vnascimento

Artigo: Password hashes dump tools

Password hashes dump tools https://docs.google.com/spreadsheet/ccc?key=0Ak-eXPencMnydGhwR1VvamhlNEljVHlJdVkxZ2RIaWc#gid=0

Artigo: VulnVPN (Vulnerable VPN) – Exploiting IKE Aggressive Mode PSK

VulnVPN (Vulnerable VPN) – Exploiting IKE Aggressive Mode PSK http://www.rebootuser.com/?buffer_share=967de&p=1307

Artigo: Major Security Issues with Cloud Computing Being Ignored

Major Security Issues with Cloud Computing Being Ignored http://news.hitb.org/content/major-security-issues-cloud-computing-being-ignored

Artigo: Microsoft’s Free Security Tools – Microsoft Assessment and Planning (MAP) Toolkit – Microsoft Security Blog – Site Home

This article in our free security tools series focuses on the benefits of the Microsoft Assessment and Planning Toolkit. If you are an IT Professional then you know platform migrations can be a daunting task. Depending on your organization’s size, complexity and maturity, simply understanding you… https://blogs.technet.com/b/security/archive/2013/01/29/microsoft-s-free-security-tools-microsoft-assessment-and-planning-map-toolkit.aspx?Redirected=true Enviada via Flipboard Dispositivo Móvel – VCT

Artigo: 5 Security Holes Almost Everyone’s Vulnerable To

Problems with security seem to pop up all the time—from an easy to hack router to apps that leak your data into the world. Thankfully, it’s pretty easy to protect yourself. Here’s how to do it.Unless you keep up to date on all the security news, it’s easy to miss a bit here and there…

Read more

Erro SSL

https://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp Dispositivo Móvel – VCT

Artigo: INFOGRAPHIC The Automated Home of Tomorrow: How Vulnerable is it to Cybercrime?

[INFOGRAPHIC] The Automated Home of Tomorrow: How Vulnerable is it to Cybercrime? http://blog.trendmicro.com/trendlabs-security-intelligence/infographic-the-automated-home-of-tomorrow-how-vulnerable-is-it-to-cybercrime/

Artigo: ISO 27001 Checklist: Router Audit Program

ISO 27001 Checklist: Router Audit Program http://www.desktopauditing.com/iso-270001-checklist-router-audit-program

Artigo: Free virtual machine management tool

Free virtual machine management tool https://www.net-security.org/secworld.php?id=14239

Artigo: ios data interception | research | sprawl

ios data interception | research | sprawl http://thesprawl.org/research/ios-data-interception/