Penetration testing May 5, 2011 Azim Poonawala Automated Vulnerability Testing with winAUTOPWN winAUTOPWN is a minimal Interactive Exploit Framework which acts as a frontend for quick systems vulnerability exploitation. It is a collection of remote exploits...
General security May 4, 2011 Infosec WhisperMonitor Tutorial with Stuart Anderson WhisperMonitor is a new software firewall and dynamic egress filtering tool from WhisperSystems. It comes pre-installed with the latest beta release of WhisperCore....
General security May 4, 2011 Matt Mossman Android Security: 10 Tips and Settings You don't necessarily need to be an android to properly secure your Android device. With a few tips and adhering to a regime of think before you click, we can...
Application security May 3, 2011 Infosec Jeremiah Grossman Reveals His Process for Security Research In our ongoing series of interviews, this week Jeremiah Grossman answered a few questions and pulled back the curtain a bit on the methods, tools and motivation...
General security May 3, 2011 Infosec Recognizing Social Engineering Attacks While the RSA data breach made news, it was just a high profile example of an attack that has been found in dozens of investigations by SpiderLabs at Trustwave...
CISM May 3, 2011 Kenneth Magee CISM Domain – Information Security Program Development CISM Chapter 3 – Information Security Program Development (ISPD) ISPD accounts for 17 percent of the CISM exam or about 34 questions. In 2010, ISACA reorganized...
General security May 2, 2011 Jack Koziol Imperva’s Amichai Shulman Discusses the Boy in the Browser Attack There was a lot of attention paid to a new type of browser attack recently called the Boy in the Browser. To find out more about this technique, we contacted...
CISSP May 2, 2011 Kenneth Magee CISSP – Reading is Required Information Security is all about staying informed. And the CISSP is no exception. If you’re not reading then you’re falling behind. When you take the CISSP...
Digital forensics May 1, 2011 Keatron Evans Flesh Tone Analysis – Intermediate Computer Forensics This analysis comes in handy in computer forensics cases such as porn or child pornography investigations. This video shows how to search through hundreds of...
Hacking May 1, 2011 Keatron Evans SQL Injection – Another hacking how-to We wanted to get up a brief demo of the ubiquitous SQL Injection. We use it here to get control of the OS. We'll have a lot more angles on SQL Injection - as...