- Databáze Hot News SANS News -

Poslední aktualizace v 10.09.2016 12:53:47

 

"6tus Layer Specification" - Qin Wang, Xavier Vilajosana, Thomas Watteyne
"A Common Operational Problem in DNS Servers - Failure To Respond." - Mark Andrews
"A framework for RPs to use IKEv2 KMP" - Uma Chunduri, Albert Tian, Joseph Touch
"A Framework for Semantic IPv6 Prefix" - Sheng Jiang, Qiong Sun, Ian Farrer, Yang Bo
"A Generic Bundle Mechanism for the Session Description Protocol (SDP)" - Dale Worley
"A Reputation Query Protocol" - Nathaniel Borenstein, Murray Kucherawy
"A Security Threat Analysis for Routing over Low-Power and Lossy Networks" - Tzeta Tsao, Roger Alexander, Mischa Dohler, Vanesa Daza, Angel Lozano
"A Simple Secure Address Generation Scheme for IPv6 AutoConfiguration (SSAS)" - Hosnieh, Christoph Meinel
"A Summary of Various Mechanisms Deployed at L-Root for the Identification of Anycast Nodes" - Joe Abley
"A workaround for termination of IPv4 network services" - Hiroaki Hazeyama, Atsushi Onoe, Osamu Nakamura
"Allocating and Retiring Special Purpose MPLS Labels" - Kireeti Kompella, Adrian Farrel
"Allocating and Retiring Special Purpose MPLS Labels" - Kireeti Kompella, Loa Andersson, Adrian Farrel
"Analysis of Comparisons between OpenFlow and ForCES" - Susan Hares
"Applicability of Access Node Control Mechanism to PON based Broadband Networks" - Nabil Bitar, Sanjay Wadhwa, Thomas Haag, Li Hongyu
"Attribute-Value Pairs For Provisioning Customer Equipment Supporting IPv4-Over-IPv6 Transitional Solutions" - Cathy Zhou, Tom Taylor
"Authenticated Identity Management in the Session Initiation Protocol (SIP)" - Jon Peterson, Cullen Jennings, Eric Rescorla
"Autonomous Extensible Internet with Network Address Translation(AEIP NAT)" - Diao Yongping, Ming Liao, Yuping Diao
"Benchmarking Neighbor Discovery Problems" - William Cerveny
"BGP FRR Protection against Edge Node Failure Using Vector Labels" - Ahmed Bashandy, Nagendra Kumar, Maciek Konstantynowicz
"BGP IP VPN Data Center Interconnect" - Luyuan Fang, Rex Fernando, Dhananjaya Rao, Dhananjaya Rao
"BGPSEC Protocol Specification" - mlepinski.ietf@gmail.com
"Binary Encodings for JavaScript Object Notation: JSON-B, JSON-C, JSON-D" - Phillip Hallam-Baker
"Careerbuilder Job Application" email scam with Dynamic DNS 
"CDNI Control Interface / Triggers" - Rob Murray, Ben Niven-Jenkins
"CLUE Signaling" - Paul Kyzivat, Lennard Xiao, Christian Groves
"CLUE Switching Mixer Example" - Mark Duckworth
"Controlled Delay Active Queue Management" - Kathleen Nichols, Van Jacobson
"CUSAX: Combined Use of the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Emil Ivov, Enrico Marocco, Peter Saint-Andre
"CUSAX: Combined Use of the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Emil Ivov, Peter Saint-Andre, Enrico Marocco
"DANE TLSA implementation and operational guidance" - Viktor Dukhovni
"DECADE: DECoupled Application Data Enroute" - Richard Alimi, Akbar Rahman, Dirk Kutscher, Yang Yang, Haibin Song, Kostas Pentikousis
"Definition of Managed Objects for the Optimized Link State Routing Protocol version 2" - Ulrich Herberg, Robert Cole, Thomas Clausen
"Delay Tolerant Networking Email Convergence Layer Protocol" - Bjoern Gernert, Sebastian Schildt
"DHCPv4 over A+P softwires" - Ole Troan
"Diameter Overload Control Solution Issues" - Ben Campbell
"Distributed Mobility Management: Service flows distribution and handoff technique based on MIPv6" - Liu Min, Yuwei Wang
"DNS Root Name Service Protocol and Deployment Requirements" - Marc Blanchet, Lars-Johan Liman
"Domain Name Registration Data Access Protocol Object Inventory Analysis" - Linlin Zhou, Ning Kong, Sean Shen, Steve Sheng
"Dynamic RP encodings in BGP based MVPNs" - Pavan Kurapati, Marco Rodrigues, Kurt Windisch, Saud Asif
"Emergency Services Support in WebRTC" - Bernard Aboba, Martin Thomson
"Event Publishing Extensions to iCalendar" - Mike Douglass
"Explicit RPF Vector" - Javed Asghar, IJsbrand Wijnands, Sowmya Krishnaswamy, Apoorva Karan, Vishal Arya
"Extending an IPv6 /64 Prefix from a 3GPP Mobile Interface to a LAN" - Cameron Byrne, Dan Drown, Vizdal Ales
"Extensions to RSVP-TE for P2MP LSP Egress Local Protection" - Huaimo Chen, So Ning, Autumn Liu, Fengman Xu, Mehmet Toy, Lei Liu
"Extensions to Secure Shell Public Key Subsystem" - Mark Joseph, Jim Susoy
"Free" exchange rate conversion 
"Gotchas" to Look for When Hiring an ERP Consultant
"Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)" - Ali Begen, Colin Perkins, Dan Wing, Eric Rescorla
"Home Documents for HTTP Services: XML Syntax" - Erik Wilde
"HTTP Client Hints" - Ilya Grigorik
"HTTP Digest Update" - Rifaat Shekh-Yusef, David Ahrens
"HTTP Origin and Hop Hints" - Mark Nottingham
"HTTP Session Management" - Phillip Hallam-Baker
"Channel Binding Signalling for the Generic Security Services Application Programming Interface" - Nico Williams
"IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters" - Donald Eastlake, Joe Abley
"IANA Guidance for Managing the ULE Registry" - Gorry Fairhurst
"ICANN Registry Interfaces" - Gustavo Lozano
"IGP Extensions for Stateful PCE Discovery" - Siva Sivabalan, Jan Medved, Xian Zhang
"In-Band Authentication Extension for Protocol Independent Multicast" - Manav Bhatia, Dacheng Zhang, Bharat Joshi
"Indoor Signal Position Conveyance" - Kipp Jones, Christopher Steger
"Instant Messaging and Presence Purpose for the Call-Info Header in the Session Initiation Protocol (SIP)" - Peter Saint-Andre
"Interoperability between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Chris Christou, Michael Lundberg, Christopher Ross, Peter Saint-Andre
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Addresses and Error Conditions" - Peter Saint-Andre, Avshalom Houri, Joe Hildebrand
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Groupchat" - Peter Saint-Andre, Salvatore Loreto, Saul Corretge, Fabio Forno
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Media Sessions" - Peter Saint-Andre
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): One-to-One Text Chat" - Peter Saint-Andre, Salvatore Loreto, Eddy Gavita, Nazin Hossain
"IODEF Usage Guidance" - Panos Kampanakis
"IPv6 Email Authentication" - Douglas Otis, David Rand
"Key Wrapping with AES GCM for JWE" - Michael Jones
"Lawful-Intercept Support for SP Wi-Fi Deployments" - Byju Pularikkal, Sri Gundavelli, Mark Grayson, Rajat Ghai
"Layer 2 (L2) LISP Encapsulation Format" - Michael Smith, Dinesh Dutt, Dino Farinacci, Fabio Maino
"Link Management Protocol (LMP) Test Messages Extensions for Evolutive Optical Transport Networks (OTN)" - Daniele Ceccarelli, Diego Caviglia, Francesco Fondelli, Fatai Zhang, Dan Li, Dieter Beller
"LISP Based FlowMapping for Scaling NFV" - sbarkai@gmail.com, Dino Farinacci, David Meyer, Fabio Maino, Vina Ermagan
"LISP Based FlowMapping for Scaling NFV" - Sharon Barkai, Dino Farinacci, David Meyer, Fabio Maino, Vina Ermagan
"Macros Nixed by Major Providers" - Douglas Otis, David Rand
"Management of Networks with Constrained Devices: Problem Statement, Use Cases and Requirements" - Mehmet Ersue, Dan Romascanu, Juergen Schoenwaelder
"Managing SSH Keys for Automated Access - Current Recommended Practice" - Tatu Ylonen, Greg Kent
"Middlebox considerations in NVO3 overlay networks" - Melinda Shore, Gu Yingjie, Senthil Sivakumar
"Mounting YANG-Defined Information from Remote Datastores" - Alex Clemm, Jan Medved, Eric Voit
"Multiplexing Negotiation Using Session Description Protocol (SDP) Port Numbers" - Christer Holmberg, Harald Alvestrand, Cullen Jennings
"Multi-Upstream Interfaces IGMP/MLD Proxy" - Hong-Ke Zhang, Thomas Schmidt
"Network Management of Mobile Ad hoc Networks (MANET): Architecture, Use Cases, and Applicability" - James Nguyen, Robert Cole, Ulrich Herberg, Jiazi Yi, Justin Dean
"Network Virtualization Overlay Control Protocol Requirements" - Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari Sridharan
"New" slammer and BHO's 
"NVGRE Router Alert Option" - Kanwar Singh, Pradeep Jain, Florin Balus, Wim Henderickx
"NVGRE-EXT: Network Virtualization using Generic Routing Encapsulation Extensions" - Murari Sridharan, Yu-Shun Wang, Pankaj Garg, Praveen Balasubramanian
"OAuth 2.0 Token Revocation" - Torsten Lodderstedt, Stefanie Dronia, Marius Scurtescu
"OmniBroker Protocol" - Phillip Hallam-Baker
"Operational Considerations Regarding Reputation Services" - Murray Kucherawy
"OSPF Incremental Link State Database Synchronization" - Alvaro Retana, Acee Lindem
"P6R's Secure Shell Public Key Subsystem" - Mark Joseph, Jim Susoy
"PCP Considerations for WebRTC Usage" - Reinaldo Penno, Tirumaleswar Reddy, Dan Wing, Mohamed Boucadair
"PCP Extension for Third Party Authorization" - Dan Wing, Tirumaleswar Reddy, Prashanth Patil, Reinaldo Penno
"Precursor Notification for dynamic MANET On-demand (AODVv2) Routing" - Charles Perkins
"Prefix Delegation Support for Proxy Mobile IPv6" - Xingyue Zhou, Jouni Korhonen, Carl Williams, Sri Gundavelli, Carlos Bernardos
"Problems with STUN Authentication for TURN" - Tirumaleswar Reddy, Ram R, Muthu Perumal, Alper Yegin
"Profile Support for the Atom Syndication Format" - Erik Wilde
"Proposed Refactoring of JOSE to Align Encryption and Key Wrapping" - Richard Barnes
"Protocol to Access White Space (PAWS) Database: Use Cases and Requirements" - Anthony Mancuso, Scott Probasco, Basavaraj Patil
"PSC protocol updates for non-revertive operation" - Tae-sik Cheung, Alessandro D'Alessandro, Huub van Helvoort
"Pseudowire Setup and Maintenance using the Label Distribution Protocol" - Luca Martini, Giles Heron
"RADIUS Attribute for 4rd" - Sheng Jiang, Yu Fu, Bing Liu
"RADIUS Extensions for DS-Lite Multicast" - Jie Hu, Wei Meng, Cui Wang
"Reconfigure Triggered by DHCPv6 Relay Agents" - Mohamed Boucadair, Xavier Pougnard
"Recursive PCP" - Stuart Cheshire
"Redirection Service for Registration Data Access Protocol" - Carlos Martinez, Arturo Servin, Linlin Zhou, Dario Gomez, Gerardo Rada
"Registration of Second-Level URN Namespaces Under "ietf"" - Barry Leiba
"Requirements for Ethernet VPN (E-VPN)" - Ali Sajassi, Rahul Aggarwal, Nabil Bitar, Aldrin Isaac
"Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) extension for recording TE Metric of a Label Switched Path" - Zafar Ali, George Swallow, Clarence Filsfils, Matt Hartley, Kenji Kumaki, Ruediger Kunze
"Router Advertisement based privacy extension in IPv6 autoconfiguration" - Hosnieh, Christoph Meinel
"Routing for IPv4-embedded IPv6 Packets" - Dean Cheng, Mohamed Boucadair, Alvaro Retana
"RTCP XR Report Block for One Way Delay metric Reporting" - Ray van Brandenburg, Kevin Gross, Wenson Wu, Fernando Boronat, Mario Montagud
"RTCWeb Data Channels" - Randell Jesup, Salvatore Loreto, Michael Tuexen
"RTP payload format for Enhanced Variable Rate Narrowband-Wideband plus 2kbps Codec (EVRC-NW2K)" - Alok Gupta
"rxgk: GSSAPI based security class for RX" - Simon Wilkinson, Benjamin Kaduk
"Scenarios and Requirements for IP in Intelligent Transportation Systems" - Alexandru Petrescu, Christophe Janneteau, Michael Boc, Witold Klaudel
"SDP for the WebRTC" - Suhas Nandakumar, Cullen Jennings
"Segment Routing with IS-IS Routing Protocol" - Stefano Previdi, Clarence Filsfils, Ahmed Bashandy, Martin Horneffer, Bruno Decraene, Stephane Litkowski, Igor Milojevic, Rob Shakir, Saku Ytti, Wim Henderickx, Hannes Gredler
"Segment Routing with IS-IS Routing Protocol" - Stefano Previdi, Clarence Filsfils, Ahmed Bashandy, Martin Horneffer, Bruno Decraene, Stephane Litkowski, Igor Milojevic, Rob Shakir, Saku Ytti, Wim Henderickx, Jeff Tantsura
"Significance of IPv6 Interface Identifiers" - Brian Carpenter, Sheng Jiang
"Sophisticated Android Trojan" identified
"Supporting the Exercise command for PSC linear protection protocol" - Alessandro D'Alessandro, Jeong-dong Ryoo, Huub van Helvoort
"Survey of P2P Streaming Applications" - Gu Yingjie, Ning Zong, Yunfei Zhang, Francesca Piccolo, Shihui Duan
"Survey Report on PIM-SM Implementations and Deployments" - Lianshu Zheng, Jeffrey Zhang, Rishabh Parekh
"Terrorist" Lyrics Land High Schooler In Jail
"The Applicability of the PCE to Computing Protection and Recovery Paths for Single Domain and Multi-Domain Networks." - Huaimo Chen, Dhruv Dhody
"The application/firmware, application/firmware-receipt, and application/firmware-error media types" - Sean Turner, Russ Housley
"The IETF Profile URI Registry" - Markus Lanthaler
"The Internet Numbers Registry System" - Russ Housley, John Curran, Geoff Huston, David Conrad
"The LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (LOADng)" - Thomas Clausen, Axel Verdiere, Jiazi Yi, Afshin Niktash, Yuichi Igarashi, Hiroki Satoh, Ulrich Herberg, Cedric Lavenu, Thierry Lys, Charles Perkins
"the question is not “why should we have CME IDs” but “how do we make CME IDs work?" 
