ggee

/ggee

About ggee

This author has not yet filled in any details.
So far ggee has created 181 blog entries.

Kansas City Security Community

This post is part of the information security communities project. If you are a security professional and happen to be in Kansas City, here are a few local groups to get your fix of security knowledge. Cowtown Computer Congress Kansas City (CCCKC) - CCCKC is a grassroots organization of tinkerers, hackers, explorers, artists, inventors and [...]

2008-12-05T15:31:22-07:00 December 5th, 2008|Local Meetings|0 Comments

Crash Course In Penetration Testing Review

While at ToorCon X, I had the opportunity to attend the ‘Crash Course In Penetration Testing’ workshop by Joe McCray and Chris Gates. I have heard of them before; Chris from the Carnal0wnage blog, and Joe from Learn Security Online. But how much could a crash course in penetration testing be actually taught in two [...]

2017-03-12T17:40:21-07:00 December 4th, 2008|Security Training|1 Comment

Tools From ToorCon X

I promised this list to Rob (mubix) Fuller a while ago, and I finally got around to compiling it. So here is the list of tools that were talked about at ToorCon X, organized by presentation. Targeted VoIP Eavesdropping: An Attack From Within VoIP Hopper X Test UC Sniffer ACE – Automated Corporate Enumerator One [...]

2017-03-12T17:40:21-07:00 December 2nd, 2008|Security Conferences, Security Tools|1 Comment

NGSS gets acquired by NCC Group

David Litchfield’s company, NGSS (Next Generation Security Software) is being acquired by NCC Group for up to 10 million in cash! The press release can be read on NCC Group’s investor page, in a post titled ‘Third leading security and testing operation acquired’.

2017-03-12T17:40:21-07:00 November 29th, 2008|Vendor News|0 Comments

Open Source Tiny Hardware Firewall

Yoggie Security Systems has launched open source models of their Pico and SOHO firewall products. The Pico is a USB key, which replaces OS network drivers and reroutes wired and wireless traffic through the device. The SOHO can be used in the same manner, but it can also be inline since it has two Ethernet [...]

2008-11-26T20:36:00-07:00 November 26th, 2008|Security Tools, Vendor News|0 Comments

Security Bloggers Network is Moving

The Security Bloggers Network has moved from FeedBurner to Lijit. The new homepage for the Security Bloggers Network is now online, and the global feed is also working. If you are curious whether any blogs got dropped in the move, you can compare the FeedBurner SBN opml to the current Lijit SBN opml. We are [...]

2017-03-12T17:40:21-07:00 November 22nd, 2008|Vendor News|0 Comments

Microsoft BlueHat v8

Microsoft had another BlueHat conference last month, and they recently posted some videos and interviews on the TechNet BlueHat v8: C3P0wned page. Only the keynote from day one was captured on video, but all of day two was captured. Many interviews were captured through, to give us some idea of what they were talking about. [...]

2017-03-12T17:40:21-07:00 November 21st, 2008|Security Conferences|1 Comment

Virus Bulletin 2008 Presentations

The presentations from last month’s Virus Bulletin conference in Ottawa is now online. Keynote address The AV industry: quo vadis? by Alex Eckelberry Corporate stream The malware business by David Emm Stormy weather: a quantitative assessment of the Storm web threat in 2007 by Anthony Arrott Intentions of capitalistic malware by Gunter Ollmann and Holly [...]

2017-03-12T17:40:21-07:00 November 16th, 2008|Security Conferences|0 Comments

Microsoft Security Intelligence Report v5

The latest Microsoft Security Intelligence Report (SIR) is now out. The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows users, and some of the busiest online services [...]

2017-03-12T17:40:22-07:00 November 13th, 2008|Security Vulnerabilities|0 Comments