background preloader

SecLists.Org Security Mailing List Archive

SecLists.Org Security Mailing List Archive
— Peter G. Neumann moderates this regular digest of current events which demonstrate risks to the public in computers and related systems. Security risks are often discussed. Risks Digest 27.84RISKS List Owner (Apr 16) RISKS-LIST: Risks-Forum Digest Wednesday 16 April 2014 Volume 27 : Issue 84ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/27.84.html> The current issue can be... Risks Digest 27.83RISKS List Owner (Apr 11) RISKS-LIST: Risks-Forum Digest Friday 11 April 2014 Volume 27 : Issue 83ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G.

http://seclists.org/

Related:  Tools: Security - Forensics - Pentesting - Ethical Hackingsecurity and hackingAEM - Adobe (CQ)The Computer and the Internettrophonios

Probably the Best Free Security List in the World. Security List Index Select a Security Category: All Items Keys Discontinued or not updated recently (for at least three years). Black Hat: Top 20 hack-attack tools Network World - Turn someone else’s phone into an audio/video bug. Check. Use Dropbox as a backdoor into corporate networks. Check. Experience Manager Mobile Help For the complete experience, please enable JavaScript in your browser. Thank you! See plans for: businesses photographers students Adobe for enterprise All products Creative Cloud MySQL.com Compromised & Spreading Malware The latest story doing the rounds is that MySQL.com got hacked and was serving malware which put it on the Google malware block list. It appears to be in the clear now though and it’s accessible again via Google. It seems to be a similar case with that of the recent Linux.com and Kernel.org hacks – in which the sites were compromised via developers who had access. In this case it seems MySQL.com was compromised by malware that spreads itself via FTP from client machines, it then uploads malicious JavaScript to any sites the client machine has access to and propagates malware using those sites. Hackers recently compromised the website hosting the open-source MySQL database management system and caused it to infect the PCs of visitors who used unpatched browsers and plug-ins, security researchers said.MySQL.com was infected with mwjs159, website malware that often spreads when compromised machines are used to access restricted FTP clients, a blog post from Sucuri Security reported.

Hardware-based security more effective against new threats With software security tools and network vulnerabilities constantly being targeted by hackers, securing hardware components will grow in importance given it is more secure and cybercriminals will find it difficult to alter the physical layer for their purposes. Patrick Moorhead, president and principal analyst of Moor Insight and Strategy, said hardware-based security is more secure than software tools such as antivirus since it cannot be altered. Hardware-based security refers to safeguarding the computer using components such as processors. An RSA spokesperson added the physical layer eliminates the possibility of malware, such as virtual rootkits, from infiltrating the operating system and penetrating the virtualization layer. The Web's #1 Hacking Tools Directory - with tutorial videos! Hacking Tools Directory with Video Tutorials By Henry Dalziel | Information Security Blogger | Concise Courses We are big fans of blogging about Hacker Tools – for one major reason: if you are serious about working in cyber security you need to be able to use these tools like a boss. Hacking tools are what boxing gloves are to a boxer or what a spanner is to a plumber. A pentester (or ethical hacker) can be judged by their ability to use these tools, frameworks and programs, so get to know them!

Steps to Configure FileVault Tool (VLT) in CQ The FileVault tool (VLT) is a tool developed by Adobe that maps the content of a CRX/AEM instance to your file system or we can say that it is used to map windows file system structure to CRX/AEM file system Structure. The VLT tool has similar functions as source control system client (such as a Subversion (SVN) client), providing normal check-in, check-out and management operations, as well as configuration options for flexible representation of the project content. NOTE: If you are using the FileVault Tool(VLT) in a CRX-only instance, the default URL for CRX is localhost:4502. Use that instead of the CQ default URL. In AEM there are two ways of syncing content between eclipse and crx de repository:-

And Beyond… ha.ckers.org web application security lab Here we are, my friends. The 1000th post. Whew! It’s quite a load off to have finally made it.

Related:  web uygulamalari