"The Subnetwork Encapsulation and Adaptation Layer (SEAL)" - Fred Templin
"The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)" - Inaki Castillo, Jose Millan, Victor Pascual
"TMCH functional specifications" - Gustavo Lozano
"Transaction SIGnature (TSIG) using CGA Algorithm in IPv6" - Hosnieh, martin@v.loewis.de, Christoph Meinel
"Transparent Interconnection of Lots of Links (TRILL) Use of IS-IS" - Donald Eastlake, Anoop Ghanwani, Radia Perlman, Dinesh Dutt, Ayan Banerjee
"Transport of London" Malicious E-Mail
"Transporting Timing messages over MPLS Networks" - Shahram Davari, Amit Oren, Manav Bhatia, Peter Roberts, Laurent Montini
"Traversal Using Relays around NAT (TURN) Extensions for Websocket Allocations" - Chen Xin
"TRILL: Adjacency" - Donald Eastlake, Radia Perlman, Anoop Ghanwani, Vishwas Manral
"Trust Requirements in a Federated World" - Josh Howlett, Rhys Smith, Margaret Wasserman
"Tunneling Compressed Multiplexed Traffic Flows (TCMTF)" - Jose Saldana, Dan Wing, Julian Navajas, Muthu Perumal, Fernando Blanco
"Using Extended Key Usage (EKU) for REsource LOcation And Discovery (RELOAD) X.509 Certificates" - Marc Petit-Huguenin
"Virtual Private Lan Services (VPLS) Management Information Base" - Thomas Nadeau, Kiran Koushik, Rohit Mediratta
"VPLS external Loop Protection Mechanism (VLPM)" - Richard Boldy
"Vulnerability Data Model" - harold.booth@nist.gov, Karen Scarfone
"VXLAN DCI Using EVPN" - Sami Boutros, Ali Sajassi, Samer Salam, Dennis Cai
"VxLAN Router Alert Option" - Kanwar Singh, Pradeep Jain, Florin Balus, Wim Henderickx
"X.509v3 TLS Feature Extension" - Phillip Hallam-Baker
"XML Schemas for Reverse DNS Management" - Terry Manderson
#49, Does Your Search Engine Need A Tune-up?, On The Soapbox, Auld Lang Syne 
#DF12 Dreamforce - the Social Trade Show
#DF12 Dreamforce Notes - CMO and Platform Dominate the Discussion
#DF12 Salesforce - More than Sales and CRM
#DF12 The Cloud - Is Corporate IT Missing the Party?
$5 Sensor Turns LCD Monitors Into Touchscreens
(Another) AOL Pwstealer 
(Update #Last : 23:00GMT) Cisco! Pancho!; MetaMetasploit?; BrightStor Exploits/Scanner; It Takes a Village...; Mystery; GHH 
(Updated) Additional info on yesterday's Linksys item, the importance of patching 
(Updated) Another Russian Bank Scam, New Exploit for MS04-020 
* {update #2} .org dns problems, RFI - Russian IIS Hacks? 
* 0-Day Win32 holes, Oracle&DB2 Revisited, Snort DoS Update, IRC over SMTP, Santy Poll Results 
* A Critical IE Patch Released / Why the Internet is Like an Elephant 
* Back to Green 
* DNS Cache Poisoning Report; Increase in Port Activity 
* DNS Cache Poisoning Report; Increase in Port Activity; SANS Conference 
* Internet Explorer 0-day exploit 
* Microsoft Patch for IFRAME vulnerability 
* Microsoft Patches Coming Today 
* Microsoft Releases 8 Critical Security Patches, etc. 
* Microsoft Security Bulletins for June 2004 
* MS06-040 exploit in the wild 
* MS06-042 reissue 
* MySQL Bot 
* New DNS cache poisoning server; DNS Poisoning stats; Bluemountain; Win2k3 SP1; awstat.pl Details; port 1025; MS05-002 problem 
* New exploit released for the WMF vulnerability - YELLOW 
* Update on Windows WMF 0-day 
* UPDATE: phpBB Worm. Holiday Security Guide, Predictions for 2005, Sign that you take security too serious. (1 Comments)
* UPDATE: Possible MySQL Bot. New Juniper Vuln, Advice on managing X Windows security, Request for input on 2005 Critical Threats 
* Updated: Serious Symantec Vulnerability, 1-day exploits, and the missing 13th patch 
* Veritas Backup Exec 0-day; POC code available for multiple updated MS vulns; P2P on the Vista 
* VML Update Released 
* VMWare vulnerability announced and fixed 
* Windows WMF 0-day exploit in the wild 
*Intel Centrino Vulnerabilities 
*Santy worm defaces websites using php bug 
*Santy Worm Update, Snort 2.2 DoS, IRC over SMTP, SSH Scanning, An InfoSec Christmas Story 
*WebViewFolderIcon ActiveX control exploit(s) in the wild 
.COM.COM Used For Malicious Typo Squatting
.MSI installer file for WMF flaw available 
.PUB Analysis
.wmf FAQ Translations 
/ Reading Logs / More Phishing / TCP 135, Welchia and Lovgate / Sasser slowing / Egress Filtering and You /
/dev/random 
/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
‘FinFisher’ spyware can take over an iPhone or Android phones remotely
“Banned” iPhone 5 commercial
“Car Talk” on NPR to end soon
“Order” e-mails and how to block them 
“Patch Tuesday” (14Mar13) is upon us
<em>Among Others</em> Wins Hugo For Best Novel
<em>Team Fortress 2</em> Beta Patch Adds Files Referring To Linux Support
<em>The Oatmeal</em> Begins a Fundraiser for a Nikola Tesla Museum
<i>Angry Birds</i> boss: Piracy helps us 'get more business'
03/09 Webcast Update; Possible Adware/Spyware Infection Via Worm; The Pain of Dealing With IRCBot's 
0-day exploit for Microsoft PowerPoint 
0day this, 0day that, I've got the 0day blah's, as does Microsoft Office 2000 PPT 
0-Day Thursday: PoC for Powerpoint Vulnerability 
0x01 trojan update (ev1.net host), openssl proof of concept exploit, HP mystery ssh patch 
1 compromised site - 2 campaigns
10 commandments of Windows security
10 Disruptive Online Services Enterprises Should Ban From the Network
10 questions for Layer 7 Technologies CTO Scott Morrison
10 Signs that your project may be doomed
10 things you need to know today: March 21, 2013
100% Compliant (for 65% of the systems), (Fri, Jun 7th)
100K Google Android Apps Pose Potensial Security Risk: Bit9 Report
12 questions you may like to ask when recruiting an enterprise architect
12/23/03 CitiBank/Visa Account Phishing, ISS IE URL Spoofing filter, Dameware scanning, Apple patch links 
12-year-old boy charged in Ashton Kutcher hoax
16 ultimate SSH hacks
17th Century Microscope Book Is Now Freely Readable
18 Carriers Sign Up for Firefox OS Phones
1976 Polaroids of an Apple-1 Resurface
2 Cisco Vulnerabilities, New Auto-Executing Virus Capabilities (Bugbear.C), MacOS X Security Update, Metasploit Framework Release 
2004 - A Look Back - Your Choice for Diary of the Year - Happy New Years 
2005 SANS Top 20 
2006 Predictions 
2006, Week 1: A Look at the Numbers 
2013 Security Breaches: A Bad Year Already
2016-11-18 example of KaiXin EK activity
21st IOCCC Source Code Released
2222/tcp Probe Increase 
2222/tcp Probes 
24 BEA WebLogic Vulnerabilities and Security Issues 
2-factor auth poll-results; Sticky firewall question; Handling Incidents Involving Dynamic DNS; Sybase Buffer Overflow Vulnerability Details to Be Announced; Mac OS X Issues Released; Belated Happy N 
2nd generation WMF 0day Exploit Spammed 
2nd generation WMF exploit: status of the anti-virus products after one day. 
3 Questions to Ask "Cloud Computing Job Candidates"
300 blogs
3D Printers For Peace Contest
40 Essential Mashable Stories You May Have Missed in 2012
404dnserror Adware 
419 Scams Now In Chat Rooms (1 Comments)
4242/TCP Activity is up 
5 Microsoft Advisories 
5 Questions to Ask your IoT Vendors; But Do Not Expect an Answer.
5 signs that you've lost control over your cloud apps
5. PTF Identification (Part 1) URL and Page
50 Million Potentially Vulnerable To UPnP Flaws
50 Years of Research and Still No Microwave Weapons
52 Digital Media Resources You May Have Missed
522 Error Code for the Win
6 adorable animals that interrupted sporting events
6 bagle versions in 1 day 
6 Black Friday Scams to Fear
6 of the saddest Valentine's Day apps (and one good one)
6101 and 6129 scans on the rise; “infected links”; A reader Query; A Goodie Basket for Grandma 
65 Digital Media Resources You May Have Missed
7 Craziest Intelligence Leaks in US History
7 Modeling Tools To Help Assess Cloud ROI
7. PTF File Access
72% of Xbox 360 Gamers Approve of "More Military Drone Strikes"
7sir7 Mass Hack Update / DNS Cache Poisoning / Phishing with a twist 
8.7 million mobile customers hacked in S.Korea
802.11ad Will Knock Your Socks Off, Says Interop Panel
80FFTs Per Second To Detect Whistles (and Switch On Lights)
9 Data Centers: Unexpected Beauty
A $5,000 vulnerability in Facebook
A (Mostly) 3-D Printed Race Car Hits 140 Km/h
A .BUP File Is An OLE File
A Blood Test That Screens For Cancer
A Bump in the Wire 
A Bunch Of Bull in a China Shop 
A busy Black Tuesday coming up..... 
A cavity in Linux Bluetooth? 
A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
A Collaborative Way of Working: Oracle E-Business Suite Integration
A Conversation with the President of the Open Source Initiative (Video)
A couple of handy iptables tutorials 
A Day Early, Google's at it With 8-Bit Google Maps - for April Fools' 2012
A day in the life of a pentester, or is my job is too sexy for me?
A Few Improvements for Firefox's Android UI
A few Mirai Updates: MIPS, PPC version; a bit less scanning
A few preliminary log analysis thoughts 
A Few Thoughts on the Recent MySpace Worm 
A Glimpse At Piracy In the UK and Beyond
A Good Day for Phishing; SSH Followup; NIMDA, Still There; Tip for the Day 
A handful of bugs, a fix, and some good reading 
A Humanoid Robot Named "Baxter" Could Revive US Manufacturing
A Lesson Learned from the Mailbox 
A loan offer or two 
A Look at the Mandiant M-Trends 2016 Report
A Look Inside a Dirty Computer 
A look through the spam filters - examining waves of Upatre malspam
A Major Shift in Cyber Security of Industrial Control Systems (February 5, 2013)
A malware jungle 
A new botnet - Mocbot 
A new DB2 for z/OS Redbook draft is now available for download
A new tool to detect & remove malware
A Nonsensical Proposal - Beta Patches 
A Peek Into The MailBag 
A phased approach to IPv6 that's so easy, you'll almost think you're still ignoring it
A Piezoelectric Pacemaker That Is Powered By Your Heartbeat
A possible first example of user interface exploits in Internet Explorer; Holiday gift-giving 
A Quarter of Sun-Like Stars Host Earth-Size Worlds
A question; New MSBA; Finding zlib; Evading Snort; Some Reading; FTBM VI: Hypnotized and EULAgized 
A Quick Guide-BI Platform & Implementation Strategy
A quiet day on the Internet 
A Real-Time Map of Global Cyberattacks
A recent decline in traffic associated with Operation Windigo
A recent example of wire transfer fraud
A Report from the Field 
A Report on ICANN 43: New gTLDs and DNSSEC
A Robot With a Chainsaw!
