Monthly Archives: October 2012

SQL Injections And DDoS Attacks: Most Popular Topics On Hacker Forums


October 31, 2012 By
The Vigilant Application Owner

Softpedia – (International) SQL Injections and DDoS attacks: Most popular topics on hacker forums. Security solutions provider Imperva released the result of its 13th Hacker Intelligence Initiative report, which is based on the analysis of some highly popular hacker forums, including one that is considered to be one of the largest, with 250,000 members. According […]

Continue reading...

ICS-CERT Warns Of Increasing Threat To Industrial Control Systems


October 30, 2012 By
The Vigilant Application Owner

The H – (International) ICS-CERT warns of increasing threat to industrial control systems. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued a warning about special tools and search engines that make attacks on systems and devices in infrastructures simple even for inexperienced attackers. Tools aimed at cracking digital control systems from companies such […]

Continue reading...

IT Supply Chain – Will Yours be Compromised?


October 29, 2012 By
Derek Weeks

Gartner recently published research about the enterprise IT supply chain and impending threats that should encourage organizations to act.  An overview of the research is available on Help Net Security: “Enterprise IT supply chains will be compromised”. The title sounds ominous, but it’s a good read that advises organizations to take a holistic approach to protecting […]

Continue reading...

Backdoor In Computer Controls Opens Critical Infrastructure To Hackers


October 25, 2012 By
The Vigilant Application Owner

Ars Technica – (International) Backdoor in computer controls opens critical infrastructure to hackers. Software used to manage equipment in power plants, military environments, and nautical ships contain an undocumented backdoor that could allow malicious hackers to access sensitive systems without authorization. The CoDeSys software tool, which is used in industrial control systems sold by 261 […]

Continue reading...

Now Available: SSL Connectivity to Central


By
Brian Fox

UPDATE:  Free SSL Connectivity to Central for All — Sonatype’s project to make SSL the default connectivity option for all Central users is underway and will be complete by August 12th, 2014 (if not sooner).  For details, please visit: http://www.sonatype.com/clm/secure-access-to-central. We know how components from the Central Repository have become critical to your development efforts. […]

Continue reading...

Imperva Experts Reveal The Best Practices And Tactics To Mitigate Insider Threats


By
The Vigilant Application Owner

Softpedia – (International) Imperva experts reveal the best practices and tactics to mitigate insider threats. Insider threats have become a major issue, and many information security solutions providers have focused their efforts on precisely determining how such threats can be mitigated. Security firm Imperva contributed to this research with a report that examines the legal, […]

Continue reading...

Hackers Get 10 Months To pwn Victims With 0-days Before world+dog Finds Out


By
The Vigilant Application Owner

The Register – (International) Hackers get 10 months to pwn victims with 0-days before world+dog finds out. Hackers exploit security vulnerabilities in software for 10 months on average before details of the holes surface in public, according to a new study. Researchers from Symantec believe that these zero-day attacks, so called because they are launched […]

Continue reading...

Improving Software Quality Using Component Lifecycle Management with Jenkins


By
Emily Blades

A few weeks ago, a few of us joined the Jenkins community at the Jenkins User Conference 2012 in San Francisco. Our presentation “Improving Software Quality Using Component Lifecycle Management with Jenkins” given by Manfred Moser, was very well attended and there seemed to be a lot of interest. A video of our presentation has […]

Continue reading...