the decline, according to a report issued this week, but there has been a
marked increase in new types of attacks, such as shell command injection
and automated password guessing.
<http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/232700282/command-injection-attacks-automated-password-guessing-on-the-rise.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/232700282/command-injection-attacks-automated-password-guessing-on-the-rise.html&hl=en&geo=us>

Social Phishing Spikes As Spam Declines, IBM Finds
InformationWeek
The X-Force Trend and Risk Report for 2011, released Thursday, revealed a
50% decline in spam email compared to 2010, more diligent vendor patching
of security vulnerabilities, and fewer Web application vulnerabilities,
with half the incidence of ...
<http://informationweek.com/news/thebrainyard/social_networking_consumer/232700191>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://informationweek.com/news/thebrainyard/social_networking_consumer/232700191&hl=en&geo=us>

How much does a 0-day vulnerability cost?
Help Net Security
The market for exploits for zero-day vulnerabilities has exploded in the
last year, says Adriel Desautels, the founder of Netragard, a penetration
testing and vulnerability assessment outfit that, among other things,
acquires and develops exploits.
<http://www.net-security.org/secworld.php?id=12652>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/secworld.php%3Fid%3D12652&hl=en&geo=us>

Report: iOS vulnerability sold for $250000
The H
Business appears to be booming for those who trade in unpatched (zero-day)
security holes: according to a report by Forbes magazine, a US company that
works for the US government recently paid $250000 for a vulnerability in
Apple's iOS operating system ...
<http://www.h-online.com/security/news/item/Report-iOS-vulnerability-sold-for-250-000-1480102.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.h-online.com/security/news/item/Report-iOS-vulnerability-sold-for-250-000-1480102.html&hl=en&geo=us>

Italian researchers 'repair' Android vulnerabilities
Agenzia Giornalistica Italia
(AGI) Trento - Italian researchers have discovered and neutralised a
serious vulnerability in all versions of Android. The Google operating
system was developed specifically for smartphones and tablet computers. The
result is the fruit of collaboration ...
<http://www.agi.it/english-version/people/elenco-notizie/201203261245-spe-ren1036-italian_researchers_repair_android_vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.agi.it/english-version/people/elenco-notizie/201203261245-spe-ren1036-italian_researchers_repair_android_vulnerabilities&hl=en&geo=us>

New Study Reveals Widespread Use of Vulnerable Open-Source Components by
the ...
MarketWatch (press release)
Google Web Toolkit (GWT) was downloaded 17.7 million times with known
vulnerabilities. Other popular vulnerable libraries downloaded included
Xerces, Spring MVC, and Struts 1.x. -- Users are not update aware: One in
three of the most popular components ...
<http://www.marketwatch.com/story/new-study-reveals-widespread-use-of-vulnerable-open-source-components-by-the-global-500-2012-03-26>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/new-study-reveals-widespread-use-of-vulnerable-open-source-components-by-the-global-500-2012-03-26&hl=en&geo=us>

IBM X-Force tags three growing cyberattack trends in 2011
Infosecurity Magazine
IBM has developed "glass box" technology that uses static (white box)
and dynamic (black box) testing methods to locate vulnerabilities in web
applications. IBM is acquiring Green Hat, the cloud-based software testing
company.
<http://www.infosecurity-magazine.com/view/24760/ibm-xforce-tags-three-growing-cyberattack-trends-in-2011/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.infosecurity-magazine.com/view/24760/ibm-xforce-tags-three-growing-cyberattack-trends-in-2011/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Monday, March 26, 2012

Google Alert - Metasploit

=== News - 1 new result for [Metasploit] ===

Update for Metasploit Exploit Tool
Techwatch
HD Moore, the renowned exploit researcher and Metasploit creator stated
"It's a minor update, but it's the result of 10 months of hard work.
<http://www.techwatch.co.uk/2008/01/29/update-for-metasploit-exploit-tool/>

