In the Battle Against Cyberattackers, Information Superiority Wins

In the Cybersecurity Battle, the Side with Information Superiority Wins.

Network VisibilityWhether we’re engaging foes in warfare or protecting our computer networks, having information superiority is essential to success. Defined in the US Army Vision 2010 doctrine as “the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same,” information superiority is identified as “the key enabler in 21st century operations”. Continue reading In the Battle Against Cyberattackers, Information Superiority Wins

New Oracle ERP Vulnerabilities Unmasked

By Kelly Jackson Higgins
Dark Reading

Researchers today issued security advisories for eight vulnerabilities, some of them critical, in a popular Oracle enterprise resource planning (ERP) application — but they don’t expect many users to actually apply the patches for them.The flaws discovered by researchers at security firm Onapsis range from holes that could allow an attacker to access all business information and files, query for passwords, and alter business information processed by the ERP, basically taking complete control of the system. Patches for the vulnerabilities were included in Oracle’s latest Critical Patch Update release, and these are the first public details of the flaws. Continue reading New Oracle ERP Vulnerabilities Unmasked

FAQ :DNSChanger Trojan, Impact and Solutions

DNSChanger+Malware,+Impact+and+Solutions

Two days before we (THN) Reported that FBI will shutdown Internet on 8th March, Title seems to be more Attention seeking , Why ? Well ! Our job is to aware you about the Internet Security. If we are looking for some extra attention from our Readers then its part of our small effort to make Internet more secure space for all. Continue reading FAQ :DNSChanger Trojan, Impact and Solutions

February 2012 Most Vulnerable Cities At Risk Of Cyber Crime

Norton’s study showed the city was one of the ten worst for hacking. Each city was ranked by the prevalence of PCs and smartphones in addition to social media use with risk factors like unsecured Wi-Fi hotspots and malware attempts.  Continue reading February 2012 Most Vulnerable Cities At Risk Of Cyber Crime

Metasploit Updated to Address Risks Within IPv6

Rapid7 released version 4.2 of the Metasploit Framework today, which includes tools needed to assess risk on networks that are deploying or have already deployed IPv6. In addition, the new version offers an additional 54 exploits, 66 auxiliary modules, 43 post-exploitation modules, and 18 payloads.

Companies typically have a tight grip on the IPv4 side of the network, Rapid7 explained in a statement, but less so on IPv6 interfaces, which can introduce dangerous misconfigurations, such as a firewall that has filters set up for IPv4 traffic but accepts all IPv6 traffic. Some defense mechanisms, such as older IPS systems, may even be completely blind to IPv6 traffic.

Rapid7's Metasploit Helps Test IPv6 Security Risks Continue reading Metasploit Updated to Address Risks Within IPv6

Apache 2.4 Comes Out, Major update after 6 years

Apache+2.4+Comes+Out,+Major+update+after+6+years

The Apache Software Foundation officially released the Apache 2.4 today as the first major update to this leading open-source web-server in more than a half-decade. Apache 2.4 is slated to deliver superior performance to its 2.2 predecessor and better compete with the growingly-popular NGINX web-server. It is the first major release of Apache in six years, coincides with the software’s 17th anniversary.

Besides much faster performance, among the many enhancements to the Apache 2.4 HTTP Server is better a-synchronous support in its core, run-time loadable MPMs, reduced memory usage compared to Apache 2.2.x, several new modules, enhancements to existing modules, and much more. Continue reading Apache 2.4 Comes Out, Major update after 6 years