SECURITY NEWS

SB14-167: Vulnerability Summary for the Week of June 9, 2014

  • Selasa, 22 Jul 2014
  • Penulis: US-CERT

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology [http://www.nist.gov ] (NIST) National Vulnerability Database [http://nvd.nist.gov ] (NVD) in the past week.

Selengkapnya

Apple Releases Security Updates for OS X, Safari, iOS devices, and Apple TV

  • Selasa, 22 Jul 2014
  • Penulis: US-CERT

Apple has released security updates for Mac OS X, Safari, iOS devices, and Apple TV to address multiple vulnerabilities, some of which could allow attackers to execute arbitrary code with system privileges or cause an unexpected application termination.

Selengkapnya

SB14-195: Vulnerability Summary for the Week of July 7, 2014

  • Kamis, 17 Jul 2014
  • Penulis: US-CERT

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology [ http://www.nist.gov ] (NIST) National Vulnerability Database [ http://nvd.nist.gov ] (NVD) in the past week.

Selengkapnya

Cisco Releases Security Advisory for Unified Communications Domain Manager

  • Kamis, 10 Jul 2014
  • Penulis: US-CERT

Cisco has released a security advisory to address multiple vulnerabilities in Cisco Unified Communications Domain Manager, some of which may allow an attacker to execute arbitrary commands or obtain privileged access to the affected system...

Selengkapnya

Squiggly lines may be the future of password security

  • Selasa, 08 Jul 2014
  • Penulis: Michael Sherman

As more people use smart phones or tablets to pay bills, make purchases, store personal information, and even control access to their houses, the need for robust password security has become more critical than ever...

Selengkapnya

Is Facelock the password alternative we’ve been waiting for?

  • Selasa, 08 Jul 2014
  • Penulis: Philip Branch

One of the problems with using passwords to prove identity is that passwords that are easy to remember are also easy for an attacker to guess, and vice versa...

Selengkapnya

Attack on Dailymotion redirected visitors to exploits

  • Senin, 07 Jul 2014
  • Penulis: Lucian Constantin

IDG News Service - Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware...

Selengkapnya

Testing and Research with BlackArch Linux

  • Kamis, 03 Jul 2014
  • Penulis: Russ McRee , Microsoft

To that end we'll focus on BlackArch Linux, a lightweight expansion to Arch Linux for penetration testers and security researchers. I was not familiar with Arch Linux prior to discovering BlackArch but found myself immediately intrigued by the declarations of its being lightweight, flexible, simple, and minimalist; worthy goals all...

Selengkapnya

EDSC 2014 Call For Papers

  • Kamis, 03 Jul 2014
  • Penulis: edsconf.com via Packet Storm

EDSC is an annual security conference focusing on embedded systems, hardware, and anything behind the silicon curtain. Embedded systems testing is a rapidly expanding area of the security industry and staying current is important for engineers, researchers, and testers alike. EDSC brings the top thought leaders in the embedded security field together for two days to share knowledge, techniques, and research...

Selengkapnya

VMware Patches ESXi Against OpenSSL Flaw, But Many Other Products Still Vulnerable

  • Kamis, 03 Jul 2014
  • Penulis: Dennis Fisher, Treatpost

VMware has released an advisory confirming that a long list of its products are vulnerable to the latest OpenSSL bugs...

Selengkapnya

Pemantauan Trafik Internet Nasional

Laporan pemantauan trafik internet nasional dengan menampilkan laporan trafik mingguan, trafik bulanan dan trafik tahunan.

Peringatan Ancaman Keamanan & Kerentanan Sistem

Kumpulan arikel tentang peringatan dini ancaman keamanan dan kerentanan sistem.

Berita Keamanan Siber

Kumpulan berita tentang keamanan siber atau IT.

Laporan Hasil Monitoring

Laporan Hasil Monitoring Keamanan Siber Nasional yang dilakukan oleh BSSN meliputi Laporan Bulanan dan Laporan Tahunan.