Using Nessus to call Nikto

Friday, September 5th, 2008

Earlier this year, Michel Arboi wrote a blog post explaining how to use Nessus to call Nikto and incorporate the results into Nessus output. Most newcomers to Nessus have enabled the nikto.nasl wrapper only to find it produced no output. Some Nessus users have found various ways to ensure Nikto ...

Google Chrome vulnerable to carpet-bombing flaw

Tuesday, September 2nd, 2008

Google’s shiny new Web browser is vulnerable to a carpet-bombing vulnerability that could expose Windows users to malicious hacker attacks. Just hours after the release of Google Chrome, researcher Aviv Raff discovered that he could combine two vulnerabilities — a flaw in Apple Safari (WebKit) and a Java bug discussed at ...

Demonstration Reveals Net Superattack to be Very, Very Real

Thursday, August 28th, 2008

A pair of security researchers recently demonstrated that a theoretical attack possible against the internet’s most embedded infrastructure can, in fact, be very real. The attack exploits normal behavior in the internet routing protocol BGP, which ISPs use to determine how best to route traffic destined for other parts of the ...

Massive iPhone Security Flaw Exposes All Private Data

Wednesday, August 27th, 2008

You're a smart, safety conscious iPhone user, right? You keep the phone set to require a 4-digit passcode every time it wakes up, so if you ever lose your baby, all your personal information is safe. But if you are running v2.0.2 of the iPhone operating system, you might as ...

Phishers Bite Back with Malware Exploits Linked to Keywords

Tuesday, August 26th, 2008

Criticize the people behind the Asprox botnet, and they take it personal—so much so that they will bombard you with malware, according to a report by SecureWorks. The botnet, now at least 50,000-strong with bots, is sending out phishing e-mails posing as messages from banks in the United States and United ...