March, 2013

article thumbnail

Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities

Elie

Early July 2012, I reported to Apple numerous vulnerabilities related to their App Store iOS app. Last week Apple finally issued a fix for it and turned on HTTPS for the App Store. I am really happy that my spare-time work pushed Apple to finally enabled HTTPS to protect users.

62
article thumbnail

CVE-2003-0095 – Oracle Database Server Unauthenticated Remote Overflow Metasploit Module

NopSec

Penetration testing is one of the services that we offer NopSec customers. A vulnerability assessment and penetration test provide an excellent snapshot of an organization’s risk at a given point in time. By simulating a real-world attack, our Security Engineers actively attempt to exploit vulnerabilities and gain access to system resources without damaging or disrupting any of our customer’s production services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bleeding Edge Kali Linux

Kali Linux

We’ve been busy this week, still behind on our emails, but going strong with Kali development. We packaged some new tools which were pointed out by the community as missing, such as inguma , arachni , bully , lbd , uniscan , automater , as well as started to build a framework of libraries and patches for bluetooth sniffing and ubertooth tools.

52
article thumbnail

Big Data (at risk of becoming “little data” in Europe?)

Privacy and Cybersecurity Law

What is Big Data? Big Data is about using mathematical models to spot patterns or “footprints” in large datasets. The […].

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

What's New in Kali Linux?

Kali Linux

Enter Kali Linux “ So, what’s the difference between BackTrack and Kali? ” you might be asking. Unfortunately for us, that’s not a simple question to answer. It’s a mix between “everything” and “not much”, depending on how you used BackTrack. From an end user perspective, the most obvious change would be the switch to Debian and an FHS-compliant system.

article thumbnail

Kali Linux 1.0 Release - Moto - The Birth of Kali Linux

Kali Linux

Kali Linux, the rising It’s been 7 years since we released our first version of BackTrack Linux , and the ride so far has been exhilarating. When the dev team started talking about BackTrack 6 (almost a year ago), each of us put on paper a few “wish list goals” that we each wanted implemented in our “next version” Scrapping it all and starting afresh It soon became evident to us that with our 4 year old development architecture, we would not be able to achieve all t

LifeWorks

More Trending

article thumbnail

Google called before European privacy authorities

Privacy and Cybersecurity Law

In October 2012, the Article 29 Working Party highlighted their concerns about Google’s new consolidated privacy policy. This converted a […].

40
article thumbnail

Kali Linux Release Aftermath

Kali Linux

Five days into the Kali Linux release at BlackHat EU in Amsterdam, and we’re still not fully recovered. Since the release, we’ve had just over 90,000 downloads , a dozen or so package updates, added more articles to the Kali Documentation, started a Portuguese translation , and we even managed to squeeze in a small bugfix release (Kali 1.0.1), which resolved an annoying USB keyboard issue some users reported.

52