A Sad-day for Customer Service 
A Sea Story: the Wreck of the Replica HMS Bounty
A Security Sampler 
A slew (well, a couple) of new vulns, more on weird DNS traffic and a mystery app 
A Snapshot of the Inside of an Atom
A sober New Years update. 
A TCP/IP mystery (solved) 
A Terrifying Tale of TCP ... Terror 
A Tip For The Analysis Of MIME Files
A Tool to Create PS Role Matrix with Navigations
A Trail of Clicks, Culminating In Conflict
A trip through the spam filters: more malspam with zip attachments containing .js files
A trojan that deletes spyware? - More botnet fun - World record attempt 
A TWiki Vulnerability Allows Remote Code Execution 
A very [word beginning with 'q' deleted] day and helpful links 
A Wall Against Cryptowall? Some Tips for Preventing Ransomware
A Wi-Fi Wardriving Motorbike — With Plans Available
A wild ride last month.
Aaron Swartz Isn't the First Hacker to Commit Suicide in the Face of a Federal Investigation
Aaron Swartz's Estate Seeks Release of Documents
Aaron's Law: Violating a Site's ToS Should Not Land You in Jail
Abuse handling and the misfortunes of the good Samaritan 
Abusing Oracles
Academia joins in battling Android malware
ACDSee Fotoslate DLL Loading Arbitrary Code Execution Vulnerability
ACDSee Photo Editor 2008 DLL Loading Arbitrary Code Execution Vulnerability
ACDSee Picture Frame Manager DLL Loading Arbitrary Code Execution Vulnerability
ACLU: Most US police don't seek warrants before tracking cell phones
Acrobat Reader Vulnerabilities - FreeBSD Security Benchmark - Phishing Season 
Acronis vmProtect 7 Tightens vSphere Integration
Active exploit of Open Conference Systems web application 
ActiveX Kill Bit Can Be Bypassed - Another Reason to Apply MS05-054? 
Activists urge Skype: Tell us who is spying on us
Activity increase on Port 12345; More Phishing; Ethereal Exploit 
Actor that tried Neutrino exploit kit now back to Angler
Actor using Angler exploit kit switched to Neutrino
Actor using Rig EK to deliver Qbot - update
Actors using exploit kits - How they change tactics
acts of terrorism trojan 
Actual Final Third Party Debate Tonight
ACTUALIZA1-Chinas Huawei, Zte deben ser excluidas EEUU: comisión
Ad Blocking – a Coming Legal Battleground?
AD Security's Unofficial Guide to Mimikatz & Command Reference
Adafruit Launches Educational Show Aimed At Kids
Adaware corrects their false positives 
Additional notes on Stumbler. 
ADF BC, Overriding prepareSession, and PL/SQL
Administrata; MS05-026 exploits in the field? No, not really; OpenRBL ist Kaput; Passive Reconnaissance and the Disaster Response threat-space; mod_jrun exploit sweep 
Adobe Acrobat and Reader Pre-Announcement
Adobe Acrobat Update 
Adobe backpedals, will now patch software for free
Adobe backs down, patches critical Photoshop CS5 hole
Adobe backs down, will release patches for critical holes
Adobe Connect Security Breach Exposes Personal Data of 150K Users
Adobe Flash Player Bug Spreading Via Word Documents in Emails
Adobe Flash Player Update
Adobe Flash Player update http://www.adobe.com/support/security/bulletins/apsb12-22.html, (Tue, Oct 9th)
Adobe Flash player upgrade time 
Adobe Flash Update
Adobe Flash update available 
Adobe Flash update closes several critical holes
Adobe Flash Update: Here we go again!!
Adobe Hopes Pop-up Warnings Will Stop Office-Borne Flash Attacks
Adobe Issues Another Flash Player Fix (March 5, 2012)
Adobe Issues Emergency Flash Player Patches to Block Cyber Attacks
Adobe Issues Reader, Acrobat Security Updates to Stave Off Attacks
Adobe January 2017 Patches
Adobe open sources Malware Classifier tool
Adobe Patch Tuesday - February 2016
Adobe patches critical Flash bugs, ships sandboxed plug-in for Firefox
Adobe patches new Flash zero-day bug with emergency update
Adobe Reader Update 
Adobe releases critical security updates for Reader, Flash Player and ColdFusion
Adobe releases open source malware classification tool
Adobe Releases Surprise Shockwave Player Patch
Adobe Revoking Code Signing Certificate Used To Sign Malware
Adobe scrambles to revoke stolen cert
Adobe switches Flash fix schedule to Patch Tuesdays
Adobe Update to Vulnerabilities, (Sat, May 12th)
Adobe Updates Flash Player, Shockwave and PDF Reader
Adobe Updates for Flash Player. More info can be found here --> http://www.adobe.com/support/security/bulletins/apsb12-14.html, (Sat, Jun 9th)
Adobe Updates Shockwave Player
Adobe will be changing Creative Suite to a subscription model after CS6
Adobe Working on Patches for Newly Discovered Zero-Day Code Flaws
Adobe: Pay upgrade price to patch critical bugs
Adobe: Photoshop is not a target for attackers
Adobe's Creative Cloud Illustrates How the Cloud Costs You More
Adobe's security chief praises Apple for Flash-crippling move
ADODB.connection Vuln 
Adore-ng 0.31 released and POC code for do_mremap() 
Advance info for Patch Tuesday; Yellow; DNS cache poisoning update 
Adventures in Hunting Rogue Wireless Access Points 
Advocacy group takes aim at antiporn bill requiring ISP data retention
Adwind: another payload for botnet-based malspam
African Robotics Network Challenge Spurs Rash of $10 Robots
African Soil Mapped For the Very First Time
After 24 hours of fun we are back online! 
After Aaron Swartz's Death, the Focus Now Falls On the Prosecutors
After Flash, what will exploit kits focus on next?
After Weeks of Trying, UK Cryptographers Fail To Crack WWII Code
Aftermath of Microsoft's October Bulletins, more bots, and Linux rootkits 
Agile Development Teams CAN build secure software
AI System Invents New Card Games (For Humans)
aim for a gdi exploit. 
AIM Phishing, Windows file integrity flashback, pstools vulnerability 
AIM worm and AV... 
Air Force Looking To Beef Up Spacecraft Network Security
Air Quality Apps and Bottled Air Thrive On Beijing's Pollution
Airlines Face Acute Pilot Shortage
Akamai Problems, New Angle(r) On An Old Phish 
Akamai problems. Quiet, well kinda quiet, day on the Internet 
Akamai/Internet DNS Problems (Updated), Exploitation of IE URL Spoofing, MS Re-Releases NT 4.0 Patch, ISC Site Under Heavy Load 
Al Jazeera says hackers sent false mobile texts
Alan Cox: Fedora 18 "The Worst Red Hat Distro," Switches To Ubuntu
Alcatel CEO to leave after company swings to 2012 loss
ALERT - Black Ice Worm 
All CVE Details at Your Fingertips
All Five Star Trek Captains Share a Stage
All I want for christmas are my exploits.... 
All quiet on the MAE Western front 
All-At-Once Operations in SQL: A Flaw In The Language?
All's quiet on the Internet ... 
Ally Financial latest U.S. bank to face cyber attack
Ally Financial latest U.S. bank to face cyber attacks
Alpha Centauri Has an Earth-Sized Planet
Always get permission - VA stolen laptop recovered 
Amarok 2.6 Music Player Released
Amateurs battle malware, hackers in UK cybergames
Amazing Mindreader Reveals Scary Truth [VIDEO]
Amazon and Google Barred From UK Government Cloud
Amazon Buys Sunlight Readable Color Display Company Liquavista
Amazon Charges Sales Tax On "Shipping and Handling"
Amazon launches Android app store in China
Amazon Recalling Sony CRM CD's 
Amazon To Launch Sydney Data Center
Amazon Woes 
Amazon woos enterprise with Virtual Private Cloud
Amazon, Microsoft Partner Up for Cloud Management
AMD Files Suit Against Former Employees For Alleged Document Theft
AMD Forums Uh-Oh 
AMD Launches New Mobile APU Lineup, Kabini Gets Tested
AMD Next-Gen Graphics May Slip To End of 2013
AMD Releases UVD Engine Source Code
AMD Reportedly Preparing Massive Layoff
AMD Trinity APUs Stack Up Well To Intel's Core 3
AMD Unveils Elite A-Series APUs With Enhanced Performance, Improved Efficiency
AMD, Intel Partner to Form Cyber Security Research Alliance
AMD's Next-Gen Steamroller CPU Could Deliver Where Bulldozer Fell Short
American democracy activist returns to US, lands in LA after 9-month detention in Vietnam
Amid Fiscal Uncertainty Venture Capital Is Way Down In Silicon Valley
Amnesty International's UK website compromised to infect visitors with cyberspying malware
Amsterdam Using Airbnb Listings To Identify Illegal Hotels
An Analysis of Jester's QR Code Attack. (Guest Diary), (Sun, Mar 11th)
An anti-virus goof; security awareness; and a return visit from some old friends; phishers, and sasser 
An Assessment of the Oracle Password Hashing Algorithm 
An Assignment From Professor Packetslinger of the School of Loose Screws 
An Impromptu Lesson on Passwords .., (Mon, Apr 30th)
An ISC Back to School Special 
An oldie but a goodie - 419 Death Scam
An Oven That Runs Android
An Overview of the FreeVideo Player Trojan 
An unpatched IE exploit invokes a second older unpatched IE exploit 
Analysis of botnet spamming trojan (SecureWorks) 
Analysis of Mocbot Goals 
Analyze of a Linux botnet client source code
Analyze of a malicious Word document with an embedded payload
Analyzing evidence of DNS attacks in PIX firewall logs; Trojans for industrial espionage; openrbl.org offline? 
Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan, (Fri, Sep 14th)
Analyzing Office Maldocs With Decoder.xls
Analyzing outgoing network traffic, (Thu, Aug 23rd)
Analyzing Quarantine Files
Analyzis of a Malicious .lnk File with an Embedded Payload
Anatomy of a global bank cyber theft
Ancestor of All Placental Mammals Revealed
Ancient Egyptian Tech May Be Key To Printing 3D Ceramics
Ancient vulnerability sparks world-wide hypegasm
And *another* 0-day Linux kernel vulnerability 
and little flaws in IVE 
And now, for something completely different! A novel use for an iPad..
And Now, the Cartoon News
And the SHA-3 title goes to .....Keccak, (Thu, Oct 4th)
And Today is Super Tuesday 
Android a photo-slurper too: report
Android adware capability a vulnerability, claim boffins
Android Apps Don't Need Permission to See Your Data
Android bot attacks rooted smartphones
Android in enterprises 'severely limited' by weak management support from Google
Android Malware "Obad" Called Most Sophisticated Yet
Android Malware Botnet Claims Doubted as Researchers Review Evidence
Android Malware Intercepts Text Messages, Forwards To Criminals
Android malware writers exploit Instagram craze to distribute SMS Trojan horse
Android Phone Hacked by Researchers via NFC - Security - News & Reviews - eWeek.com
Android smartphones infected via drive-by exploit
Android smartphones: USSD calls can kill SIM cards
Android Stagefright multimedia viewer prone to remote exploitation
Android threats growing in number and complexity, report says
Android Trojan distracts Japanese with anime and porn
Android Trojan leaves 100,000 users out of pocket
Android, iOS bugs expose phones to voyeurs, data thieves
Angler EK campaign targeting several .co domains deploying teslacrypt 3.0 malware
Angler exploit kit generated by "admedia" gates
Angler Exploit Kit, Bedep, and CryptXXX
Angler's best friends
Animation Sophistication: The Croods</em> Required 80 Million Compute Hours
Announcing ISCAlert - Email Worms Bog Down ISPs 
Annual "Worst CEO" List Released
Anomaly Detection 
Anonymous attacks Israeli websites over Gaza bombings
Anonymous Australia Disavows Self-Proclaimed LulzSec Leader
Anonymous blows off WikiLeaks, calls Assange a sellout after Lady Gaga dinner
Anonymous Claims Attack on Facebook
Anonymous claims it hacked a DOJ site
Anonymous doxes Cambodia after Pirate Bay arrest
Anonymous Files Petition To Make DDoS Legal Form of Protest
Anonymous Group Hackers Claim Top Universities Are Easy Targets
Anonymous Hackers Claim Protest Attacks Hit Zynga, Facebook, Others
Anonymous Hacking Tool Infected With Trojan (March 5, 2012)
Anonymous hater claims responsibility for Pirate Bay DDoS attack
Anonymous releases sample of Australian telco's data
Anonymous stalking Australian spooks
Anonymous takes down UK government websites in Assange attack
Anonymous takes out Indian CERT as attacks continue
Anonymous targets Home Office and other government websites
'Anonymous' targets Israeli websites over Gaza war
Anonymous threat shutters Gitmo WiFi
Anonymous threatens cyberwar on North Korea, steals 15,000 passwords
Anonymous threatens to DDOS root Internet servers
Anonymous wants DDoS attacks recognized as speech
Another 0-Day Exploit - CVE-2006-4777 
Another Active Day 
Another backdoor in networking hardware for industrial systems
Another Day - Another Ransomware Sample
Another day in the life - Padobot, ports 5000, 135, 445 
Another day, another bot being spammed 
Another Day, Another Malicious Behaviour
Another Day, Another Spam...
