Monday, February 28, 2011

HITB Magazine Issue #5 is now available

New issue of HTIB magazine already available
 
Inside:
  • Investigating Kernel Return Codes with the Linux Audit System
  • Secure Shell Attack Measurement and Mitigation
  • ARP Spoofing Attacks & Methods for Detection and Prevention
  • Exploiting Web Virtual Hosting –Malware Infections
  • Windows CSRSS Tips & Tricks

New issue of Hakin9 available: Identity Theft


New issue of Hakin9 magazine already available!

Inside:
  • Identity Proof Your Personal Data by Julian Evans
  • Guarding Against Identity Theft by Gary Miliefsky
  • The Best Way to Learn and Apply Cryptography by Arkadius C. Litwinczuk
  • Analysis of a Scam by Rich Hoggan
  • Secure Env for PT by Antonio Merola
  • Knowing VoIP – part III by Winston Santos
  • Bluetooth Mice Can Leak Your Passwords! by Aniket Pingley, Xian Pan, Nan Zhang, Xinwen Fu
  • Choosing an IDS/IPS Engine by Matthew Jonkman

Monday, February 21, 2011

Free e-book: Web Application Security for Dummies

Qualys has published a new comprehensive free guide on Web Application Scanning (WAS) to help readers understand web application security - including how to quickly find and fix vulnerabilities in web applications.

WAS for dummies ebook

Hackito Ergo Sum 2010

Hackito Ergo Sum is focusing on all technology hacks, hardcore reverse engineering and vulnerability research, exotic network and platform hacking, and all the new domains of the hacking domain

Here you can find 2010 presentations


http://hackitoergosum.org/archive-201/

Monday, January 24, 2011

New Good Practice Guide for Incident Management from ENISA

The European Network and Information Security Agency (ENISA) has issued a practical information and guidelines for the management of network and information security incidents by CERTs.

The good practice guide for incident management focuses on the incident handling process. This involves the detection and registration of incidents, followed by so called 'triage' (classifying, prioritizing and assigning incidents), incident resolution, closing and post-analysis.

The guide will help establishing and building Security Incident Response capability

Good Practice Guide for Incident Management