Video Screencast Help

Search

Search results

Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Para acompanhar o que veio de novo nas versões 2.x   LUA 2.3.0 2.3.0.71 foi a primeira versão 2.3. Este comunicado contém os seguintes aprimoramentos / otimizações: ·         Informações de configuração LUA pode ser exportado para um ...
Blog Entry by alsbalves | 22 Nov 2013 | 0 comments
It is now impossible to tell when the various files were released - and which ones I need based on release date. It used to be that if I needed a later version of a product, I could simply look for the dates that matched to ensure I was getting all the ...
Idea by ShadowsPapa | 30 May 2013 | 2 comments
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
Cyberspace presents an incredible amount of opportunity for today’s organisations. Connectivity, innovation, productivity and collaboration are just some of the benefits on offer. However, cyberspace presents equally significant risks. Those risks can ...
Blog Entry by James Hanlon | 15 Oct 2012 | 0 comments
Hello We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2 Metasploit: - msfupdate - Use exploit / windows / browser / ie_execcommand_uaf - Set SRVHOST 192,168 ... - Set ...
Blog Entry by Fabiano.Pessoa | 27 Sep 2012 | 0 comments
Berlin, Germany Tue, 16 October, 2012 - 11:30 CEST - Thu, 18 October, 2012 - 14:00 CEST Zum 8. Mal ...
Event by uspange | 21 Sep 2012 | 0 comments
I’ve been hearing and reading about a lot of interesting comments made by various info sec professionals regarding whether or not DLP or anti-virus has outlived its usefulness.  Believe it or not, both of these important technologies are still viable ...
Blog Entry by phlphrrs | 14 Sep 2012 | 0 comments
    Many of the security issues we see with desktops and laptops today can be explained by the fact that such end-point computing devices were never designed to be connected together. It was only with the arrival of affordable network cards, then ...
Blog Entry by GregDay-SecurityCTO | 05 Mar 2012 | 1 comment