ggee

/ggee

About ggee

This author has not yet filled in any details.
So far ggee has created 181 blog entries.

Ultimate Security Conference Media Archive

The ultimate security conference media archive has a new home at good.net. Once hosted at EasyNews.com, the massive security conference media archive was consuming too much disk space, outgrowing the very generous host. The archive contains several years of audio and video from security conferences like BlackHat, DEFCON, DeepSec, Hack In The Box, HOPE, ShmooCon, [...]

2008-09-12T19:56:51-07:00 September 12th, 2008|Security Conferences|0 Comments

WASC Web Application Security Statistics 2007

For those that love web application security data, WASC has just released their Web Application Security Statistics Report for 2007. Statistics were compiled from several companies, including Booz Allen Hamilton, BT, Cenzic, dblogic.it, HP, Positive Technologies, Veracode, and WhiteHat Security. In total, over 32,000 sites were analyzed, with roughly 70,000 vulnerabilities of different degrees of [...]

2017-03-12T17:40:22-07:00 September 9th, 2008|Security Vulnerabilities|0 Comments

Several Information Security Competitions During Cyber Security Awareness Week

The ISIS Lab of NYU-Poly is having their annual Cyber Security Awareness Week (CSAW) where students can compete and win prizes in a variety of information security challenges. There are seven information security competitions: Security Quiz, Application Security CTF, Forensics Challenge, Essay Contest, Awareness Poster Design Competition, Embedded System Challenge, and Research Post Competition. All [...]

2008-09-04T16:29:59-07:00 September 4th, 2008|Hacking Contests|0 Comments

Several VMware Product Security Updates

VMware has just released new versions of their VMware ACE, VMware Player, VMware Server, and VMware Workstation products to fix several security issues. The updates to VMware ACE, Player, Server, and Workstation are: Setting ActiveX killbit Starting from this release, VMware has set the killbit on its ActiveX controls. Setting the killbit ensures that ActiveX [...]

2008-08-30T13:22:07-07:00 August 30th, 2008|Security Vulnerabilities|0 Comments

DNSSEC for All Top Level .GOV Domains

Last week the Office of Management and Budget released memoranda M-08-23, titled Securing the Federal Government’s Domain Name System Infrastructure. The document states that all US government top level .gov domains will use DNSSEC starting in January 2009. This is in response to the DNS cache poisoning attack that Dan Kaminsky made public a few [...]

2017-03-12T17:40:22-07:00 August 29th, 2008|Security Vulnerabilities|1 Comment

WhiteHat’s Website Security Statistics Report

WhiteHat Security released their 5th website security statistics report yesterday. They also held a webinar to go over the results, and the website security statistics slides are also available on slideshare. Total Websites: 687 Identified vulnerabilities: 11,234 Unresolved vulnerabilities: 3,541 (66% resolved)  Websites HAVING HAD at least one serious issue: 82% Websites CURRENTLY WITH at [...]

2017-03-12T17:40:22-07:00 August 28th, 2008|Security Vulnerabilities|0 Comments

DEFCON 16 Tools

Rob Fuller yesterday did an excellent guest post on the Zero Day ZDNet blog on the tools released at DEFCON 16. Here is the list of DEFCON 16 tools: Beholder: An open source wireless IDS program by Nelson Murilo and Luis Eduardo The Middler: The end-all be-all of MITM tools by Jay Beale ClientIPS: An [...]

2017-03-12T17:40:23-07:00 August 19th, 2008|Security Conferences, Security Tools|1 Comment

The Last HOPE Videos

Some videos from The Last Hope are now online via bittorrent. I hope more videos will come online soon, as many of the presentations sounded interesting. At the least, The Last Hope audio is all online at the offical The Last Hope site. Here is the list of videos currently being distributed: A Hacker's View [...]

2008-08-23T14:24:59-07:00 August 18th, 2008|Security Conferences|0 Comments

Updated DEFCON 16 Presentations

Because the presenters have to submit their slides before the conference (so they can make the presentation discs), often the slides are outdated by the time the conference comes around. Thankfully a few presenters are posting their updated slides online, and here is a list of those that did. NTLM is Dead by Kurt Grutzmacher [...]

2017-03-12T17:40:23-07:00 August 14th, 2008|Security Conferences|0 Comments