Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: Diaries by Keyword - SANS Internet Storm Center Diaries by Keyword

Participate: Learn more about our honeypot network
https://isc.sans.edu/honeypot.html

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

NEW YEAR 2011

2000-01-01Manuel Humberto Santander PelaezHappy New Year 2011!!!

NEW

2014-08-22/a>Richard PorterPHP 5.4.32 Released http://www.php.net/ChangeLog-5.php#5.4.32
2014-08-22/a>Richard PorterPHP 5.5.16 is available http://www.php.net/ChangeLog-5.php#5.5.16
2013-12-05/a>Alex StanfordDec OUCH! is out - "Securing Your New Tablet". Download & share with family/friends. www.securingthehuman.org/ouch
2013-05-07/a>Adam SwangerMay 2013 OUCH! - Strong Passwords: Passphrases, Using Passwords Securely http://www.securingthehuman.org/resources/newsletters/ouch/2013#May2013
2013-04-04/a>Adam SwangerApril 2013 OUCH! - Protecting Your Kids Online http://www.securingthehuman.org/resources/newsletters/ouch/2013#april2013
2013-03-06/a>Adam SwangerMarch 2013 OUCH! - Social Networking Safely http://www.securingthehuman.org/resources/newsletters/ouch/2013#march2013
2013-02-06/a>Adam SwangerFebruary 2013 OUCH! - Email Phishing Attacks http://www.securingthehuman.org/resources/newsletters/ouch/2013#february2013
2013-01-10/a>Adam SwangerJanuary 2013 OUCH! - Dangers of Java http://www.securingthehuman.org/resources/newsletters/ouch/2013#january2013
2012-12-13/a>Adam SwangerDecember 2012 OUCH! - Seven Steps to a Secure Computer http://www.securingthehuman.org/resources/newsletters/ouch/2012#december2012
2012-11-14/a>Adam SwangerNovember 2012 OUCH! - Two-Factor Authentication http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-10-03/a>Adam SwangerOctober 2012 OUCH! - Losing Your Mobile Device http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-09-12/a>Adam SwangerSeptember 2012 OUCH! - Hacked: Now What? http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-08-09/a>Adam SwangerAugust 2012 OUCH! - Counterfeit Websites http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-07-11/a>Adam SwangerJuly 2012 OUCH! - The Tech-Support Phone Call Scam http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-06-07/a>Adam SwangerJune 2012 OUCH! - Using The Cloud Safely http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-05-03/a>Adam SwangerMay 2012 OUCH! - Safely Disposing of Your Mobile Device - http://bit.ly/ja6TMH
2012-04-05/a>Adam SwangerApril 2012 OUCH! - Metadata http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-03-08/a>Adam SwangerMarch 2012 OUCH! - The Dos and Don'ts of Email http://bit.ly/ja6TMH
2012-02-09/a>Adam SwangerFebruary 2012 OUCH! - Securing Your Mobile Device Apps http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-01-13/a>Adam SwangerJanuary 2012 OUCH! released - This month we focus on how to secure home Wi-Fi networks, now in German also! http://bit.ly/ja6TMH
2011-06-15/a>Johannes UllrichLatest issue of "Ouch!" is out http://www.securingthehuman.org/resources/newsletters/ouch
2000-01-01/a>Manuel Humberto Santander PelaezHappy New Year 2011!!!

YEAR

2000-01-01/a>Manuel Humberto Santander PelaezHappy New Year 2011!!!

2011

2012-01-12/a>Rob VandenBrinkPHP 5.39 was release on the 10th, amongst other things, it addresses CVE-2011-4885 (prevents attacks based on hash collisions) and CVE-2011-4566 (integer overflow when parsing invalid exif header)
2011-10-29/a>Richard PorterThe Sub Critical Control? Evidence Collection
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-28/a>Daniel WesemannCritical Control 20: Security Skills Assessment and Training to fill Gaps
2011-10-27/a>Mark BaggettCritical Control 18: Incident Response Capabilities
2011-10-26/a>Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-13/a>Guy BruneauCritical Control 10: Continuous Vulnerability Assessment and Remediation
2011-10-12/a>Kevin ShorttCritical Control 8 - Controlled Use of Administrative Privileges
2011-10-11/a>Swa FrantzenCritical Control 7 - Application Software Security
2011-10-10/a>Jim ClausingCritical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs
2011-10-07/a>Mark HofmanCritical Control 5 - Boundary Defence
2011-10-06/a>Rob VandenBrinkApache HTTP Server mod_proxy reverse proxy issue
2011-10-04/a>Rob VandenBrinkCritical Control 2 - Inventory of Authorized and Unauthorized Software
2011-10-04/a>Johannes UllrichCritical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
2011-10-03/a>Mark HofmanCritical Control 1 - Inventory of Authorized and Unauthorized Devices
2011-10-03/a>Mark BaggettWhat are the 20 Critical Controls?
2011-10-03/a>Tom ListonSecurity 101 : Security Basics in 140 Characters Or Less
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Schedule
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Introduction to the controls
2011-09-21/a>Mark HofmanOctober 2011 Cyber Security Awareness Month
2011-02-23/a>Manuel Humberto Santander PelaezBind DOS vulnerability (CVE-2011-0414)
2011-01-03/a>Johannes UllrichWhat Will Matter in 2011
2000-01-01/a>Manuel Humberto Santander PelaezHappy New Year 2011!!!