|
|
|
Risky Business 344 -- Super Mario Cisco adventures |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Risky Business 344 -- Super Mario Cisco adventures Par Risky BusinessLe [2014-11-07] à 07:18:40
Présentation : Tagline Influx of VMs could mean an influx of network equipment bugs... Media URL http media.risky.biz RB344.mp3Content HeadersContent Length 33104330 Content Type audio mpeg On this week's show we're chatting with Alec Stuart Muirk about some of his research into Cisco appliance security. That interview is not so much a blow by blow of the bugs he found, which were pretty devastating by the way, but more about how accessibility is a major hurdle when researching various bits of kit. As you'll hear, many security vendors are starting to release their kit as VMs, which means researchers will be more likely to poke at them. Does that mean more boneheaded bugs like the stuff he found Well, probably. read more
Les mots clés de la revue de presse pour cet article : cisco Les videos sur SecuObs pour les mots clés : cisco Les éléments de la revue Twitter pour les mots clé : cisco
Les derniers articles du site "Risky Business" :
- Risky Business 408 -- Advertising ecosystem security with Dan Kaminsky, news with Grugq - Risky Business 407 -- Guests HD Moore, Dan Kaminsky, Grugq and Space Rogue - Risky Business 406 -- Making a killing from bug bounty programs - Risky Business 405 -- Doxing Africa's W2 scammers, FBiOS and more - Risky Business 403 -- Inside Islamic State's doc leak - Risky Business 402 -- Why are infosec companies tanking on the NASDAQ - Risky Business 401 -- Deserialisation attacks are kind of a big deal - Risky Business 400 -- FBiOS with Adam PLUS guest Daniel Hodson - Risky Business 399 -- Apple vs the Government of the United States - Risky Business 398 -- Professor Lawrence Gordon, jcran and more
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|