Another Day, Another Wave of Phishing Emails
Another EUSecWest NFC Trick: Ride the Subway For Free
Another example of Angler exploit kit pushing CryptoWall 3.0
Another great course, but this time for prestigious jobs seekers
Another IE Exploit makes the rounds... 
Another Java Exploit For Sale
Another Juniper problem - Juniper Bulletin PSN-2005-11-003 from 11/04/05 
Another Malicious Document, Another Way to Deliver Malicious Code
Another month another password disclosure breach, (Thu, Nov 15th)
Another new Word 0-day, information & dat released by McAfee 
Another Phishing Trick; More Osama Messages; Crunchy-Gooey Security Designs 
Another Player In the World of Free, Open Online CS Courseware
Another PnP Worm; Feedback from Microsoft; Reader Mailbag; Johannes Redux; Apple Security Patches 
Another round of DNS cache poisoning 
Another Virus, ISC Poll Results, Port 1433 scans 
Another wave of virus / New Gaobot / HP Web JetAdmin Vulnerability exploitation 
Another WMF attack vector? 
Anthropologist Spends Three Years Living With Hackers
Anti-Israel hackers leak nuclear watchdog email addresses
Antiphishing.org Trend Report 
Antisec Exposes 1 Million Apple Device IDs Following 'FBI Hack'
AntiSec hackers release 1 million stolen Apple device IDs – are you affected?
Anti-spam list shutoff; Special report on "phishing" attacks 
Antivirus Firms "Won't Co-operate" With PC-Hacking Dutch Police
ANU puts quantum random numbers online
AOL ICQ vulnerabilities 
AOL: the Good, the Bad and the Ugly 
AP Exclusive: Iran poised for big nuke expansion (AP)
AP PHOTOS: In a digital age, paper stocks hang on
Apache attack drives traffic to malware
Apache CloudStack Becomes a Top-level Project
Apache POI CVE-2012-0213 Denial Of Service Vulnerability
Apache Traffic Server update closes important security hole
APAR Friday: A new optimization DSNZPARM keyword (HIPER)
APAR Friday: Another performance enhancement for UNLOAD
APAR Friday: Enhance REORG TABLESPACE PART performance
APAR Friday: Here's a list of APARs you should be checking out this week
Apple "Patch Tuesday"
Apple AirPort Firmware Update 
Apple and Cisco Security Advisories 19 SEP 2012, (Thu, Sep 20th)
Apple and Mozilla take on Java vulnerabilities
Apple Angers Mac Users With Silent Shutdown of Java 7
Apple apologizes in China after service criticism
Apple banishes Java from Mac browsers
Apple blocks Java on the Mac over security concerns
Apple closes numerous holes in Mac OS X and Safari
Apple delivers Flashback malware hunter-killer
Apple Denies FBI Had Access To UDIDs
Apple Faces Lawsuit For Retina MacBook Pro 'Ghosting' Issue
Apple finally flips switch on HTTPS by default in App Store
Apple Firms Up Their Firmware 
Apple fixes security vulnerabilities with Apple TV 5.1 update
Apple Flashback Trojan infection shows weekend decline
Apple ID Leaks Traced to Application Developer
Apple iOS 10 and 10.0.1 Released
Apple iOS SMS Issue Enables Sender Identity Spoofing
Apple iOS7 Will Include Activation Lock Security Measures (June 11, 2013)
Apple Is Now the Most Valuable Company In History
Apple Issues Java Security Update
Apple land-grabs iThingy feature management patent
Apple logging passwords in plain text
Apple Mac OS X security patch bundle 2006-002 
Apple Mobile Devices Cleared For Use On US Military Networks
Apple Nabs Java Exploit That Bypassed Disabled Plugin
Apple OS X patches out 
Apple OSX Patches, 2006-003 
Apple Patents Alternative To NFC
Apple Patents Page Turn Animation
Apple Patches "Trident" Vulnerabilities in OS X / Safari
Apple Patches Everything
Apple Pays Only 2% Corporate Tax Outside US
Apple plugs Java hole after Flashback Trojan intrusion
Apple prompting some users for extra App Store security details
Apple publishes standalone Flashback malware removal tool
Apple Quicktime 7.1.3 released 
Apple QuickTime 7.7.4 for Windows updated, MANY security vulnerabilities: http://support.apple.com/kb/HT1222, (Wed, May 22nd)
Apple QuickTime and iTunes continued 
Apple releases Java update with Flashback removal tool - Update
Apple Remote Desktop update fixes no encryption issue, (Wed, Aug 22nd)
Apple Said To Be Working On a 'Watch-Like Device'
Apple Security Update 2005-009 
Apple Security Update 2006-001 (more details) 
Apple Security Update: OS X Server v.2.2.1 now available http://support.apple.com/kb/HT5644 , (Tue, Feb 5th)
Apple Suit Against Motorola Over FRAND Licensing Rates Dismissed
Apple taking technical, legal action against Flashback malware
Apple to end support for original iPhone: report
Apple updates Airport Drivers 
Apple Updates Everything (Again)
Apple Updates MacBooks and Mac Pro Desktop With Haswell, "Unified Thermal Core"
Apple updates OS X
Apple Updates the Update 
Apple updates to 10.4.8 and Security Update 2006-006 
Apple Wants Another $707 Million From Samsung
Apple Working on Exchange-Crippling iOS 6.1 Bug
Apple, Amazon Change Security Policies After Hack of Journalist`s Accounts
Apple, Amazon, close password door after horse bolts
Apple, Google tumble off top 20 trusted companies list
Apple, Oracle, Google Lead Major Vendors with Software Vulnerabilities in Q1, Security Report Says
Apple's latest release to OS X; phpBB posts new release 
Apple's Ode to Hackers 
Apple's Secret Plan To Join iPhones With Airport Security
Apple's soon-to-be-slurped securo firm shrugs off crypto warning
APPLE-SA-2006-12-19 
Application Associate Consultant Certification Exam for SAP BusinessObjects Access Control 10.0 (C_GRCAC_10) - Review Questions and Answers
Application Aware and Critical Control 2
Application Portfolio Management Survey–What is your organization doing?
Arctic Investigation Underway Into Solar Storm Sat-Nav Disruption
Arctic Sea Ice Hits Record Low
Arctic Sea Ice Hits Record Low Extent
Are App.net's Crowdfunders Being Taken For a Ride?
Are Desktop Computers Gone?
Are there any websites that are NOT compromised?, (Wed, May 8th)
Are Windows XP/7 Users Smarter Than a 3-Year-Old?
Are you a "Hunter"?
Are you a DB2 Version 8 user? Here's a warning...
Are you a security pirate? 
Are you being harassed or stalked online? 
Are you dissatisfied with ‘Send to mail recipient’ ? Here’ show to fix it.
Are you getting I-CANNED ?
Are you looking to setup your own Malware Sandbox?
Are you mentoring the next in line?
Are You Protecting your "Backdoor" ?
Are you ready for more Ron Burgundy? Anchorman 2 is coming...
Are you sure you're as prepared as you think you are? 
Are you using MQTs?
Arch Linux For Newbies? Manjaro Is Here!
Architecture Definition Requirements Report
Architecture Definition: The System Blueprint (Expanded)
Architecture Firm and ESA To 3D Print Building On the Moon
Archiving the snort tips 
Archos Gamepad Released In the USA
Arkeia remote exploit scan activity; More MyDoom; Where is Tokelau?; IRC Botnet 
Arnold muscles in to put the smackdown on phishers. 
Art School's Expensive Art History Textbook Contains No Actual Art
Artemis Project's N-Eye 
Artificial Muscles Pack a Mean Punch
Aruba's 802.11ac Rollout Cleans Up Sticky Clients
As cyber threats build against U.S., CEOs ask for "light touch"
As the Bot Turns 
Asian hackers p0wned by Eastern European rivals
Asian political activists whacked in Mac backdoor hack attack
Asigra Updates Cloud Backup, Extends NetApp Partnership
Ask Personal Audio's James Logan About Patents, Playlists, and Podcasts
Ask Slashdot: Advice For Getting Tech Career Back On Track
Ask Slashdot: Anti-Theft Devices For Luggage?
Ask Slashdot: Best Approach To Reenergize an Old Programmer?
Ask Slashdot: Best Book Or Game To Introduce Kids To Programming?
Ask Slashdot: Best Cell Phone Carrier In the US?
Ask Slashdot: Best Incentives For IT Workers?
Ask Slashdot: Best Linux Game For Young Kids?
Ask Slashdot: Best Pay-as-You-Go Plan For Text and Voice Only?
Ask Slashdot: Best Practices For Collecting and Storing User Information?
Ask Slashdot: Best Use For an Old Smartphone?
Ask Slashdot: Best VPN Service For Australia?
Ask Slashdot: Best Way To Block Noise In a Dorm?
Ask Slashdot: Dealing With a Fear of Technological Change?
Ask Slashdot: Encrypted Digital Camera/Recording Devices?
Ask Slashdot: Explaining Role-Playing Games To the Uninitiated?
Ask Slashdot: Explaining Version Control To Non-Technical People?
Ask Slashdot: Geekiest Way To Cook a Turkey?
Ask Slashdot: Hackable Portable Music Player For Helicopters?
Ask Slashdot: Hearing Aids That Directly Connect To Smart Phones?
Ask Slashdot: How Do You Deploy Small Office Wi-Fi SSIDs?
Ask Slashdot: How Do You Handle SPF For Spam Filtering?
Ask Slashdot: How Do You Sell an Algorithm To Venture Capitalists?
Ask Slashdot: How Much Is a Fun Job Worth?
Ask Slashdot: How To Avoid Working With Awful Legacy Code?
Ask Slashdot: How To Convince a Company Their Subscriber List Is Compromised?
Ask Slashdot: How To Convince a Team To Write Good Code?
Ask Slashdot: How To Get Paid For Open-Sourcing Your Work?
Ask Slashdot: How To Make a DVD-Rental Store More Relevant?
Ask Slashdot: How Would You Convince Someone To Give Up an Old System?
Ask Slashdot: How Would You Feel About Recording Your Entire Life?
Ask Slashdot: Is Samba4 a Viable Alternative To Active Directory?
Ask Slashdot: Is the Rise of Skeuomorphic User Interfaces a Problem?
Ask Slashdot: Job Search Or More Education?
Ask Slashdot: Mac To Linux Return Flow?
Ask Slashdot: Math and Science iOS Apps For Young Kids?
Ask Slashdot: New To Linux; Which Distro?
Ask Slashdot: Open Source Remote Application Access?
Ask Slashdot: Open-Source Forensic Surveillance Analysis Software?
Ask Slashdot: Options For FOSS Remote Support Software?
Ask Slashdot: Server Room Toolbox?
Ask Slashdot: Should Bitcoin Be Regulated?
Ask Slashdot: Should Hosting Companies Have Change Freezes?
Ask Slashdot: To AdBlock Or Not To AdBlock?
Ask Slashdot: What Equipment and Furniture For an Electronics Hardware Lab?
Ask Slashdot: What Is Your Favorite Monitor For Programming?
Ask Slashdot: What To Do About Patent Trolls Seeking Wi-fi License Fees?
Ask Slashdot: What Video Games Keep You From Using Linux?
Ask Slashdot: What Were You Taught About Computers In High School?
Ask Slashdot: What Would You Look For In a Prosthetic Hand?
Ask Slashdot: Where Should a Geek's Charitable Donations Go?
Ask slashdot: Which 100+ User Virtualization Solution Should I Use?
Ask Slashdot: Which International Online Music Stores Are Legit?
Ask Slashdot: Which Virtual Machine Software For a Beginner?
Ask Slashdot: Why Buy a Raspberry Pi When I Have a Perfectly Good Cellphone?
Ask Slashdot: Why Is It So Hard To Make An Accurate Progress Bar?
Ask Slashdot: Why Won't Companies Upgrade Old Software?
Ask Slashdot: Will You Shop Local Like President Obama, Or Online?
Ask Slashdot: Wiring Home Furniture?
Ask Slashdot: Worth Going For a Graduate Degree In the Middle of Your Career?
Ask the Expert – James Jardine
Ask the Expert – John Steven
Ask the Expert – Nick Galbreath
Ask the Expert – Rohit Sethi
Ask the Expert – Chenxi Wang
Ask the Expert – Jeremiah Grossman
ASLR on Android 4 found wanting
ASN.1 Attacks / MS04-007 
ASN.1 DoS exploit hostname resolution, Recent Scan Increases, anti spam effort 
ASN.1 vuln keeps on a'chugging. 
ASN.1 vuln, Windows integrity checker 
ASP.NET MVC and Knockout - MVC (vs?) MVVM
Assange bids for Senate seat
Assange calls for help from … Quakers?
