No practical risk to SecurID 800 users � RSA By John Leyden 27th June 2012 http://www.theregister.co.uk/ 2012/06/27/smartcard_crypt...
SAINT Scanner Tool :: SAINT Exploit Tool
SAINT Scanner Tool Before you can secure a network, you have to know how it's threatened. SAINT uncovers areas of weakness and ...
Psiphon :Censorship circumvention system
Psiphon is a set of technologies that use a combination of secure communication and obfuscation to defeat network censorship systems. ...
Cisco VPN Concentrator 3000 FTP Unauthorized Administrative Access
This module tests for a logic vulnerability in the Cisco VPN Concentrator 3000 series. It is possible to execute some FTP statements witho...
Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
This Metasploit module can be used to execute arbitrary code on IIS servers that expose the /msadc/msadcs.dll Microsoft Data Access Com...
Pytbull -Intrusion Detection/Prevention System (IDS/IPS) Testing Framework
Pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an aler...
SQL injection vulnerability in search.php in Pligg CMS 1.1.2
SQL injection vulnerability in search.php in Pligg CMS 1.1.2 allows remote attackers to execute arbitrary SQL commands via the status par...
India ahead of US, Japan in PC security: McAfee
India may have low penetration of computers, but it is ahead of countries like US, Japan and Singapore when it comes to basic PC protect...
Cell Network Security Holes Revealed, With an App to Test Your Carrier
The researchers also developed an Android app that tells phone users when they're on a vulnerable network. They will present their wor...
Phone hacking: News International could face more than 500 claims
News International could be facing more than 500 civil claims for damages from alleged victims of News of the World phone hacking, the h...