=== Web - 5 new results for [Metasploit] ===

iPhone Reverse TCP with Metasploit : netsec
subscribeunsubscribe46164 readers. reddit · @r_netsec · home/new. A
community for technical news and discussion of information security and
closely related ...
<http://www.reddit.com/r/netsec/comments/r4f4g/iphone_reverse_tcp_with_metasploit/>

The Ethical Hacker Network - using code from Metasploit
The Ethical Hacker Network - Free Online Magazine for the Security
Professional, using code from Metasploit.
<http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,8674.msg47718/topicseen,1/>

I have error in metasploit ..can u solve it !!? - Yahoo! Answers
can someone tell me what's wrong in here ....whene…
<http://answers.yahoo.com/question/index?qid=20120325121107AAK4GDp>

"Metastock 11" :: "metastock 9 0 professional" - "metasploit toolkit for ...
metastock 8 download free, metasploit_pro, metastabilityppt, metastock
addons.
<http://burbank1973.com/mica/newaire.php?metasploit-toolkit-for-penetration-testing-exploit-development-and-vulnerability-research-pdf>

Introduction To Metasploit
What is metasploit? - Metasploit is an security exploitation and attacking
framework. - It has over hundreds of exploits and payloads that enables you
to identify ...
<http://www.hackandlearn.com/viewarticle.php?id=41332008240>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 8 new results for [Vulnerabilities] ===

Security vulnerabilities with HTML5 (WebSockets)?
InfoQ.com
Well according to Lori, because WebSockets removes HTTP headers amongst
other things this opens up vulnerabilities that existing virus and malware
checkers require: You know, things like CONTENT-TYPE. You know, the header
that tells the endpoint what ...
<http://www.infoq.com/news/2012/03/websockets-security>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.infoq.com/news/2012/03/websockets-security&hl=en&geo=us>

Study: More than 50% of Global 500 use vulnerable open source components
ZDNet (blog)
By Paula Rooney | March 25, 2012, 10:40pm PDT Summary: A joint study
conducted by Sonatype and Aspect Security found that many open source
components, security libraries and web frameworks contain vulnerabilities,
and that many Fortune 500 companies ...
<http://www.zdnet.com/blog/open-source/study-more-than-50-of-global-500-use-vulnerable-open-source-components/10660>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com/blog/open-source/study-more-than-50-of-global-500-use-vulnerable-open-source-components/10660&hl=en&geo=us>

Internet security better but foul exploits grow, IBM says
CSO
By Michael Cooney March 23, 2012 — Network World — IBM said it found
surprising improvements in Internet security such as a reduction in
application security vulnerabilities, exploit code and spam, but it also
noted that those improvements come with ...
<http://www.csoonline.com/article/702831/internet-security-better-but-foul-exploits-grow-ibm-says>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.csoonline.com/article/702831/internet-security-better-but-foul-exploits-grow-ibm-says&hl=en&geo=us>

Mobile vulnerabilities top IBM report
CRN Australia
By Marcos Colon on Mar 26, 2012 8:22 AM (7 hours ago) The company's X-Force
Trend and Risk Report released this week studied public vulnerability
disclosures from more than 4000 clients last year and found many targeted
mobile platforms.
<http://www.crn.com.au/News/294910,mobile-vulnerabilities-top-ibm-report.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.crn.com.au/News/294910,mobile-vulnerabilities-top-ibm-report.aspx&hl=en&geo=us>

US government pays $250000 for iOS exploit
ZDNet (blog)
Hackers can get paid anywhere between $5000 and $250000 for a security
vulnerability. It's been known for a while that there's a huge market for
buying and selling zero-day exploits in popular software and operating
systems.
<http://www.zdnet.com/blog/security/us-government-pays-250000-for-ios-exploit/11044>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com/blog/security/us-government-pays-250000-for-ios-exploit/11044&hl=en&geo=us>

