Browse Articles By Period: 2014
I was busy in class this week and there ware a LOT of articles published about this new bug affecting a lot of systems and devices. See this two minutes video from Norton giving you a great overview of what the attack is all about.
Categories: Zero Day Attack 
28.09.2014 · From admin
This is the official VUPEN Vulnerability Research Team blog covering technical analysis and advanced exploitation of critical vulnerabilities on Windows, Linux, and Mac OS X. They are the one of the most active team in the world when it comes to finding zero day vulnerabilities.
Categories: Zero Day Attack 
28.09.2014 · From admin
The first step in any penetration testing or ethical hacking exercise is to find out what hosts are alive on the network and what services they are running. One of the best tools for carrying out such enumeration is NMAP. Here I show you some of the basic uses of NMAP in a clear, easy to follow format.
Categories: NMAP 
20.09.2014 · From admin
Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.
Categories: Web Vulnerabilities Scanners  · OWASP  · Fuzzes 
15.09.2014 · From admin
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it. Though an advanced user with Python/Ruby scripting expertise would be able to make full use of the platform, a lot of the tool’s features are simple enough to be used by absolute beginners.
12.09.2014 · From admin
The Critical Security Controls focuses first on prioritizing security functions that are effective against the latest Advanced Targeted Threats, with a strong emphasis on "What Works" - security controls where products, processes, architectures and services are in use that have demonstrated real world effectiveness. The actions defined by the Controls are demonstrably a subset of the comprehensive catalog defined by the National Institute of Standards and Technology (NIST) SP 800-53.
12.09.2014 · From admin
This is a magazine published in Egypt and it has great content. The magazine is totally free and you don't need to go through registration and loops to get it, simply click on the link and download it. The way it should always be.
29.08.2014 · From admin
A small video interview made by SecureNinja TV at Defcon this year. Alicia Webb speaks with Blackphone CSO Dan Ford about the company's new phone, it's security features, and gives SNTV a demo of how the custom Android-based PrivateOS and custom hardware work together.
Categories: BlackPhone 
28.08.2014 · From admin
https://cccure.training/forum/?action=goto&search=1#topic/Question-about-types-of-evidence.htm
Categories: FFIEC  · Forum Discussions 
28.08.2014 · From admin
A cram study guide is a resume of all ten domains in only about 35 to 60 pages. It is an essential read the night before the exam to go over all of the key points you must remember for your exam. See below some of the best Cram Guides contributed over time.
Categories: CISSP exam  · CISSP  · CISSP Cram Study Guides 
28.08.2014 · From admin
Contrary to some book authors and instructors opinions, the TCSEC rating are still within the exam for sure and you can expect some questions about the rating of the TCSEC rating on your exam. You do need to be familiar with the topic. We have created a one page resume for you.
Categories: TCSEC Ratings 
27.08.2014 · From admin
Some neat utilities that can help in making your day brighter. Tools to permanently delete files, diagnostic tools, file recovery tools, and a whole lot more. Let us know about your best tool by leaving a comment.
Categories: Utilities and Tools 
21.08.2014 · From admin
CompTIA, the leading provider of vendor-neutral skills certifications for the world’s information technology (IT) workforce, today introduced a new version of its CompTIA Security+ exam. The new exam (SY0-401) is available immediately worldwide in an English language version. German and Japanese language exams will be introduced in the coming months.
Categories: Security+ 401 
12.08.2014 · From admin
(ISC)²® (“ISC-squared”), the largest not-for-profit membership body of certified information and software security professionals with over 100,000 members worldwide, today announced the formation of its Application Security Advisory Council (ASAC), with representatives from Asia-Pacific and the Americas.
12.08.2014 · From admin
This is our CBT for the BCP and DRP Domain. It is very well covered and you will not only learn terms but also learns what those terms means and how they can be applied. It is 2 hours 6 Minutes in length. With this domain we now have a total of 38 hours of thorough coverage for the CISSP exam.
Categories: CISSP  · CISSP exam  · CISSP Online CBT 
08.08.2014 · From admin
This is our CBT for the Information Security Governance and Risk Management Domain. It is very well covered and you will not only learn terms but also learns what those terms means and how they can be applied. It is 5 hours 13 Minutes in length.
Categories: CISSP  · CISSP exam  · CISSP Online CBT 
07.08.2014 · From admin
Interesting paper from HP along with an article from SOPHOS about the state of security with internet enabled devices. Everything is becoming IP enabled and this is very scary. There is a total lack of security within those networks.
Categories: The Internet Of Things 
07.08.2014 · From admin
Great presentation on DNS from Defcon done by Robert (Rob) Stucke.
Categories: Data Breaches  · DNS Security 
03.08.2014 · From admin
This is PART FOUR of our CBT for the Telecommunication and Network Security Domain. It is very well covered and you will not only learn terms but also learns what those terms means and how they can be applied. It is 6 hours 5 Minutes in length.
Categories: CISSP  · CISSP exam  · CISSP Online CBT 
02.08.2014 · From admin
This is PART THREE of our CBT for the Telecommunication and Network Security Domain. It is very well covered and you will not only learn terms but also learns what those terms means and how they can be applied. It is 3 hours 47 Minutes in length.
Categories: CISSP  · CISSP exam  · CISSP Online CBT 
29.07.2014 · From admin
Per page: