Here are the CVE vulnerablities for April 2014 so far. CVE (Common Vulnerabilities and Exposure) vulnerability data are taken from National Vulnerability Database (NVD) xml feeds provided…
CVEdetails has a list of all CVE’s This is a vulnerability that is part of the infrastructure of the Internet webservers (Apache specifically) But specifically this…
I am not sure if anyone is saying this -but there are no guarantees on the Internet. We will be honest with you and tell…
Session Hijacking is where an attacker Steals a network session by guessing (or other ways) the session ID (identification number). Each packet has a…
Rapid7 has many tools like metasploit a software that runs many exploits against a target machine. “It is the world’s most used penetration testing software”. the hackers are…
Is there a weak link? Is your firewall all patched up? Does it have the latest firmware? Are all ports closed that should be closed?…
Malwarebytes has a good FAQ about the Heartbleed problems we have posted in our own Blog on Oversitesentry as well. Essentially there are online tools (LastPass) to…
First of all, there are many ways a system can become vulnerable, we will not look at the malicious or badly configured machines. We will…
Wired had an article a while ago (January 6th 2014) To understand the problem, you need to understand the embedded systems market. The problem is the…
By “casing” can also be called enumeration, where the hacker reviews what type of systems that you have on the Internet. It is the first…