Scratches on the Surface of SHA256
ITWeb
A closer look at the cryptography in use for digital currency Bitcoin shows
new vulnerabilities in SHA256, says Absa information security researcher
Frans Lategan. Frans Lategan – Absa information security researcher and
speaker at the ITWeb Security ...
<http://www.itweb.co.za/index.php?option=com_content&view=article&id=52906:scratches-on-the-surface-of-sha256>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itweb.co.za/index.php%3Foption%3Dcom_content%26view%3Darticle%26id%3D52906:scratches-on-the-surface-of-sha256&hl=en&geo=us>

Security fundamentals for embedded software
EE Times
Most security attacks are known to exploit vulnerabilities within
application software. Vulnerabilities are introduced into our embedded
systems during software design and development. Since system-level and
hardware defenses against security attacks ...
<http://www.eetimes.com/design/embedded/4304104/Security-fundamentals-for-embedded-software>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eetimes.com/design/embedded/4304104/Security-fundamentals-for-embedded-software&hl=en&geo=us>

earthwave and HP deliver first-of-its-kind Security Operations Centre
PRWire
The offering can provide comprehensive security device management,
real-time threat analysis and incident response, reporting, vulnerability
management, threat intelligence, security assurance, regulatory compliance,
and a branded security portal.
<http://prwire.com.au/pr/27960/earthwave-and-hp-deliver-first-of-its-kind-security-operations-centre>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://prwire.com.au/pr/27960/earthwave-and-hp-deliver-first-of-its-kind-security-operations-centre&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Sunday, March 25, 2012

Google Alert - Metasploit

=== Web - 4 new results for [Metasploit] ===

Mercury: Android testing framework released - think Metasploit for ...
Mercury: Android testing framework released - think Metasploit for Android
(labs. mwrinfosecurity.com). submitted 51 minutes ago by [deleted].
comment; share ...
<http://www.reddit.com/r/netsec/comments/r3atb/mercury_android_testing_framework_released_think/>

Social Engineering Toolkit and Metasploit: Web cloning attack and ...
Choose 2 for shikata ganai encoding for av detection evasion, metasploit
encodes the payload 4 times to avoid av detection, for the target machine
it has no av, ...
<http://cyruslab.wordpress.com/2012/03/20/social-engineering-toolkit-and-metasploit-web-cloning-attack-and-uploading-a-backdoor/>

Metasploit: Re: Delivering Linux Meterpreter via command injection
I have three exploit modules written for SAP that exploit arbitrary command
executions in order to deliver a Windows meterpreter payload. I'm making
use of ...
<http://seclists.org/metasploit/2012/q1/122>

Fix fast-track after metasploit update (autopwn)
After updating metasploit, fast-track does not work due to the removal of
db_autopwn from the metasploit framework. This is easily fixed by first
grabbing ...
<http://www.backtrack-linux.org/forums/showthread.php?t=49020>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 5 new results for [Vulnerabilities] ===

Japan to push anti-terror measures at nuke plants
Atlanta Journal Constitution
By ERIC TALMADGE AP TOKYO — The US had repeatedly warned Japan about
vulnerabilities at its nuclear plants in case of a Sept. 11-style terror
attack. It turned out Washington was right about the soft spots, but wrong
about the enemy that would strike ...
<http://www.ajc.com/news/nation-world/japan-to-push-anti-1397761.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ajc.com/news/nation-world/japan-to-push-anti-1397761.html&hl=en&geo=us>

Bernanke: Crisis exposed vulnerabilities
TheBull.com.au
... Peter Karadi of the European Central Bank and Mark Gertler, an
economics professor at New York University. Gertler collaborated with
Bernanke on academic research when Bernanke taught at Princeton University.
Bernanke : Crisis exposed vulnerabilities.
<http://www.thebull.com.au/articles/a/27069-bernanke:-crisis-exposed-vulnerabilities.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.thebull.com.au/articles/a/27069-bernanke:-crisis-exposed-vulnerabilities.html&hl=en&geo=us>

