Monthly Archives: May 2012

Patch as Patch Can: All Software is Flawed

By Michelle Drolet It may not be glamorous, but a meticulous patching program is necessary to prevent server and client-side exploits.  HP’s DVLabs and other research based on Open Source Vulnerability Database (OSDV) data  found that several  of today’s successful

Infosec Weekly Round-up May 14 – 20 , 2012

Attack Surface: Healthcare and Public Health Sector US Department of Homeland Security Issues Warning on Medical Device Threats. “This Bulletin highlights how the portability and remote connectivity of MDs introduce additional risk into Medical IT networks and failure to implement

Infosec Weekly Round-up May 07 – 13 , 2012

CERT Warns On Critical Hole In SCADA Software By Italian Firm Progea “The U.S. Department of Homeland Security issued a bulletin on Thursday warning readers about a previously undisclosed, critical vulnerability in Movicon 11, a product used to manage critical

New Release for the WiFi Pineapple Hotspot

Hakshop online store have upgraded their release for the WiFi Pineapple with new important features for penetratiton testing and hacking different wireless network,  the device is now coasting about 89.99 USD and all you need to do is just to

USB Safeguard Utility to Encrypt and Protect USB Data

Locking your USB stick will protect information and data stored on the device, here if you are going to use a standard program for encryption than you need to install it on any computer you’re going to use and this

Infosec Weekly Roundup April 30 – May 6, 2012

Cross-platform malware exploits Java to attack PCs and Macs “The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac

Try App Whitelisting to Mitigate Malware

By Paul Paget There will always be a threat from malware – malicious software that is designed to steal or corrupt data on computers. Malware affects everyone from security services to silver surfers, and when it isn’t checked it can