Assange film "Underground" focuses on early years in Australia
Assange Makes Statement Calling For an End To the "Witch Hunt"
Assange movie debuts this weekend
Assange movie portrays hero as cold war rebel
Assange movie portrays leaker as cold war rebel
Assange movie portrays leaker as teen rebel
Assange Seeks To Sue Prime Minister Gillard For Defamation
Assange<sup>TM</sup> TV broadcasts this week
Assessing Remote Certificates with Powershell
Asteroid Apophis Just Got Bigger
Astronomers Probe Mysterious Gas In Titan's Atmosphere
Astronomers Want To Hunt Down Earth's Mini-Moons
At Galaxy unveiling, Samsung will have insurance plan in back pocket
At WICSA 2012 this week
AT&T Network Outage 
AT&T, et al Privacy Suit Dies as Supreme Court Refuses to Hear Appeal
Attacking NoSQL applications
Attacks against Joomla com_peoplebook 
Attacks on Iranian oil industry led to Flame malware find
Attachmate Reflection DLL Loading Arbitrary Code Execution Vulnerability
Attention Crypto Nerds: Gutmann's Godzilla Crypto Tutorial is Available for Download
Auditing a Network for VOIP Call Quality Metrics, (Wed, Sep 5th)
Aug 21 Sun JAVA patch fixes problems that May Allow Applets and Applications to Run With Unpatched JRE's installed 
August 2015 Microsoft Patch Tuesday
AUP/Terms of Service Agreements 
Aurora attack tried to pinch secret list of Chinese spies
Aurora Attackers Were Looking For Google's Surveillance Database
Australia central bank says no information lost in cyber attacks
Australia Passes 'Lite' Data Retention Laws
Australia puts digital frontier at heart of national security plan
Australia puts digital frontier at heart of security strategy
Australian cops bust Romanian credit card theives
Australian cops bust Romanian credit card thieves
Australian Govt Forces Apple, Adobe, Microsoft To Explain Price Hikes
Australian gov't under pressure over hacking claim
Australian Intelligence HQ Blueprints Hacked
Australian Police Move To Make 3D Printed Guns Illegal
Australian Scientists Discover Potential Aids Cure
Australian spy HQ plans stolen by Chinese hackers: report
Australian Telcos Declare SMS Unsafe For Bank Transactions
Australians Urged To Spoof IP Addresses For Better Prices
Australia's Biggest Telco Sold Routers With Hardcoded Passwords
Australia's central Bank hoses down Chinese hack report
Australia's de-facto net filter has ZERO regulation
Australia's Mandatory Data Breach Notification Bill Revealed
Austrian ID card vulnerable to spoofing attack
Austrian Skydiver Prepared to Leap From Edge of Space
AuthenTec sells out to Apple to the sound of 1,000 lawsuits
Authentication Issues between entities during protocol message exchange in SCADA Systems, (Sun, Aug 19th)
Author of Sasser worm and Phatbot caught; New Sasser Worm Variant; SANS Security Newsletters and Digests
Automated DMCA Takedown Notices Request Censorship of Legitimate Sites
Automatic MIME attachments triage
Automating Metrics using RTIR REST API
Automating Phishing Analysis using BRO
Automating Vulnerability Scans
Autoruns and VirusTotal
Autoruns updated October 6th 
AV Diversification, Next Generation Network Defense 
AV Phone Scan via Fake BSOD Web Pages
Avere, Fujitsu Team Up for New Storage Offering
AWStats Exploits, Port 7162/TCP and 24212/TCP traffic, spamvertised site redirected to Al'Jazeera 
AWSTATS 
Back to Green / Previous Sasser Traffic Analysis / Phatbot Source Code / Netsky.AC / CheckPoint VPN-1 Vulnerability 
Back to Green on the Snort BO Buffer Overflow 
Back to Green, A Word From Microsoft 
Back to green, but the exploits are still running wild 
Backbone issues? 
Backdoor found in popular FPGA chip
Backdoor in industrial networking hardware
Backdoor Targeting Apache Servers Spreads To Nginx, Lighttpd
Backdoor Trojans significant and tangible threat to Windows users - MS Antimalware Team 
Backdoors left behind by worms; DHCP connection 
BackTrack 5 update expands security toolkit
Backup the PST File Efficiently and Prevent Data Loss
Back-ups, archives, and Pogoplug
Bad Grammar Make Bestest Password, Research Say
BadNews not so bad, says Google
Ballmer Tells the BBC There's More MS Hardware On the Way
Bank card-slurp nasty 'infects tills, ATMs', corrupt staff fingered
Bank group warns of heightened risk of cyber attacks
Bank of America website slows; Prophet film threat made
Bank Puts a Billion Transaction Records Behind Analytics Site
Banking Trojan hijacks live chat to run real-time fraud
'Bankrupt' Australian Surgeon Sues Google For Auto-Complete
Banks on the business end of DDoS attack surge - report
Banks use non-ssl login forms. 
Barack Obama Retains US Presidency
Barclaycard pay-by-bonk fraud risk exposes Amazon's security
Barclays contactless card users exposed to fraud
Bargain: 10'000 infected PC's for only 25$ 
Barnes & Noble confirms PIN pad tampering
Barnes & Noble Founder Wants to Take Retail Division Private
Barnes & Noble halts use of PIN pad devices after data breach
Barnes & Noble says PIN pads in 63 stores hacked
Barracuda Networks outage statement 
Bartalex malspam pushing Pony/Dyre
Basic Defenses Absent at Most Breached Sites
Battle of the ISP's 
BBC Criticized For Snooping Under RIPA Powers
BBC Radiophonic Workshop Revived Online
BBC Turns Off CEEFAX Service After 38 Years
Be Careful What You Filter and Anti-Spyware Infrastructure Ideas 
Be on the Lookout for PHP compromises; Will New Anti-Spam Protocols Work?; Internet Survival Time by Sophos; phpBB: anti santy worm again ? 
Beagle Backdoor Port, Wakeup Call from NetSky.G and NetSky.H 
Beagle Exploit, SSL NULL encryption (update), port 12345 and 1026 
BeagleBone Black Ships With New Linux 3.8 Kernel
Beer Drone Delivery Service For South African Music Festival
Bees Communicate With Electric Fields
Behavioral Analysis of Rootkit Malware 
Behind the Scenes With Samsung's Factory Workers
Belated "deja vu" - IR for rootkits that run in safe mode 
Belgian Consumer Organization Sues Apple For Not Respecting Warranty Law
Belize wants to quiz anti-computer virus guru McAfee in murder probe
Bellsouth.(net|com) troubles 
Benevolent malware? reincarna/Linux.Wifatch
Berners-Lee hits out at government web snooping plans
Best of Interop 2013 Winners Announced
BEST Study Finds Temperature Changes Explained by GHG Emissions and Volcanoes
Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor
Better Brain Implants With Ultrathin Carbon Fiber Electrodes
Better onion anonymity possible: researcher
Beware the malware-tipped SPEAR TRAP in your inbox
Beyond The Fence
BHO FAQ, Survival Time, and auth/ident activity 
BHO scanning tool and New Scam Targets Bank Customers 
BHO, Browsers and related / Port 3705 / ISCAlert Portuguese version 
BI Solution-Design Strategies
Big Brother is prosecuting you: More cops to use court vid chats
Big Business surrounding Internet Fraud 
Big data analytics defining new malware strategy
Big Data to Overtake Hadoop in 2013
Big Honkin' Botnet - 1.5 Million! 
Big Change
Bill Gates Answers Questions From Redditors
Bill Gates Regains the Position of World's Richest Person
BIND 8 and 9 Vulnerabilities / ISP Blocking Traffic yet / Sharing thoughts 
BIND 9 patched against remote crash vuln
BIND 9 Security Updates, (Mon, Jul 30th)
BioShock: Infinite</em> Released
BioWare Founders Announce Retirement
Bit9 Hacked, Stolen Certs Used To Sign Malware
Bit9 Hacked: Stolen Digital Keys Used to Sign Malware
Bit9 wants to bin 'broken' antivirus, install whitelisting tech
Bitcoin Exchange BitFloor Says It Will Replace Stolen Coins
Bitcoin exchange shuts after heist
Bitcoin Foundation vows to clean up currency's bad rep
BitCoin Gets a Futures Market
Bitcoinica Bitcoin site breached
Bitcoin's Success With Investors Alienates Earliest Adopters
BitInstant CEO Says World Operates "On an Inferior Monetary System"
BitInstant Continues Bitcoin Paycard Plan
BitTorrent Sees Sync Users Share Over 1PB of Data
BizCN gate actor changes from Fiesta to Nuclear exploit kit
BizCN gate actor sends CryptoWall 4.0
BizCN gate actor update
Black Hat: Researcher pinpoints promising ways to attack Windows 8
Black tuesday - the day after 
Black Tuesday 4 vulnerabilites, Wins Traffic flow diagrams 
Black Tuesday Advance Notice 
Black Tuesday Patch Roundup, Panic and/or Mayhem ensues 
Black Tuesday Summary 
BlackBerry 10 Can BBM Anything You're Watching, Even Porn
BlackBerry 10 passes US defence department tests
BlackBerry 10 reportedly delayed until March, near-term licensing deals deemed ‘unlikely’
BlackBerry 10 Review: Good, But Too Late?
BlackBerry still trumps Android for security, analysis finds
BlackBerry Users in Europe, Africa Suffer 3-Hour Outage - Mobile and Wireless - News & Reviews - eWeek.com
BlackBerry10 passes US defence department tests
BlackEnergy .XLS Dropper
Blackworm Notifications 
BlackWorm Summary 
Blackworm/Nyxem Animation of Infections 
Blame crap mobe apps for swap-by-bonk hacks, say NFC bods
Blaster Worm Cleanup 
Blaster Worm Update - Power Outage 
Blaster Worm Update 
Bleeding Snort Domain. 
Bleeding Snort Sigs Available 
Blizzard Compromise-- what they missed in their user communication, (Fri, Aug 10th)
Blizzard Entertainment Hack Hits Battle.net Users
Blizzard Reportedly Planning A Linux Game For 2013
Blizzard Says Battle.Net Has Been Hacked
Blocking Powershell Connection via Windows Firewall. 
Blog Reveals a Chinese Military Hacker's Life Is One of Boredom and Bitterness
Bloggers Put Scientific Method To the Test
Bloodhound.Exploit.52 (Flash Player 7) detections 
Blue Coat WinProxy Vuln 
Blue Coat, Skype and QQ named as government surveillance helpers
Blue for Reset?, (Fri, Jan 4th)
Bluetooth 0day hacking 
Bluetooth Auditing 
Bluetooth Followup Links 
Bluetooth Used To Track Traffic Times
Boffins demo passwords even users don’t know
Boffins foul VM sandboxes with CPU-sniffing hack
Boffins hide messages in Skype ‘silence packets’
Boffins receive quantum key from moving plane
Bofra/IFrame After Action Review 
Bofra/IFrame Exploits on More Web Sites (updated); IFRAME vulnerability summary; Two more IE Exploits 
Bofra/IFrame Exploits Update 
Bogus anti-hacking tool targets Syrian activists
Book Review: Why Does the World Exist?
Book that makes learning statistics fun - "What is P-value Anyway?"
Booleans Extreme
Bot C&C Servers on Port 80 
Bot herds exploring vertical markets 
Bot Nets - Moving to Prime Time, AV Vendors Taking Out Valuable Resource, 
Bot with Veritas; Internet crash in Pakistan; MS Security Bulletin Scam; MS05-017 Exploit 
Botnet Malware code modifier's competition continues 
Botnet Report; MD5 Checksum; Handlers Update, Live from Las Vegas 
Botnet Research 
Botnet responsible for 18% of the world's spam shut down
Botnet traffic using TOR 
Botnets and Adwares-Spywares connection 
BotNets and Security Awareness in Academia; Potpourri of MS04-028 Scanning Tools from MS 
Botnets Host DNS; 'leet Names and Security Tools 
Botnets spreading Dridex still active
Botnets, PHP includes 
Bots installed through IM and Packet Capture howto 
Bots looking for FlashChat App 
Bots: They are not just for Windows anymore. 
Bounced emails with viral attachments 
Box becomes first third-party app on Good's platform
BP engineer charged over oil spill data deletion from iPhone
Brain Scans of Rappers and Jazz Musicians Shed Light On Creativity
Brazilian Judge Orders 24-hour Shutdown of Google and Youtube
Breakthrough In Drawing Complex Venn Diagrams: Goes to 11
Bredolab botnet author sentenced to 4 years in prison in Armenia
Brennan defends drone strikes, even on Americans
BrewPi: Raspberry Pi and Arduino Powered Fermentation Chamber
BRFPlus Functions: An Overview of Operation Modes
Brian Krebs Gets SWATted
Brig counsellor: Manning's history, behaviour outweighed doctor's opinion of self-harm risk
Bright(?) FUD, Heise bounty, Google thinks you are malware, Tom Liston sees his shadow, and more 
Brit upstart flogs cloudy SaaS to clipboard-waving bods
British car parks start reading number plates
British Minister likens Anonymous to fascists and racists
Broadcom Wireless Vulnerability 
Brocade Announces New Hardware, Software for Data Center Strategy
Brocade Gets Virtual Networking with Vyatta Acquisition
Brown Signs California Bill For Free Textbooks
Browser *does* matter, not only for vulnerabilities - a story on JavaScript deobfuscation 
Browser Bug of the Month Club 
Browser vendors rush to block fake google.com site cert
Browser Vulnerabilities (all browsers), MS04-030 and -032 POC exploit released 
Browzar, the privacy that may not be 
Bruce Perens: The Day I Blundered Into the Nuclear Facility
Brute force scanning against MS SQL server accounts; Are you paranoid enough? 
