Quarterly VoIP Vulnerabilities

Tuesday, April 15th, 2008

While most VoIP-related vulnerabilities are posted to the VOIPSA mailing list or blog, I thought it might be useful to have a informal quarterly summary of sorts among VoIP devices per searches from NIST.  I hope folks find it helpful, and of course post comments if I’ve overlooked anything from ...

11 Critical Security Apps

Tuesday, April 15th, 2008

If you don't have security software, your PC is an Internet mugging waiting to happen. We show you the eleven best pieces of software for defending yourself against online thugs. The PC security landscape is constantly changing. Well paid, malicious programmers keep cranking out new and different attacks, and the security ...

sqlninja 0.2.2 Released – SQL Injection Tool

Tuesday, April 15th, 2008

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.  Its main goal is to provide a remote shell on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to ...

Hackers Increasingly Target Browsers

Saturday, April 12th, 2008

Threats against browsers are getting more sophisticated and branching out into such exotic areas as gaming, experts told attendees at the recent RSA Conference 2008. New attacks from games and virtual-world Web sites can deliver bot-like control of browsers to attackers, said Ed Skoudis, a security consultant with Intelguardians, speaking at ...

Tuning The Windows Vista Firewall

Saturday, April 12th, 2008

At first glance, the Windows Vista firewall is disappointing to say the least. On the surface, it looks like a Windows XP leftover. In fact, the firewall's user interface in Windows Vista is nearly identical to the interface found in Windows XP. There aren't even any new configuration options available. The ...