Vendor News

/Vendor News

Week 37 in Review – 2009

Events Related: Diutinus Defense Technologies Corp. - ddtek.biz The site of the team managing the DEFCON CTF games. SecureTubeCon - securitytubecon.org This conference will be held completely online! Tools: Aircrack-ng v1.0 - aircrack-ng.org Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. Bsqlbf [...]

Week 35 in Review – 2009

Events Related: T2'09 Challenge - f-secure.com Solve the puzzle and win; you can win with Speed or Style. Tools: Dranzer v1.9.1 - sourceforge.net/projects/dranzer/ CERT developed this open source tool so that software developers can test ActiveX controls for vulnerabilities. Techniques: Web Application Scanning Using Nessus Video - tenablesecurity.com Scanning web applications with Nessus offers the [...]

2017-03-12T17:40:19-07:00 September 7th, 2009|Hacking Contests, Security Tools, Vendor News|0 Comments

Week 34 in Review – 2009

Events Related: CanSecWest Registration - cansecwest.com Official site for the CanSecWest registration Hacking at Random event comments A look at the happenings of this hacker's summer camp over at the Netherlands. Hacking at Random: more bandwidth, more far-sightedness, more future - h-online.com Hacking at Random - hackaday.com Defcon Roundup Part II - reusablesec.blogspot.com Some reflections [...]

Week 33 in Review – 2009

Events Related: Black Hat USA 2009 Media Archives - blackhat.com A compilation of the white papers, presentations and other media from this security conference. Next Baysec: Aug 18 at Kate O’Briens - root.org Another Bay Area event coming soon DEFCON Related posts PaulDotCom Defcon Party Challenge: The Solution - pauldotcom.com Now that DEFCON 17 is [...]

Week 32 in Review

Events Related: DEFCON posts Defcon: What to leave at home and other do's and don'ts - cnet.com Hacking the DefCon 17 Badges - wired.com DefCon 17 Mystery Challenge - wired.com Inside the World’s Most Hostile Network - wired.com Social Zombies Slides and DEFCON Updates - spylogic.net The Dark Cough – DEFCON 17 - thedarkvisitor.com Flickr [...]

Week 25 in Review – 2009

Tools: BackTrack 4 pre-final released Official announcement from Offensive-Security BackTrack 4 Pre Final download link Vulns: HTTP Server DoS A technique to consume all the open HTTP sockets available and keep them open, to create a DoS like environment. But with less packets! Slowloris HTTP DoS – ha.ckers.org Apache HTTP DoS tool released – isc.sans.org [...]

Week 21 in Review – 2009

Tools: Metasploit inside a word file – ithaven.blogspot.com Vulnerabilities: FFSpy – Firefox Malware PoC Debian OpenSSH 4.7 encryption flawed Flaw in encryption armor discovered – cnet.com Chink in encryption armor discovered – zdnet.com ntpd autokey stack buffer overflow – cert.org Other News: Adobe patch Tuesday approach Adobe Adopts Microsoft’s Patch Tuesday Approach – washingtonpost.com Adobe [...]

McAfee Security Standard

McAfee Secure published the McAfee Secure Standard last month. It is a high level overview of what test for, to determine if they are “secure” or not. The McAfee SECURE™ standard is an aggregate of industry best practices, designed to provide a level of security that an online merchant can reasonably achieve to help provide [...]

2017-03-12T17:40:21-07:00 January 8th, 2009|Vendor News|0 Comments

NGSS gets acquired by NCC Group

David Litchfield’s company, NGSS (Next Generation Security Software) is being acquired by NCC Group for up to 10 million in cash! The press release can be read on NCC Group’s investor page, in a post titled ‘Third leading security and testing operation acquired’.

2017-03-12T17:40:21-07:00 November 29th, 2008|Vendor News|0 Comments

Open Source Tiny Hardware Firewall

Yoggie Security Systems has launched open source models of their Pico and SOHO firewall products. The Pico is a USB key, which replaces OS network drivers and reroutes wired and wireless traffic through the device. The SOHO can be used in the same manner, but it can also be inline since it has two Ethernet [...]

2008-11-26T20:36:00-07:00 November 26th, 2008|Security Tools, Vendor News|0 Comments