Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in WinRAR, which can be exploited by malicious people to compromise a user's system.
261971cc390f0be498350656d91664e1b6b7b58dc9e974ceb40de472ee5d4cae
Secunia Security Advisory - Erika Mendoza has reported a vulnerability in CA iGateway, which can be exploited by malicious people to compromise a vulnerable system.
4413c9e043dcef6beee0f38449da194f4ebc3b0294c9181b0c2c5976b16debcb
Secunia Security Advisory - Ulf Harnhammar has reported a vulnerability in xine-lib, which potentially can be exploited by malicious people to compromise a user's system.
fecd5f2386b4fb51b7b5fd26e1920e21a471aba144a2896b395cddc3d536926b
Secunia Security Advisory - A vulnerability has been reported in xli, which potentially can be exploited by malicious people to compromise a user's system.
3abd717968f8cafe6c146f29f55bf70ff28bf279e12a2e3d9d5742b1f9d34ffa
Secunia Security Advisory - mazahaquer has reported a vulnerability in OpenVMPS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service), or compromise a vulnerable system.
22e1b707ba1a41b024fcba247baa3ea2a4f85a76f97b674b6a0e39c84c1ca51a
Secunia Security Advisory - Debian has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.
67837269728525dc9626c6204db8a97c1653063823001b4e3518487a85b71e09
Secunia Security Advisory - A vulnerability has been reported in Kaspersky Anti-Virus, which can be exploited by malicious people to cause a DoS (Denial of Service), or compromise a vulnerable system.
8144b460e50bf1e444d1307d217542b1b1e2902910bc200d7c0a067b59229f99
Secunia Security Advisory - Sun Microsystems has acknowledged a security issue in Sun JDS (Java Desktop System) which potentially can be exploited by malicious, local users to gain escalated privileges.
4b8e553ca317ed08e333da2f1e0f424b34348f19749291fcfd11a652f860b45a
Secunia Security Advisory - Hamed Bazargani has discovered a vulnerability in PHP Advanced Transfer Manager, which can be exploited by malicious people to conduct script insertion attacks.
98c1ce64641ea3e18449f4063acfe883c4f65799c340f7de9a836dc88770ac15
Secunia Security Advisory - Maksymilian Arciemowicz has discovered a vulnerability in phpMyAdmin, which can be exploited by malicious people to disclose sensitive information.
e5d7a58356788cfd293ebc6e4e628211072879661d73ab8d5e026338264e32ba
Secunia Security Advisory - 24 vulnerabilities and security issues have been reported in WebLogic Server and WebLogic Express, where the most critical ones potentially can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting and HTTP request smuggling attacks, cause a DoS (Denial of Service), and bypass certain security restrictions.
c87a14500e69386bb7a1c242318feec7e8c235f3f3470a3ce6321c5f230445fb
Secunia Security Advisory - Debian has issued an update for xli. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
f0d2f683fc7088b0eb535d1c1155353bfbe6d9792cb0f9667463262b467369c1
Secunia Security Advisory - Debian has issued an update for xloadimage. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
387a537c1333f5af2b3ad3ef3fcea9d8d6ec799ce02b30616bce4b663fdd598a
Secunia Security Advisory - Ubuntu has issued an update for cfengine. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
1ce5469b00a349fbd84c137463f4b7aa4a3a737b92ffe16ea28437ebcc9573fb
Secunia Security Advisory - Fedora has issued an update for xloadimage. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
ea5954dc54db9e637d467e58ae0a8b404892c4b6dcea760ebc9ef33023b1e3cb
Secunia Security Advisory - A vulnerability has been reported in F-Secure Anti-Virus for Linux, which can be exploited by malicious people to cause a DoS, or compromise a vulnerable system.
42406679ee4cb197820d3bf083d9b96b46e2381d903def8a1529d97ca4a1d0ac
Secunia Security Advisory - A vulnerability has been reported in KOffice, which can be exploited by malicious people to compromise a user's system.
dd93194fb53bf1b198ab7504cc71b92e73ac10157bf2ddf256fc6b1bbc1c5669
Secunia Security Advisory - FreeBSD has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions.
95a826578e926f2bf84a36b74d5c435e92a4ced466759f0ed998baf83afd6b57
Secunia Security Advisory - Debian has issued an update for uw-imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.
ed91aa60d41f8fd6239eb3601996102061615aca6e233e55fad475e3c63aaf0b
Secunia Security Advisory - A vulnerability has been reported in OpenSSL, which potentially can be exploited by malicious people to bypass certain security restrictions.
37a959a580948e39df7b54127c719707d4923a8e31529d010a82875894219eac
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.
fe4705414756fd578f3d35133eedcb4c1b83ab545fac366fb928dfbef622ed5c
Conference Graphic
30455302912fd9fd34f096a73e5b327de00c55efdf0b55caf0b6489354520f49
Mobile Malware - How exactly do mobile viruses work? We'll have a look at their code and discuss what factors affect their spreading speeds. Virus writers have always been trying to attack new platforms. What draws them now towards the mobile phone? Are phones as a platform simply widespread enough, or is the possibility of making easy money via phone billing systems driving this development? Where are we now and what can we expect to see in the Mobile Malware of the future?
56afb490432ed145ebbbbf494d1700304dc665d4538170e570097ca10dab2e42
Nematodes (Beneficial Worms) - This presentation presents concepts for taking expoitation frameworks into the next evolution: solving complex security problems by generating robustly controllable beneficial worms. The Why, How, and What of Nematode creation are discussed, along with some concepts in Mesh routing. Problems discussed include legal issues, controlling your worm, writing an intermediate language, the Nematode Intermediate Language (NIL) for writing robust worms, reliability problems, commications protocols, and future work.
446fdad6f1cbb3d6964e71c5e4b8c7eeb406f2582978a27b2314f9e084849e8d
STIFWare Evolution - Meder and Fyodor have been working on their concept of common framework to unify offensive part of heterogeneous security data and security tools into a single unit - security tools framework. The presentation deals with the evolution of STIF framework into what they call now STIF-ware - a set of STIF relevant modules that would allow the computer security hobbists to build, control and monitor the distributed network of automated hacking agents, guided by set of goals and targets, assigned to the system.
44117ca91c39d4c41ac5c5a1d266ffce5d633d4eb8ddac4389eee2d5417e9085