CERT Basic Fuzzing Framework now available

CERT Basic Fuzzing Framework now available


CERT Basic Fuzzing Framework now available

Posted: 27 May 2010 11:38 AM PDT

The Basic Fuzzing Framework (BFF) consists of two main parts:a Linux virtual machine that has been optimized for fuzzinga set of scripts and a configuration file that orchestrate the fuzzing run The ...

Social Engineering and Dr. Cialdini's "Influence"

Posted: 27 May 2010 08:12 AM PDT

Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing at various organizations. Coincidentally, I recently read an excellent book call...

IBM opens security operations center in Bangalore

Posted: 27 May 2010 08:00 AM PDT

IBM announced the opening of a new global security operations center in Bangalore. Adding to the network of IBM global security operations centers, this state-of-the-art facility is constantly staffed...

Event: 2nd International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)

Posted: 27 May 2010 07:49 AM PDT

The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication...

47% of IT pros see security audit costs going up in 2010

Posted: 27 May 2010 07:02 AM PDT

Forty-seven percent of IT security professionals believe that security audit costs will increase in 2010, according to a recent survey by nCircle, the leading provider of automated security and compli...

Facebook users against default sharing of their private data

Posted: 27 May 2010 06:57 AM PDT

A poll of 605 Facebook users conducted by IT security and data protection firm Sophos in the wake of the latest changes to the social network's privacy settings has revealed the vast majority of users...

New book: "iPad: The Missing Manual"

Posted: 27 May 2010 02:33 AM PDT

In his new book, New York Times tech columnist, bestselling author, and iPad expert J.D. Biersdorfer shows you how to get the most out of Apple's sleek tablet. With this book, you'll quickly learn ...

Windows WMI used for malware

Posted: 27 May 2010 01:24 AM PDT

Trend Micro's engineer Lennard Galang has written a blog post about two pieces of malware that leveraged a Windows service, Windows Management Instrumentation (WMI), to execute their malicious routine...

0 comments:

Post a Comment