BSDCan 2013 Registration
BT: Olympics cyber attackers were amateurs
Btcd - a Bitcoind Alternative Written In Go!
Bugtraq: [ MDVSA-2012:086 ] acpid
Bugtraq: [SE-2011-01] Additional materials released for SAT TV research
Bugtraq: [SE-2012-01] An issue with new Java SE 7 security features
Bugtraq: [security bulletin] HPSBMU02785 SSRT100526 rev.1 - HP LoadRunner Running on Windows, Remote Execution of Arbitrary Code
Bugtraq: [security bulletin] HPSBMU02884 rev.1 - HP Service Manager and HP ServiceCenter, Cross Site Scripting (XSS) and Disclosure of Information
Bugtraq: [SECURITY] [DSA 2446-1] libpng security update
Bugtraq: [SECURITY] [DSA 2483-1] strongswan security update
Bugtraq: [SECURITY] [DSA 2550-2] asterisk regression update
Bugtraq: [SECURITY] [DSA 2554-1] iceape security update
Bugtraq: [SECURITY] [DSA 2670-1] wordpress security update
Bugtraq: [SECURITY] [DSA 2675-2] libxvmc regression update
Bugtraq: [TSI-ADV-1201] Path Traversal on Polycom Web Management Interface
Bugtraq: [TSI-ADV-1202] Polycom Web Management Interface O.S. Command Injection
Bugtraq: 0day full - Free Monthly Websites v2.0 - Multiple Web Vulnerabilities
Bugtraq: 11in1 CMS v1.2.1 - SQL Injection Vulnerabilities
Bugtraq: APPLE-SA-2012-08-20-1 Apple Remote Desktop 3.6.1
Bugtraq: b2ePMS 1.0 Authentication Bypass Vulnerability
Bugtraq: CA20130213-01: Security Notice for CA ControlMinder
Bugtraq: Cisco Security Advisory: Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability
Bugtraq: Cisco Security Advisory: Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability
Bugtraq: Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerabilities
Bugtraq: Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability
Bugtraq: CONFidence 2013 - Call for Papers - 28-29.05.2013 Krakow, Poland
Bugtraq: CORE-2013-0430 - Buffer overflow in Ubiquiti airCam RTSP service
Bugtraq: DEFCON London - DC4420 - June CFP - Lightning talks!!! - Tuesday 25th June 2013
Bugtraq: Drupal 7.14 <= Full Path Disclosure Vulnerability
Bugtraq: Drupal 7.14 <= Full Path Disclosure Vulnerability (Update)
Bugtraq: Elcom CMS - Community Manager Insecure File Upload Vulnerability - Security Advisory - SOS-12-008
Bugtraq: ESA-2012-013: RSA SecurID(r) Software Token Converter buffer overflow vulnerability
Bugtraq: ESA-2013-010: EMC AlphaStor Buffer Overflow Vulnerability
Bugtraq: Fortinet FortiMail 400 IBE - Multiple Web Vulnerabilities
Bugtraq: Free Monthly Websites v2.0 - Multiple Web Vulnerabilities
Bugtraq: Kaspersky Password Manager 5.0.0.164 - Software Filter Vulnerability
Bugtraq: Kohana Framework v2.3.3 - Directory Traversal Vulnerability
Bugtraq: Liferay users can assign themselves to organizations, leading to possible privilege escalation
Bugtraq: MitM-vulnerability in Palo Alto Networks GlobalProtect
Bugtraq: Multiple Vulnerabilities in D'Link DIR-600 and DIR-300 (rev B)
Bugtraq: My ROP mitigation
Bugtraq: NGS00241 Patch Notification: SysAid Helpdesk blind SQL injection
Bugtraq: NGS00254 Patch Notification: Apple Mac OS X Lion USB Hub Class Hub Descriptor Arbitrary Code Execution
Bugtraq: Open-Realty CMS 2.5.8 (2.x.x) <= Cross Site Request Forgery (CSRF) Vulnerability
Bugtraq: OpenSSL 1.0.1 Buffer Overflow Vulnerability
Bugtraq: Re: [#1298868584] Copy&paste from web browser considered dangerous
Bugtraq: Re: [Full-disclosure] XSS and SQL Injection Vulnerabilities in Jara
Bugtraq: Re: Drupal 7.14 <= Full Path Disclosure Vulnerability
Bugtraq: Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities
Bugtraq: Sonicwall Scrutinizer v9.5.2 - SQL Injection Vulnerability
Bugtraq: Sourcefire Defense Center - multiple vulnerabilities.
Bugtraq: Unauthenticated remote access to D-Link DCS cameras
Bugtraq: Universal Reader Filename Denial Of Service Vulnerability
Bugtraq: XSS in OSSEC wui 0.3
Building Babbage's Analytical Engine
Building New Materials With Light
Business Highlights
Business Intelligence Trends: ERP and Business Intelligence
Businesses urged to test updates after McAfee glitch
But it worked FINE in Dev!
Buyers Beware 
Buying American in Tehran: Apples, razors and Coke
By the Numbers: How Google Compute Engine Stacks Up To Amazon EC2
BYOD boon: Make identities part of the cloud OS
BYOD Security: Do You Really Need MDM?
CA BrightStor ARCserve Backup 11.5 remote vulnerability 
CA eTrust Antivirus [was] flagging lsass.e x e 
CA iGateway debug mode HTTP GET request bo vulnerability/exploit 
CA Leak Highlights Weakness in Net Security, Again
Cable Modem Hacker Convicted (March 2, 2012)
Cacti remote code and SQL injection vulnerability 
CAIDA Report on Blackworm 
California To License Self-Driving Cars
California Wants Genetically Modified Foods To Be Labelled
California's Unspoken Health Problem: Brain Parasites
Call 1-866-727-2338 for free virus and security-related support from Microsoft 
Call centers under attack in targeted cyber-blackmail scheme
Call for mandatory data breach notifications renewed
Call for packets TCP/UDP port 48318 
Call for some logs and/or packets for requests to a2billing/customer/templates/default/header.tpl
Call for Volunteers ; Red Cross Associated Sites ; Katrina Related Fraud Continues 
Caltech and UVic Set 339Gbps Internet Speed Record
Cameras leak credentials, live video
Can a New GPU Rejuvenate a 5 Year Old Gaming PC?
Can Anyone Become a Programmer?
Can Congress Protect the Nation's Critical Infrastructure?
Can Fotobar Make Polaroid Relevant Again?
Can Innovation Be Automated?
Can Legacy Dual-Core CPUs Drive Modern Graphics Cards?
Canada aware of second hacking attack, this time on energy firm
Canada aware of two cyber attacks, won't say if China involved
Canada Prepares For Crackdown On BitTorrent Movie Pirates
Canada Revenue Agency To Tax BitCoin Transactions
Canada's Supreme Court Tosses Viagra Patent For Vagueness
Canadian Court Rules You Have the Right To Google a Lawyer
Canadian government may block Huawei from its network
Canadian Government Scrapping Internet Predators Act
Canadian Researchers Debut PaperTab, the Paper-Thin Tablet
Canonical and China Announce Ubuntu Collaboration
Canonical Could Switch To Rolling Releases For Ubuntu 14.04 and Beyond
Carbon Dating Gets an Update
Card skimmers targeting more than ATMs, says EU
Careful with the seasonal attachments! 
Carnegie Mellon, NSA seek high school hackers
Carrier IQ Hopes to Allay Users' Privacy Concerns
Cash from the Cache; Port 32772 
Catch of the Day; Scripted mass hack; Not-so-black Tuesday ahead 
CC Theft Worries Manipulated; Unusual FrontPage Hack; War Spying/Viewing 
CCTV Hack Takes Casino For $33 Million
CDC Says 10,000 At Risk of Hantavirus In Yosemite Outbreak
CERN's LHC Powers Down For Two Years
CERTs warn about old java bug being exploited 
CES Ditches CNET After CBS Scandal Over Dish's Hopper
CGI Email Script Scanning Update, MS SQL Server scanning, Bagle Source Code Released, Comments on 802.11i 
CIA Director David Petraeus Resigns, Citing Affair
CICS communication history
Cingular wireless outage 
CIO Success Simplified in 3 Steps
Cisco 7920 Wireless IP Phone 
Cisco Advisories 
Cisco and iRobot Create Sheldonbot-Like Telepresence System
Cisco and Juniper - ISAKMP Protocol - Multiple Vulnerability Issues 
Cisco ASA SNMP Remote Code Execution Vulnerability
Cisco BGP DoS - Updates Galore! 
Cisco Cloud Web Security DNS Hijack
Cisco content switch SSL vulnerability 
Cisco Continues SDN Evolution With vCider Acquisition
Cisco EIGRP Vulnerability and VLAN spoofing issue 
Cisco Exits the Consumer Market, Sells Linksys To Belkin
Cisco IKE Resource Exhaustion Attack 
Cisco inadvertently weakens password encryption in its IOS operating system
Cisco Innovates to Provide More Nimble Network Security
Cisco introducing Cisco Security Notices 16 JAN 2013, (Tue, Jan 15th)
Cisco IOS - we are aware 
Cisco IOS / IOS XE security advisories
Cisco IOS DHCP vulnerability; Rumours about vulnerabilities in Win XP SP2 
Cisco IOS Firewall vulnerability update. 
Cisco IOS Interface Denial of Service Vulnerability 
Cisco IOS local privilege escalation 
Cisco IOS Security Advisory Bundle - http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html, (Thu, Sep 27th)
Cisco IOS Security Advisory 
Cisco Malformed IKE Packet Vulnerability 
Cisco MARS vulnerabilities 
Cisco PIX Issue 
Cisco PSIRT reporting Customers affected by ASA VPN DoS attacks
Cisco Response to OpenSSL Vulnerability 
Cisco Security Advisory: Default Password in Wireless Location Appliance 
Cisco sgbp DoS 
Cisco Telnet DoS Vulnerability / Suspicious GIF files being mailed? / Paranoia, the right dosage 
Cisco VP To Memo Leaker: Finding You Now 'My Hobby'
Cisco VPN 3000 crafted HTTP attack 
cisco vtp vulnerabilities 
Cisco Vulnerability in the VPN Client Software 
Cisco Wireless Access Point Vulnerability Announced 
Cisco, Apple, Netgear Offer Wireless Routers for Businesses on a Budget - Enterprise Networking - News & Reviews - eWeek.com
CISPA Cybersecurity Bill, Reborn: 6 Key Facts
Citadel takedown took down security researchers too
Citadel Trojan Moves from Crime to Espionage
Cities' Heat Can Affect Temperatures 1000+ Miles Away
Citrix Access Gateway Advanced Access Control remote and local vulnerability reported 
Citrix Merges Repeater Features With CloudBridge
ClamAV 0.87.1 released, fixes multiple security vulnerabilities 
ClamAV fixes multiple vulnerabilities 
ClamAV versions up to 0.88.3 DoS 
ClamAV vulnerability; Con-fu 
Clarifying Levels of PCI Compliance
Clashes over Internet rules to mark Dubai meeting
Classified Information Confetti
Clearwire to pull Huawei from network
CLICKbot 
Client-Side Exploits - The Mother Lode? 
Climate Contrarians Seek Leadership of House Science Committee
Climb a small mountain... 
Cloaking Technology Could Protect Offshore Rigs From Destructive Waves
Cloud Computing 101: What is it and how can you take advantage?
Cloud Computing Needs To Embrace the Linux Model, Says Rackspace CTO
Cloud in the Real World
Cloud is a Continuum
Cloud is the answer!
'Cloud' may open up new IT security problems
Cloud providers need to step up on security, say analysts
Cloud Relative Market Sizes
Cloud Security Measures Too Opaque For Customers
Cloud security: Four customers' approaches
Cloud service cracks VPN passwords in 24 hours
Cloud support brings WikiLeaks back online
Cloud wars
Cloud, BYOD Increases Need for Automated IAM Systems
Cloud-Economical Computing Model
Cloudy admin? Here's how to ward off Call of Duty-playing teens
'Clueless' boards risk lawsuits, threaten national security
Clueless users: 10 more tales of the absurd
CME was officially lauched 
CME-24 (again) 
CME-24 aka blackworm update 
CME-24 Analysis: The destruction does not appear to spread across Windows network shares 
CME-24: It Has Begun 
CNOOC, Nexen reapply for U.S. deal approval
Cockroaches Evolving To Avoid Roach Motels
Coffee and Intellectual Property
Cogent having problems... 
CoLinux - Cooperative Linux that runs in native mode on Windows
Collecting Logs from Security Devices at Home, (Sun, Dec 2nd)
Collecting Users Credentials from Locked Devices
Colocation Provider PRQ Raided; Wikileaks and Many Torrent Sites Offline
Color My Logs: Providing Context for Your Logs Using Our Data
Color Printing Reaches Its Ultimate Resolution
Color-Screen TI-84 Plus Calculator Leaked
Combating phishing for banks / Story of a former worm target / Disaster preparation 
Combined exploits of MS vulnerabilities, port 1981 increase 
Come fly with me**.....
Coming soon: Certification for mobile app developers
Command and Control Channels Using "AAAA" DNS Records
Comment: LinkedIn and its password problems
Comments on 0day 
Comments on Oracle Vulnerabilities, WinZip, MIT Kerberos, Seeking Wireless Compromise Stories, More Weak Password Hacks? 