Fed's Bernanke says financial crisis exposed vulnerabilities
DesMoinesRegister.com
Federal Reserve Board Chairman Ben Bernanke lectures at George Washington
University in Washington on Thursday. / By Win McNamee, Getty Images By
Martin Crutsinger, Associated Press WASHINGTON (AP) — Chairman Ben
Bernanke said the slow recovery from ...
<http://www.desmoinesregister.com/usatoday/article/53734444?odyssey=mod%7Cnewswell%7Ctext%7CBusiness%7Cp>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.desmoinesregister.com/usatoday/article/53734444%3Fodyssey%3Dmod%257Cnewswell%257Ctext%257CBusiness%257Cp&hl=en&geo=us>

Streamlined Windows Server 8 Offers Key Benefits
PCWorld
Yet, then there are the potential vulnerabilities in those unneeded
services, or the need to reboot when a patch is issued for a service you
don't even use. Thankfully, Windows Server 8, now available in beta, will
enable a core that can selectively ...
<http://www.pcworld.com/businesscenter/article/252496/streamlined_windows_server_8_offers_key_benefits.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252496/streamlined_windows_server_8_offers_key_benefits.html&hl=en&geo=us>

Acknowledging Fukushima soft spots, Japan to push anti-terror measures
at ...
Newser
By ERIC TALMADGE | AP | 1 hour, 38 minutes ago in The US had repeatedly
warned Japan about vulnerabilities at its nuclear plants in case of a Sept.
11-style terror attack. It turned out Washington was right about the soft
spots, but wrong about the ...
<http://www.newser.com/article/d9tnao5g0/acknowledging-fukushima-soft-spots-japan-to-push-anti-terror-measures-at-nuclear-summit.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.newser.com/article/d9tnao5g0/acknowledging-fukushima-soft-spots-japan-to-push-anti-terror-measures-at-nuclear-summit.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Saturday, March 24, 2012

Google Alert - Metasploit

=== Web - 2 new results for [Metasploit] ===

Security Override - Discussion Forum: Using Metasploit in Backtrack
Using Metasploit in Backtrack | Edited by p3N7ub3r Today 09:49 PM ... Hey
guys, I have been using the Metasploit Framework which is included in the
Linux ...
<http://securityoverride.net/forum/viewthread.php?thread_id=1795>

The Ethical Hacker Network - iPhone Metasploit code for reverse TCP?
The Ethical Hacker Network - Free Online Magazine for the Security
Professional, iPhone Metasploit code for reverse TCP?
<http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,8675.msg47784/>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 8 new results for [Vulnerabilities] ===

Bernanke says crisis exposed vulnerabilities
BusinessWeek
By MARTIN CRUTSINGER Chairman Ben Bernanke said the slow recovery from the
Great Recession and 2008 financial crisis illustrates how vulnerable the
global economy is, while urging economic policymakers to learn from that
lesson.
<http://www.businessweek.com/ap/2012-03/D9TMCC800.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.businessweek.com/ap/2012-03/D9TMCC800.htm&hl=en&geo=us>

IBM: Internet Security Better, Exploits Worse
PCWorld
By Michael Cooney, NetworkWorld IBM said it found surprising improvements
in Internet security such as a reduction in application security
vulnerabilities, exploit code and spam, but it also noted that those
improvements come with a price: Attackers ...
<http://www.pcworld.com/businesscenter/article/252490/ibm_internet_security_better_exploits_worse.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252490/ibm_internet_security_better_exploits_worse.html&hl=en&geo=us>

Bernanke says financial crisis and recession showed vulnerabilities of
modern ...
Washington Post
WASHINGTON — Chairman Ben Bernanke said the slow recovery from the Great
Recession and 2008 financial crisis illustrates how vulnerable the global
economy is, while urging economic policymakers to learn from that lesson.
The Federal Reserve chairman ...
<http://www.washingtonpost.com/business/markets/bernanke-says-financial-crisis-and-recession-showed-vulnerabilities-of-modern-financial-system/2012/03/23/gIQAtbHCWS_story.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.washingtonpost.com/business/markets/bernanke-says-financial-crisis-and-recession-showed-vulnerabilities-of-modern-financial-system/2012/03/23/gIQAtbHCWS_story.html&hl=en&geo=us>

