Beginning of this month, the Internet Storm Center published a diary about a new malware (called Trojan.Flush.M) detected by Symantec: Rogue DHCP servers. The malicious code was analyzed by Symantec. Once the machine infected, it sends fake DHCP offer packets using UDP ports 67 and 68 when another computer on
Category: Security
OpenVAS 2.0.0. is out
OpenVAS just announced the availability of its license-free scanner. The new release (2.0.0) comes with a lot of bugfixes and improvement. The most interesting are: Support of OVAL OIDs support (prefix: 1.3.6.1.4.1.25623) to identify all the vulnerabilities checks. The new support of OVAL (“Open Vulnerability and Assessment Language“) is a
Security from A to Z
Found on silicon.com: “Security from A to Z”. Click on the links below to find out more… A is for Antivirus B is for Botnets C is for CMA D is for DDoS E is for Extradition F is for Federated identity G is for Google H is for Hackers
The Dark Side of the Force…
The financial crisis will have negative aspects in all business. Security IT must be kept at the same level (even increased) but facts are there: budgets are frozen, etc… According to PricewaterhouseCoopers (PwC) analysts, there are risk to see jobless techies go to the “dark side of the force” and
ISSA Belgian Chapter Event: New ISSA event: Microsoft Windows Server 2008
Back from Microsoft Belgium where occurred an ISSA Belgian Chapter event about security of Microsoft Windows Server 2008. The speaker, Ronny Bjones, started with some historical facts about the Microsoft products and security. He explained why Microsoft had lot of security issues in the past, due to the way developers
Minimal Security
Credit: http://flickr.com/photos/fboyd/2494909325/.
Simple DLP with Ngrep
DLP stands for “Data Loss Prevention” or sometimes, “Data Leak Protection“. Companies primary goal is to make business. And their activities rely on their data (customers, databases, research results, statistics, source code, …). DLP is a security process which takes care of: monitoring, identify and protection of the data. The
And What About the “Zero-Knowledge” Risks?
A new 0-day exploit is in the wild for Internet Explorer 7 since yesterday. Of course, this is a big issue and countermeasures must be deployed as soon as possible. A lot of security solutions companies try to use the 0-day effect as a marketing element “Ã la Barack Obama”:
Password Protected .exe Files
This is not a bullet-proof solution but it can be helpful from time to time… Empathy is a small tool to protect your Windows executable files with a password. To run the program, a dialog box will ask you the password. It can prevent children or unauthorized person to start
Juniper ScreamOS
Graeme Neilson, a security consultant working for Auro Software make a presentation during the last Ruxcon conference about a trojan developed for the ScreenOS running on Netscreen firewalls: “The presentation covered Graeme’s research on how he’s developed a trojan ScreenOS operating system that when loaded onto any Juniper Firewall turns