Microsoft Extends XP Deadline for Low-Cost Machines

Tuesday, June 3rd, 2008

Microsoft has further extended the life of Windows XP so that computer makers can include the operating system on low-cost desktop PCs, the company announced at the Computex trade show on Tuesday. Microsoft has been under pressure from computer makers to provide a version of its OS for an emerging class ...

Less is more (secure)

Wednesday, May 28th, 2008

Complexity is the enemy of security. Simple systems are inherently more secure than complex solutions. We see this idea validated again and again in security. Unfortunately, our IT systems are getting more and more complex as we depend on technology to fuel business growth and innovation. But do we really need ...

Cisco IOS Rootkit Demonstrated

Tuesday, May 27th, 2008

Last Thursday at the EUSecwest conference, security researcher Sebastian Muniz of Core Security Technologies demonstrated a proof-of-concept rootkit for Cisco's IOS router operating system.A root kit consists of one or several related applications designed to give the program user root or administrator privileges on a given computer, whether or not ...

Five steps to successful and cost-effective penetration testing

Tuesday, May 27th, 2008

Whether you hire outside consultants or do the testing yourself, here are some tips for making sure your time and money are well spent. 1. Set goals. Make sure you know before you start your penetration testing what you want the results to encompass. Adding in too many systems can be ...

Local Physical Attack Against VISTA To Obtain SYSTEM

Monday, May 26th, 2008

Pretty cool video doing a local physical attack against a Vista Box. http://www.offensive-security.com/movies/vistahack/vistahack.html McGrew Security Blog pointed me to it: "he demonstrates a quick and easy way of obtaining SYSTEM privileges on a Vista system, given physical access to the machine. In the video, he uses BackTrack to replace Utilman.exe with a copy ...