Software Exploits Dropped in 2011, IBM X-Force Says
PCWorld
By John E Dunn, Techworld.com Software exploits aimed at known security
vulnerabilities dropped in 2011 to their lowest level for half a decade, a
surprisingly upbeat report from IBM's X-Force division has found. The
company's 2011 Trend and Risk ...
<http://www.pcworld.com/businesscenter/article/252430/software_exploits_dropped_in_2011_ibm_xforce_says.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/252430/software_exploits_dropped_in_2011_ibm_xforce_says.html&hl=en&geo=us>

Bernanke: GFC exposed vulnerabilities
Sydney Morning Herald
US Federal Reserve chairman Ben Bernanke says the slow recovery from the
Great Recession and 2008 financial crisis illustrates how vulnerable the
global economy is, while urging economic policymakers to learn from that
lesson. Bernanke on Friday noted ...
<http://www.smh.com.au/business/world-business/bernanke-gfc-exposed-vulnerabilities-20120324-1vq7u.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.smh.com.au/business/world-business/bernanke-gfc-exposed-vulnerabilities-20120324-1vq7u.html&hl=en&geo=us>

Choosing The Right Vulnerability Scanner For Your Organization
Dark Reading
Vulnerability scanning plays a key role in both security administration and
compliance. But which tools are right for you? Here are some tips on how to
decide By Gary McCully, Contributing Writer [Excerpted from "Choosing The
Right Vulnerability ...
<http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/232700187/choosing-the-right-vulnerability-scanner-for-your-organization.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/232700187/choosing-the-right-vulnerability-scanner-for-your-organization.html&hl=en&geo=us>

Bernanke: Crisis exposed vulnerabilities
Ninemsn
Tax Time 2011Doing your tax doesn't need to be daunting! Check out ninemsn
Finance's Tax Time for tips and advice on how to make your 2011/12 tax
return work for you. US Federal Reserve chairman Ben Bernanke says the slow
recovery from the Great ...
<http://finance.ninemsn.com.au/newsbusiness/aap/8440523/bernanke-crisis-exposed-vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://finance.ninemsn.com.au/newsbusiness/aap/8440523/bernanke-crisis-exposed-vulnerabilities&hl=en&geo=us>

Mobile vulnerabilities top IBM report
SC Magazine Australia
By Marcos Colon on Mar 24, 2012 7:45 AM The company's X-Force Trend and
Risk Report released this week studied public vulnerability disclosures
from more than 4000 clients last year and found many targeted mobile
platforms. "We're starting to see real ...
<http://www.scmagazine.com.au/News/294830,mobile-vulnerabilities-top-ibm-report.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.scmagazine.com.au/News/294830,mobile-vulnerabilities-top-ibm-report.aspx&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Friday, March 23, 2012

Google Alert - Metasploit

=== Web - 1 new result for [Metasploit] ===

Metasploit: Pwnage and Ponies
Introduction to metasploit that we presented to the 4th year compsci
students at Rhodes university.Covering the basic functionality of
metasploit, and penetrati.
<http://www.slideshare.net/Trowalts/metasploit-pwnage-and-ponies>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Dome9 Security Addresses Widespread Microsoft RDP Cloud Server Vulnerability
MarketWatch (press release)
Dome9's cloud security service that automates firewall management
eliminates the tactical response to both known vulnerabilities, and
vulnerabilities yet to be discovered, and delivers a strategic approach to
securing cloud servers.
<http://www.marketwatch.com/story/dome9-security-addresses-widespread-microsoft-rdp-cloud-server-vulnerability-2012-03-22>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/dome9-security-addresses-widespread-microsoft-rdp-cloud-server-vulnerability-2012-03-22&hl=en&geo=us>