Commercial cyberspying and theft gives rich payoff
Commercial cyberspying, theft promise rich payoff
Commercial enterprises are putting our critical infrastructure at risk
Compaction Process - Perfect way for optimization of free space in Outlook
Companies House website security 'a bit of a mess'
Companies slow to react to mobile security threat
Compaq Web Management, BJs Alerts of Possible Credit Card Theft 
Compliance isn't security, but companies still pretend it is, according to survey
Compromised Magento sites led to Neutrino exploit kit
Compromised Web Sites Infect Web Surfers 
CompSci boffins tout file encryption for Google Docs
Computerized elections, some thoughts 
Computing Difficulties in Business Spreadsheet Software: How to Overcome Them?
Confessions of a Spyware Author 
Congrats March's Top 10 New Members!
Congress halts posting of civilian, military officials' assets
Congress report warns: drones will track faces from the sky
Congress urged to probe Chinese cyber: espionage
Congressional Report: US Power Grid Highly Vulnerable To Cyberattack
Consensus gathering on log analysis and correlation in enterprise environment 
Considerations for modernizing your network
Consumer Reports: Free anti-malware software for Windows, Mac is effective
Contacting the ISC, good practices for response 
Continued great response to call for Volunteers 
Continued Sighting of Download.Ject; WiFi Security 
Continuous Monitoring for Random Strings
Continuous multi-exploit scanning / Sadmind exploit 
Converting RSS Feeds To a Dynamic 3D Scene In 120 Lines of Code
Coolwebsearch / Trafficadvance got a new home... 
Cooperation seen as crucial in facing U.S. cyber threats
Copies of anti-censorship software used in Iran and Syria contain keylogger
Cops cuff premium-rate SMS Android malware suspects
Copyright Claim Thwarts North Korean Propaganda
Corn Shortage Hampers US Ethanol Production
Corporate Espionage Made Easy with Spyware; Honeynet KYE: Phishing paper Published; Some New Vulnerabilities
Corrected: From the mailbag 
Corrupted Nyxems 
Costa Rica: Digital currency site founder arrested
Could Flying Cars Actually Be On Their Way?
Could New York City Cut Emissions 90% By 2050?
Councils spunk £515m in 4 years on CCTV
Couple ISC Site Updates 
Couple updates and reminders
Courion Access Insight Detects Data Security Risks at HCR ManorCare
Court: Aereo TV Rebroadcast Is Still Legal
Coverity and Wind River target development insecurity with new alliance
Craigslist Drops Exclusive License To Your Posts
Crap PINs give wallet thieves 1-in-11 jackpot shot
Cray Unveils XC30 Supercomputer
Create your own Job World Economic Forum thoughts
Creating a Bastioned Centralized Audit Server with GroundWork Open Source Log Monitoring for Event Signatures
Creationist Bets $10k In Proposed Literal Interpretation of Genesis Debate
Credit report breach has link to Zeus banking malware
Creeping Government Surveillance Now Without Warrants
Crims take to Facebook to flog ZeuS kits
Critical Cisco ASA IKEv2/v2 Vulnerability. Active Scanning Detected
Critical denial-of-service flaw in BIND software puts DNS servers at risk
Critical Firefox Update Today
Critical Flash Player Update APSB16-36
Critical flaw exposes Oracle database passwords
Critical Java SE update due Tuesday fixes 40 flaws
Critical Patch to the XP SP2 Firewall Released / New Linux 2.4 and 2.6 Kernel Exploits Released / The Virus Year in Review 
Critical Ruby on Rails security vulnerability 
Critical Security Controls: Getting to know the unknown
Critical security update: PHPMailer 5.2.18 (CVE-2016-10033)
Critical security vulnerability in WinZip 10 
Critical Vulnerabilities in Palo Alto Networks PAN-OS 
Critical vulnerability in IrfanView plugin
Critical vulnerability in Sophos Anti-Virus products 
Critical vulnerability in vBSEO patched
Critical Xen PV guests vulnerabilities
Crooks break into Casino CCTV systems to nab 33 Million
Cross platform virus PoC 
Crowdsourced Coders Take On Immunology Big Data
Cryptanalyst on British Postage Stamps
CryptoWall sent by Angler and Neutrino exploit kits or through malicious spam
CS Faculty and Students To Write a Creative Commons C++ Textbook
CSO Online E-Crime Survey Results 
CSO's Ultimate Guide to Social Engineering
CSOs warned of serious cyber-espionage attack
CSS Zen Garden Turns 10
CTO Says Al-Khabaz Expulsion Shows CS Departments Stuck In "Pre-Internet Era"
Curiosity Gearing Up for Drive to Next Study Location
Curiosity Rover Fires First Laser Beam At Martian Rock
Curious SNMP Traffic Spike
Custom Android ROM Developers Get OTA Update Capabilities Like Carriers
CVE-2006-7250 (openssl)
CVE-2007-6752 (drupal)
CVE-2007-6753 (windows_2000, windows_7, windows_server_2008, windows_vista, windows_xp)
CVE-2008-7309 (insoshi)
CVE-2008-7310 (spree)
CVE-2009-0693
CVE-2009-0693 (wyse_device_manager)
CVE-2009-0695
CVE-2009-0695 (wyse_device_manager)
CVE-2009-5030 (openjpeg)
CVE-2009-5031
CVE-2009-5031 (modsecurity)
CVE-2009-5112 (webglimpse)
CVE-2009-5113 (webglimpse)
CVE-2009-5114 (webglimpse)
CVE-2009-5128 (websense_v10000)
CVE-2009-5129 (websense_v10000)
CVE-2009-5130 (websense_email_security)
CVE-2009-5131 (websense_email_security)
CVE-2009-5132 (websense_web_filter, websense_web_security)
CVE-2010-2021
CVE-2010-2021 (global_redirect)
CVE-2010-4562 (windows_2000, windows_2003_server, windows_7, windows_server_2008, windows_vista,...)
CVE-2010-4563 (linux_kernel)
CVE-2010-4666
CVE-2010-4666 (libarchive)
CVE-2010-5063 (virtual_war)
CVE-2010-5064 (virtual_war)
CVE-2010-5065 (virtual_war)
CVE-2010-5066 (virtual_war)
CVE-2010-5067 (virtual_war)
CVE-2010-5086 (bitweaver)
CVE-2010-5097 (typo3)
CVE-2010-5098 (typo3)
CVE-2010-5099
CVE-2010-5099 (typo3)
CVE-2010-5100 (typo3)
CVE-2010-5137
CVE-2010-5137 (bitcoind, wxbitcoin)
CVE-2010-5138
CVE-2010-5138 (bitcoind, wxbitcoin)
CVE-2010-5139
CVE-2010-5139 (bitcoind, wxbitcoin)
CVE-2010-5140
CVE-2010-5140 (bitcoind, wxbitcoin)
CVE-2010-5141
CVE-2010-5141 (bitcoind, wxbitcoin)
CVE-2010-5189 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...)
CVE-2010-5190 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...)
CVE-2010-5191 (avos, proxyav)
CVE-2010-5192 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...)
CVE-2010-5279 (virtual_war)
CVE-2011-1162 (kernel)
CVE-2011-1385
CVE-2011-1385 (aix, vios)
CVE-2011-1390
CVE-2011-1390 (rational_clearquest)
CVE-2011-1394
CVE-2011-1394 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-1395
CVE-2011-1395 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-1396
CVE-2011-1396 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-1397
CVE-2011-1397 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-1473
CVE-2011-1473 (openssl)
CVE-2011-1759 (linux_kernel)
CVE-2011-1761
CVE-2011-1761 (libmodplug)
CVE-2011-1767 (linux_kernel)
CVE-2011-1768 (linux_kernel)
CVE-2011-1777
CVE-2011-1777 (libarchive)
CVE-2011-1778
CVE-2011-1778 (libarchive)
CVE-2011-1779
CVE-2011-1779 (libarchive)
CVE-2011-1923
CVE-2011-1927 (linux_kernel)
CVE-2011-2082
CVE-2011-2082 (rt)
CVE-2011-2083
CVE-2011-2083 (rt)
CVE-2011-2084
CVE-2011-2084 (rt)
CVE-2011-2085
CVE-2011-2085 (rt)
CVE-2011-2182 (linux_kernel)
CVE-2011-2183 (linux_kernel)
CVE-2011-2199
CVE-2011-2199 (tftp-hpa)
CVE-2011-2203 (kernel)
CVE-2011-2208 (linux_kernel)
CVE-2011-2209 (linux_kernel)
CVE-2011-2210 (linux_kernel)
CVE-2011-2211 (linux_kernel)
CVE-2011-2393 (freebsd, netbsd)
CVE-2011-2478
CVE-2011-2478 (sketchup)
CVE-2011-2502
CVE-2011-2503
CVE-2011-2512 (qemu-kvm)
CVE-2011-2527 (qemu)
CVE-2011-2545 (spa8000_8-port_ip_telephony_gateway, spa8000_8-port_ip_telephony_gateway_firmware...)
CVE-2011-2657
CVE-2011-2658
CVE-2011-2709 (libgssglue, libgssapi)
CVE-2011-2722 (linux_imaging_and_printing_project)
CVE-2011-2866 (itunes, webkit)
CVE-2011-2911
CVE-2011-2911 (libmodplug)
CVE-2011-2912
CVE-2011-2912 (libmodplug)
CVE-2011-2913
CVE-2011-2913 (libmodplug)
CVE-2011-2914
CVE-2011-2914 (libmodplug)
CVE-2011-2915
CVE-2011-2915 (libmodplug)
CVE-2011-3016 (chrome)
CVE-2011-3017 (chrome)
CVE-2011-3018 (chrome)
CVE-2011-3019 (chrome)
CVE-2011-3020 (chrome)
CVE-2011-3021 (chrome)
CVE-2011-3022 (chrome)
CVE-2011-3023 (chrome)
CVE-2011-3024 (chrome)
CVE-2011-3025 (chrome)
CVE-2011-3026 (chrome, libpng)
CVE-2011-3027 (chrome)
CVE-2011-3031
CVE-2011-3032
CVE-2011-3033
CVE-2011-3034
CVE-2011-3035
CVE-2011-3036
CVE-2011-3037
CVE-2011-3038
CVE-2011-3039
CVE-2011-3040
CVE-2011-3041
CVE-2011-3042
CVE-2011-3043
CVE-2011-3044
CVE-2011-3045 (chrome)
CVE-2011-3047 (chrome)
CVE-2011-3048
CVE-2011-3048 (libpng)
CVE-2011-3058 (chrome)
CVE-2011-3059 (chrome)
CVE-2011-3060 (chrome)
CVE-2011-3061 (chrome)
CVE-2011-3062 (chrome)
CVE-2011-3063 (chrome)
CVE-2011-3064 (chrome)
CVE-2011-3065 (chrome)
CVE-2011-3066
CVE-2011-3066 (chrome)
CVE-2011-3067
CVE-2011-3067 (chrome)
CVE-2011-3068
CVE-2011-3068 (chrome)
CVE-2011-3069
CVE-2011-3069 (chrome)
CVE-2011-3070
CVE-2011-3070 (chrome)
CVE-2011-3071
CVE-2011-3071 (chrome)
CVE-2011-3072
CVE-2011-3072 (chrome)
CVE-2011-3073
CVE-2011-3073 (chrome)
CVE-2011-3074
CVE-2011-3074 (chrome)
CVE-2011-3075
CVE-2011-3075 (chrome)
CVE-2011-3076
CVE-2011-3076 (chrome)
CVE-2011-3077
CVE-2011-3077 (chrome)
CVE-2011-3078 (chrome)
CVE-2011-3079 (chrome)
CVE-2011-3080 (chrome)
CVE-2011-3081 (chrome)
CVE-2011-3083
CVE-2011-3084
CVE-2011-3085
CVE-2011-3085 (chrome)
CVE-2011-3086
CVE-2011-3086 (chrome)
CVE-2011-3087
CVE-2011-3087 (chrome)
CVE-2011-3088
CVE-2011-3088 (chrome)
CVE-2011-3089
CVE-2011-3089 (chrome)
CVE-2011-3090
CVE-2011-3090 (chrome)
CVE-2011-3091
CVE-2011-3091 (chrome)
CVE-2011-3092
CVE-2011-3092 (chrome)
CVE-2011-3093
CVE-2011-3093 (chrome)
CVE-2011-3094
CVE-2011-3094 (chrome)
CVE-2011-3095
CVE-2011-3095 (chrome)
