March, 2013

article thumbnail

Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities

Elie

Early July 2012, I reported to Apple numerous vulnerabilities related to their App Store iOS app. Last week Apple finally issued a fix for it and turned on HTTPS for the App Store. I am really happy that my spare-time work pushed Apple to finally enabled HTTPS to protect users.

62
article thumbnail

CVE-2003-0095 – Oracle Database Server Unauthenticated Remote Overflow Metasploit Module

NopSec

Penetration testing is one of the services that we offer NopSec customers. A vulnerability assessment and penetration test provide an excellent snapshot of an organization’s risk at a given point in time. By simulating a real-world attack, our Security Engineers actively attempt to exploit vulnerabilities and gain access to system resources without damaging or disrupting any of our customer’s production services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bleeding Edge Kali Linux

Kali Linux

We’ve been busy this week, still behind on our emails, but going strong with Kali development. We packaged some new tools which were pointed out by the community as missing, such as inguma , arachni , bully , lbd , uniscan , automater , as well as started to build a framework of libraries and patches for bluetooth sniffing and ubertooth tools.

52
article thumbnail

Google called before European privacy authorities

Privacy and Cybersecurity Law

In October 2012, the Article 29 Working Party highlighted their concerns about Google’s new consolidated privacy policy. This converted a […].

40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Kali Linux Release Aftermath

Kali Linux

Five days into the Kali Linux release at BlackHat EU in Amsterdam, and we’re still not fully recovered. Since the release, we’ve had just over 90,000 downloads , a dozen or so package updates, added more articles to the Kali Documentation, started a Portuguese translation , and we even managed to squeeze in a small bugfix release (Kali 1.0.1), which resolved an annoying USB keyboard issue some users reported.

52
article thumbnail

What's New in Kali Linux?

Kali Linux

Enter Kali Linux “ So, what’s the difference between BackTrack and Kali? ” you might be asking. Unfortunately for us, that’s not a simple question to answer. It’s a mix between “everything” and “not much”, depending on how you used BackTrack. From an end user perspective, the most obvious change would be the switch to Debian and an FHS-compliant system.

More Trending

article thumbnail

BankInfoSecurity: Overcoming Too Much Data

NopSec

Last week at the RSA Conference, Lisa Xu and I had an opportunity to sit down with Tracy Kitten, Managing Editor of Bankinfosecurity.com , a publication specializing in coverage of information security, risk management, privacy and fraud. Tracy had questions about what we do at NopSec and then we dove into a conversation about why normalizing and aggregating data ensures security gaps are filled.

Risk 40
article thumbnail

Big Data (at risk of becoming “little data” in Europe?)

Privacy and Cybersecurity Law

What is Big Data? Big Data is about using mathematical models to spot patterns or “footprints” in large datasets. The […].