IBM: Security Is Improving, but Cyber-Criminals Are Adapting
eWeek
IBM in its X-Force security report for 2011 said security efforts have cut
spam and improved vulnerability patching, but attackers are now targeting
mobile devices and the cloud. Cyber-criminals, increasingly stymied by
better security around ...
<http://www.eweek.com/c/a/Security/IBM-Security-Improving-but-CyberCriminals-Are-Adapting-757749/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eweek.com/c/a/Security/IBM-Security-Improving-but-CyberCriminals-Are-Adapting-757749/&hl=en&geo=us>

National Survey Uncovers Data Breach Vulnerabilities in the Workplace
MarketWatch (press release)
ITASCA, Ill., March 22, 2012 /PRNewswire via COMTEX/ -- Many business
professionals don't realize that when their company's confidential
information is at risk, so too is the information of its clients, vendors,
customers and employees.
<http://www.marketwatch.com/story/national-survey-uncovers-data-breach-vulnerabilities-in-the-workplace-2012-03-22>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/national-survey-uncovers-data-breach-vulnerabilities-in-the-workplace-2012-03-22&hl=en&geo=us>

IBM X-Force Report: 2011 Shows Progress Against Security Threats But
Attackers ...
MarketWatch (press release)
The X-Force 2011 Trend and Risk Report revealed a 50 percent decline in
spam email compared to 2010; more diligent patching of security
vulnerabilities by software vendors, with only 36 percent of software
vulnerabilities remaining unpatched in 2011 ...
<http://www.marketwatch.com/story/ibm-x-force-report-2011-shows-progress-against-security-threats-but-attackers-adapt-2012-03-22>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/ibm-x-force-report-2011-shows-progress-against-security-threats-but-attackers-adapt-2012-03-22&hl=en&geo=us>

Google patches 9 Chrome bugs, pays more to top researchers
Computerworld
By Gregg Keizer Computerworld - Google yesterday patched nine
vulnerabilities in Chrome in the sixth security update to Chrome 17, the
edition that launched Feb. 8. Wednesday's update was the first since the
Chrome security team issued a pair of quick ...
<http://www.computerworld.com/s/article/9225441/Google_patches_9_Chrome_bugs_pays_more_to_top_researchers>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computerworld.com/s/article/9225441/Google_patches_9_Chrome_bugs_pays_more_to_top_researchers&hl=en&geo=us>

Surprising progress in some Internet security areas: IBM
eChannelLine
By Mark Cox IBM has released the results of its X-Force 2011 Trend and Risk
Report, which it says shows surprising improvements in several areas of
Internet security such as a reduction in application security
vulnerabilities, exploit code and spam.
<http://www.echannelline.com/usa/story.cfm?item=27618>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.echannelline.com/usa/story.cfm%3Fitem%3D27618&hl=en&geo=us>

Companies need to showcase vulnerabilities to build authenticity: Adobe ...
DM News
"This goes against centuries of normal business and brand building lore,
but I think vulnerability is valuable," Stone said to crowd of more than
4000 people. To illustrate his point, Stone referenced Harrison Ford's film
characters.
<http://www.dmnews.com/companies-need-to-showcase-vulnerabilities-to-build-authenticity-adobe-digital-marketing-summit/article/233291/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.dmnews.com/companies-need-to-showcase-vulnerabilities-to-build-authenticity-adobe-digital-marketing-summit/article/233291/&hl=en&geo=us>

Security Report Warns of New Vulnerabilities
Internet Evolution
Results of IBM's latest X-Force 2011 Trend and Risk Report indicate that,
though application security vulnerabilities, exploit code, and spam are
down from a year earlier, more danger lurks where IT may not be so
vigilant.
<http://www.internetevolution.com/author.asp?section_id=625&doc_id=241040&f_src=internetevolution_gnews>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.internetevolution.com/author.asp%3Fsection_id%3D625%26doc_id%3D241040%26f_src%3Dinternetevolution_gnews&hl=en&geo=us>