CVE-2011-3096
CVE-2011-3096 (chrome)
CVE-2011-3097
CVE-2011-3097 (chrome)
CVE-2011-3098
CVE-2011-3098 (chrome)
CVE-2011-3099
CVE-2011-3099 (chrome)
CVE-2011-3100
CVE-2011-3100 (chrome)
CVE-2011-3101
CVE-2011-3101 (chrome)
CVE-2011-3103 (chrome)
CVE-2011-3104 (chrome)
CVE-2011-3105 (chrome)
CVE-2011-3106 (chrome)
CVE-2011-3107 (chrome)
CVE-2011-3108 (chrome)
CVE-2011-3109 (chrome)
CVE-2011-3110 (chrome)
CVE-2011-3111 (chrome)
CVE-2011-3112 (chrome)
CVE-2011-3148
CVE-2011-3148 (linux-pam)
CVE-2011-3149
CVE-2011-3149 (linux-pam)
CVE-2011-3174
CVE-2011-3175
CVE-2011-3175 (zenworks_configuration_management)
CVE-2011-3176
CVE-2011-3176 (zenworks_configuration_management)
CVE-2011-3193 (pango, qt)
CVE-2011-3194 (qt)
CVE-2011-3361
CVE-2011-3361 (backuppc)
CVE-2011-3443 (safari)
CVE-2011-3444 (mac_os_x, mac_os_x_server)
CVE-2011-3446 (mac_os_x, mac_os_x_server)
CVE-2011-3447 (mac_os_x, mac_os_x_server)
CVE-2011-3448 (mac_os_x, mac_os_x_server)
CVE-2011-3449 (mac_os_x, mac_os_x_server)
CVE-2011-3450 (mac_os_x, mac_os_x_server)
CVE-2011-3452 (mac_os_x, mac_os_x_server)
CVE-2011-3453 (mac_os_x, mac_os_x_server)
CVE-2011-3457 (mac_os_x, mac_os_x_server)
CVE-2011-3458 (mac_os_x, mac_os_x_server)
CVE-2011-3459 (mac_os_x, mac_os_x_server)
CVE-2011-3460 (mac_os_x, mac_os_x_server)
CVE-2011-3462 (mac_os_x, mac_os_x_server)
CVE-2011-3463 (mac_os_x, mac_os_x_server)
CVE-2011-3464
CVE-2011-3562
CVE-2011-3626 (logsurfer, logsurfer+)
CVE-2011-3637 (linux_kernel)
CVE-2011-3671 (firefox, seamonkey, thunderbird)
CVE-2011-3829
CVE-2011-3829 (support_incident_tracker)
CVE-2011-3830
CVE-2011-3830 (support_incident_tracker)
CVE-2011-3831
CVE-2011-3831 (support_incident_tracker)
CVE-2011-3832
CVE-2011-3832 (support_incident_tracker)
CVE-2011-3833
CVE-2011-3833 (support_incident_tracker)
CVE-2011-3846 (system_management_homepage)
CVE-2011-3874 (android)
CVE-2011-4031 (ffmpeg)
CVE-2011-4042 (frontvue, pcvue, plantvue)
CVE-2011-4043 (frontvue, pcvue, plantvue)
CVE-2011-4044 (frontvue, pcvue, plantvue)
CVE-2011-4045 (frontvue, pcvue, plantvue)
CVE-2011-4077 (kernel)
CVE-2011-4097 (linux_kernel)
CVE-2011-4105
CVE-2011-4105 (lightdm)
CVE-2011-4110 (kernel)
CVE-2011-4112 (linux_kernel)
CVE-2011-4113
CVE-2011-4113 (views)
CVE-2011-4131 (linux_kernel)
CVE-2011-4132 (kernel)
CVE-2011-4133 (moodle)
CVE-2011-4185 (iprint)
CVE-2011-4186 (iprint)
CVE-2011-4187 (iprint)
CVE-2011-4188
CVE-2011-4188 (imanager)
CVE-2011-4189
CVE-2011-4189 (groupwise)
CVE-2011-4278 (moodle)
CVE-2011-4279 (moodle)
CVE-2011-4280 (moodle, spike_phpcoverage)
CVE-2011-4281 (moodle)
CVE-2011-4282 (moodle)
CVE-2011-4283 (moodle)
CVE-2011-4284 (moodle)
CVE-2011-4285 (moodle)
CVE-2011-4286 (moodle)
CVE-2011-4287 (moodle)
CVE-2011-4288 (moodle)
CVE-2011-4289 (moodle)
CVE-2011-4290 (moodle)
CVE-2011-4291 (moodle)
CVE-2011-4292 (moodle)
CVE-2011-4293 (moodle)
CVE-2011-4294 (moodle)
CVE-2011-4295 (moodle)
CVE-2011-4296 (moodle)
CVE-2011-4298 (moodle)
CVE-2011-4299 (moodle)
CVE-2011-4300 (moodle)
CVE-2011-4301 (moodle)
CVE-2011-4302 (moodle)
CVE-2011-4303 (moodle)
CVE-2011-4304 (moodle)
CVE-2011-4305 (moodle)
CVE-2011-4306 (moodle)
CVE-2011-4307 (moodle)
CVE-2011-4308 (moodle)
CVE-2011-4309 (moodle)
CVE-2011-4314 (jboss_enterprise_application_platform, kay_framework, openid4java)
CVE-2011-4320
CVE-2011-4320 (ejabberd)
CVE-2011-4325 (kernel)
CVE-2011-4326 (linux_kernel)
CVE-2011-4328 (gnash)
CVE-2011-4330 (kernel)
CVE-2011-4337
CVE-2011-4337 (support_incident_tracker)
CVE-2011-4358
CVE-2011-4408 (ubuntu_linux)
CVE-2011-4409 (ubuntu)
CVE-2011-4447
CVE-2011-4447 (bitcoind, wxbitcoin)
CVE-2011-4458
CVE-2011-4458 (rt)
CVE-2011-4459
CVE-2011-4459 (rt)
CVE-2011-4460
CVE-2011-4460 (rt)
CVE-2011-4486
CVE-2011-4487
CVE-2011-4535 (modbustagserver, scadaphone, turbopower_abbrevia)
CVE-2011-4594 (linux_kernel)
CVE-2011-4599 (international_components_for_unicode)
CVE-2011-4608 (jboss_enterprise_application_platform)
CVE-2011-4611 (linux_kernel)
CVE-2011-4614
CVE-2011-4614 (typo3)
CVE-2011-4621 (linux_kernel)
CVE-2011-4622 (kvm)
CVE-2011-4638 (webtitan)
CVE-2011-4639 (webtitan)
CVE-2011-4640 (webtitan)
CVE-2011-4816
CVE-2011-4816 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-4817
CVE-2011-4817 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-4818
CVE-2011-4818 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-4819
CVE-2011-4819 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-4871 (opcsystems.net)
CVE-2011-4874 (promotic)
CVE-2011-4880 (webmi2ads)
CVE-2011-4881 (webmi2ads)
CVE-2011-4882 (webmi2ads)
CVE-2011-4883 (webmi2ads)
CVE-2011-4898
CVE-2011-4898 (wordpress)
CVE-2011-4899
CVE-2011-4899 (wordpress)
CVE-2011-4923
CVE-2011-4923 (backuppc)
CVE-2011-4956 (wordpress)
CVE-2011-4957 (wordpress)
CVE-2011-4963
CVE-2011-5000 (openssh)
CVE-2011-5067
CVE-2011-5068
CVE-2011-5069
CVE-2011-5070
CVE-2011-5071
CVE-2011-5072
CVE-2011-5073
CVE-2011-5074
CVE-2011-5075
CVE-2011-5081
CVE-2011-5081 (backuppc)
CVE-2011-5082 (s2member)
CVE-2011-5083
CVE-2011-5083 (dotclear)
CVE-2011-5084
CVE-2011-5084 (movable_type)
CVE-2011-5084 (movable_type, movabletype)
CVE-2011-5085
CVE-2011-5085 (movable_type)
CVE-2011-5085 (movable_type, movabletype)
CVE-2011-5086 (unitronics_uniopc)
CVE-2011-5087 (trace_mode_data_center)
CVE-2011-5088
CVE-2011-5088 (bizviz, genesis32)
CVE-2011-5089
CVE-2011-5089 (genesis32, bizviz)
CVE-2011-5090
CVE-2011-5090 (grboard)
CVE-2011-5091
CVE-2011-5091 (grboard)
CVE-2011-5092
CVE-2011-5092 (rt)
CVE-2011-5093
CVE-2011-5093 (rt)
CVE-2011-5094
CVE-2011-5094 (network_security_services)
CVE-2011-5095
CVE-2011-5096 (aura_application_server_5300)
CVE-2011-5124 (proxyone, proxysg)
CVE-2012-0002
CVE-2012-0002 (remote_desktop_protocol, windows_7, windows_server_2003, windows_server_2008, win...)
CVE-2012-0006
CVE-2012-0006 (windows_server_2003, windows_server_2008)
CVE-2012-0008
CVE-2012-0008 (visual_studio)
CVE-2012-0016
CVE-2012-0016 (expression_design)
CVE-2012-0018
CVE-2012-0018 (visio_viewer)
CVE-2012-0036
CVE-2012-0036 (curl, libcurl)
CVE-2012-0037
CVE-2012-0038 (linux_kernel)
CVE-2012-0041 (wireshark)
CVE-2012-0042 (wireshark)
CVE-2012-0043 (wireshark)
CVE-2012-0044 (linux_kernel)
CVE-2012-0047 (wicket)
CVE-2012-0054
CVE-2012-0054 (golismero)
CVE-2012-0058 (linux_kernel)
CVE-2012-0060 (rpm)
CVE-2012-0061 (rpm)
CVE-2012-0066 (wireshark)
CVE-2012-0121
CVE-2012-0121 (data_protector_express)
CVE-2012-0122
CVE-2012-0122 (data_protector_express)
CVE-2012-0123
CVE-2012-0123 (data_protector_express)
CVE-2012-0124
CVE-2012-0124 (data_protector_express)
CVE-2012-0125 (hp-ux)
CVE-2012-0126 (hp-ux)
CVE-2012-0127
CVE-2012-0127 (performance_manager)
CVE-2012-0128 (onboard_administrator)
CVE-2012-0129 (onboard_administrator)
CVE-2012-0130 (onboard_administrator)
CVE-2012-0133 (procurve_switch_5400zl, procurve_switch_5400zl_management_module, procurve_switch...)
CVE-2012-0134
CVE-2012-0135 (system_management_homepage)
CVE-2012-0141
CVE-2012-0141 (excel, excel_viewer, office, office_compatibility_pack)
CVE-2012-0142
CVE-2012-0142 (excel, excel_viewer, office, office_compatibility_pack)
CVE-2012-0143
CVE-2012-0143 (excel, office)
CVE-2012-0146
CVE-2012-0146 (forefront_unified_access_gateway)
CVE-2012-0147
CVE-2012-0147 (forefront_unified_access_gateway)
CVE-2012-0151
CVE-2012-0151 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0152
CVE-2012-0152 (remote_desktop_protocol, windows_7, windows_server_2008)
CVE-2012-0156
CVE-2012-0156 (windows_7, windows_server_2008, windows_vista)
CVE-2012-0157
CVE-2012-0157 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0158
CVE-2012-0158 (office, office_web_components, sql_server, biztalk_server, commerce_server, visua...)
CVE-2012-0159
CVE-2012-0159 (office, windows_7, windows_8, windows_server_2008, windows_vista, windows_xp, sil...)
CVE-2012-0160
CVE-2012-0160 (.net_framework)
CVE-2012-0161
CVE-2012-0161 (.net_framework)
CVE-2012-0162
CVE-2012-0162 (.net_framework)
CVE-2012-0163
CVE-2012-0163 (.net_framework)
CVE-2012-0164
CVE-2012-0164 (.net_framework)
CVE-2012-0165
CVE-2012-0165 (office, windows_server_2008, windows_vista)
CVE-2012-0167
CVE-2012-0167 (office)
CVE-2012-0168
CVE-2012-0168 (ie)
CVE-2012-0169
CVE-2012-0169 (ie)
CVE-2012-0170
CVE-2012-0170 (ie)
CVE-2012-0171
CVE-2012-0171 (ie)
CVE-2012-0172
CVE-2012-0172 (ie)
CVE-2012-0173
CVE-2012-0173 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0174
CVE-2012-0174 (windows_7, windows_server_2008, windows_vista)
CVE-2012-0175
CVE-2012-0175 (windows_2003_server, windows_7, windows_server_2003, windows_server_2008, windows...)
CVE-2012-0176
CVE-2012-0176 (silverlight)
CVE-2012-0177
CVE-2012-0177 (office, works, works_6-9_file_converter)
CVE-2012-0178
CVE-2012-0179
CVE-2012-0179 (windows_7, windows_server_2008)
CVE-2012-0180
CVE-2012-0180 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0181
CVE-2012-0181 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0183
CVE-2012-0183 (office, office_compatibility_pack, word)
CVE-2012-0184
CVE-2012-0184 (excel, excel_viewer, office, office_compatibility_pack)
CVE-2012-0185
CVE-2012-0185 (excel, excel_viewer, office_compatibility_pack)
CVE-2012-0195
CVE-2012-0195 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2012-0201 (personal_communications)
CVE-2012-0206
CVE-2012-0206 (powerdns)
CVE-2012-0207 (linux_kernel)
CVE-2012-0210 (devscripts)
CVE-2012-0211 (devscripts)
CVE-2012-0212 (devscripts)
CVE-2012-0215
CVE-2012-0215 (trytond)
CVE-2012-0216
CVE-2012-0216 (apache2)
CVE-2012-0217
CVE-2012-0217 (windows_7, windows_server_2003, windows_server_2008, windows_xp)
CVE-2012-0220
CVE-2012-0220 (ikiwiki)
CVE-2012-0221
CVE-2012-0221 (factorytalk, rslogix_5000)
CVE-2012-0222
CVE-2012-0222 (factorytalk, rslogix_5000)
CVE-2012-0223 (termis)