Yearly Archives: 2013

Artigo: Your business may be at risk from a zombie (mobile device) apocalypse

Your business may be at risk from a zombie (mobile device) apocalypse http://blogs.csoonline.com/wirelessmobile-security/2795/your-business-may-be-risk-zombie-mobile-device-apocalypse#sthash.J8VfE5ly.uxfs

Researchers report on hardware Trojans that are undetectable

Researchers report on hardware Trojans that are undetectable http://phys.org/news/2013-09-hardware-trojans-undetectable.html

Project Sonar: Welcome to Project Sonar! | SecurityStreet

Project Sonar: Welcome to Project Sonar! | SecurityStreet https://community.rapid7.com/community/infosec/sonar/blog/2013/09/26/welcome-to-project-sonar

Three New Attacks Using IE Zero-Day Exploit

Three New Attacks Using IE Zero-Day Exploit http://threatpost.com/three-new-attacks-using-ie-zero-day-exploit

Top Ten Proactive Software Controls – Podcast

Top Ten Proactive Software Controls – Podcast http://www.rsaconference.com/podcasts/95/top-ten-proactive-software-controls

The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins

The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/

Penetration Testing With Honest-To-Goodness Malware

Penetration Testing With Honest-To-Goodness Malware http://www.darkreading.com/attacks-breaches/penetration-testing-with-honest-to-goodn/240162078

CrystalAEP

http://www.crystalaep.com/about.html Esta mensagem, incluindo os seus anexos, contém informações confidenciais destinadas a indivíduo e propósito específicos, e é protegida por lei. Caso você não seja o citado indivíduo, deve apagar esta mensagem. É terminantemente proibida a utilização, acesso, cópia ou divulgação não autorizada das informações presentes nesta mensagem. As informações contidas nesta mensagem e em…

Read more

Noriben version 1.4 released

Noriben version 1.4 released http://www.ghettoforensics.com/2013/09/noriben-version-14-released.html

Data Exfiltration in Targeted Attacks

Data Exfiltration in Targeted Attacks http://blog.trendmicro.com/trendlabs-security-intelligence/data-exfiltration-in-targeted-attacks/