LockPath and Qualys Announce Technology Integration to Streamline IT-GRC
Risk ...
MarketWatch (press release)
Through this partnership, users can benefit from QualysGuard's highly
accurate vulnerability data from scans of enterprise assets automatically
imported into LockPath's GRC solution, Keylight, augmenting its risk
reporting capabilities with security ...
<http://www.marketwatch.com/story/lockpath-and-qualys-announce-technology-integration-to-streamline-it-grc-risk-reporting-2012-03-22>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/lockpath-and-qualys-announce-technology-integration-to-streamline-it-grc-risk-reporting-2012-03-22&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Thursday, March 22, 2012

Google Alert - Metasploit

=== Web - 5 new results for [Metasploit] ===

Metasploit: Meterpreter x64 Payload
Metasploit mailing list archives ... module
http://dev.metasploit.com/redmine/
projects/framework/repository/revisions/master/entry/modules/exploits/windo
ws/
http/ ...
<http://seclists.org/metasploit/2012/q1/118>

CCS-VM integration with Metasploit Framework | Symantec Connect ...
We can intergrate Symantec Control Compliance Suite Vulnerability Manager (
CCS-VM) with Metasploit Framework.The current functionality provides the
ability ...
<http://www.symantec.com/connect/articles/ccs-vm-integration-metasploit-framework>

Installing Metasploit Framework Version 4.2 on Fedora Linux 16 ...
In this article I will cover how to install Metasploit Framework Version
4.2 on Fedora Linux 16 Verne for Penetration Testing.
<http://www.andrehonsberg.com/article/installing-metasploit-framework-on-fedora-linux-16-verne>

Very short version of setting up a personal fork of Metasploit — Gist
Very short version of setting up a personal fork of Metasploit ...
metasploit-for- everyone.txt # ... Step two: Add a remote tracker to
rapid7's metasploit-framework ...
<https://gist.github.com/2131305>

Exploit For Ms12-020 RDP Bug Moves to Metasploit | threatpost
There is now a working exploit for the MS12-020 RDP vulnerability in the
Metasploit Framework, and researchers are working on a remote code
execution ...
<https://threatpost.com/en_us/blogs/exploit-ms12-020-rdp-bug-moves-metasploit-032012>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iUDgYF5K8h5qRkUmHeONhCB5JnoNb9G8k

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

Secunia and MS-ISAC in New Partnership to Provide Vulnerability and
Patch ...
San Francisco Chronicle (press release)
Agreement provides members with resources to assist in identifying and
mitigating vulnerabilities across their environment Copenhagen, Denmark
(PRWEB) March 21, 2012 Secunia, the leading provider of vulnerability
intelligence and vulnerability ...
<http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/03/21/prweb9309126.DTL>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sfgate.com/cgi-bin/article.cgi%3Ff%3D/g/a/2012/03/21/prweb9309126.DTL&hl=en&geo=us>

Health Care System Vulnerabilities
Medscape
This article explores potential vulnerabilities of the health care system
as we track a patient's movement from his arrival at the emergency
department (ED) through admission and transfer to the intensive and acute
care units and to the patient's ...
<http://www.medscape.com/viewarticle/759120>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.medscape.com/viewarticle/759120&hl=en&geo=us>

US Mining Workforce Outlook: Bright Spots but Significant Vulnerabilities,
an ...
MarketWatch (press release)
SUGAR LAND, TX, Mar 21, 2012 (MARKETWIRE via COMTEX) -- Written by John
Egan for Industrial Info Resources (Sugar Land, Texas) -- The US Mining
Industry is expected to create 11000 to 13000 new jobs per year for the
next 20 years, but it is an open ...
<http://www.marketwatch.com/story/us-mining-workforce-outlook-bright-spots-but-significant-vulnerabilities-an-industrial-info-news-alert-2012-03-21>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/us-mining-workforce-outlook-bright-spots-but-significant-vulnerabilities-an-industrial-info-news-alert-2012-03-21&hl=en&geo=us>

Obama tries to reclaim advantage on gas prices, health care
Washington Post
The White House has launched a concerted effort to turn political weakness
into strength on two critical election-year issues that have become big
vulnerabilities for President Obama: rising gas prices and the
controversial health-care law.
<http://www.washingtonpost.com/politics/obama-tries-to-reclaim-advantage-on-gas-prices-health-care/2012/03/21/gIQARcqhSS_story.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.washingtonpost.com/politics/obama-tries-to-reclaim-advantage-on-gas-prices-health-care/2012/03/21/gIQARcqhSS_story.html&hl=en&geo=us>

U.S. Mining Workforce Outlook: Bright Spots but Significant
Vulnerabilities ...
SYS-CON Media (press release)
By Marketwire . SUGAR LAND, TX -- (Marketwire) -- 03/21/12 -- Written by
John Egan for Industrial Info Resources (Sugar Land, Texas) -- The US
Mining Industry is expected to create 11000 to 13000 new jobs per year for
the next 20 years, ...
<http://www.sys-con.com/node/2214518>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sys-con.com/node/2214518&hl=en&geo=us>

Report: Criminals switching tactics to breach cyber defences
Computing
As long as attackers profit from cyber crime, organisations must remain
diligent in prioritising and addressing their security vulnerabilities," he
added. The good news in IBM's X-Force 2011 Trend and Risk Report includes a
50 per cent decline in spam ...
<http://www.computing.co.uk/ctg/news/2162615/report-criminals-switching-tactics-breach-cyber-defences>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computing.co.uk/ctg/news/2162615/report-criminals-switching-tactics-breach-cyber-defences&hl=en&geo=us>

10 Women in Information Security That Everyone Should Know
eWeek
Mischel Kwon analyzed vulnerabilities in federal networks and cyber-threats
as both a director for the US Computer Emergency Readiness Team and as the
deputy director for IT Security Staff at the Justice Department. She is
currently president and CEO ...
<http://www.eweek.com/c/a/Security/10-Women-in-Information-Security-That-Everyone-Should-Know-560649/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eweek.com/c/a/Security/10-Women-in-Information-Security-That-Everyone-Should-Know-560649/&hl=en&geo=us>

nCircle Announces Coverage in All OWASP Top Ten Categories in nCircle
WebApp360™
MarketWatch (press release)
nCircle WebApp360 solves this problem with comprehensive security scans
that look for OWASP's most common application security vulnerabilities
including: "Web application vulnerabilities are gateways to corporate
secrets," noted John Alexander, ...
<http://www.marketwatch.com/story/ncircle-announces-coverage-in-all-owasp-top-ten-categories-in-ncircle-webapp360-2012-03-21>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/ncircle-announces-coverage-in-all-owasp-top-ten-categories-in-ncircle-webapp360-2012-03-21&hl=en&geo=us>

Not in Kansas anymore: Securing SCADA
EE Times (blog)
The first step in safeguarding our critical infrastructures is in
identifying system vulnerabilities. Even though SCADA systems have been
used for a decade to monitor and control critical equipment at power
companies, manufacturing facilities, ...
<http://www.eetimes.com/electronics-blogs/analyst-s-corner/4238057/Not-in-Kansas-anymore--Securing-SCADA>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eetimes.com/electronics-blogs/analyst-s-corner/4238057/Not-in-Kansas-anymore--Securing-SCADA&hl=en&geo=us>

LotusCMS Multiple PHP Code Execution Vulnerabilities
Help Net Security
LotusCMS is a web application implemented in PHP. The application is
exposed to multiple PHP code execution issues. A PHP code execution issue
affects the application because it fails to sanitize user-supplied input to
the "req" parameter of the ...
<http://www.net-security.org/vuln.php?id=16269>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/vuln.php%3Fid%3D16269&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail