Automatically Documenting Network Connections From New Devices Connected to Home Networks, (Mon, Mar 16th)
This is a guest diary submitted by Xavier Mertens . Writing documentation is a pain for most of us but… mandatory! Pentesters and auditors dont like to write their reports once the funny stuff has been completed.
This video demonstrates how to easily create a custom chart using the chart builder tool in FortiAnalyzer OS v5.0.4. Video also shows how to create a custom …
This video demonstrates how to copy a report template (with all its char.
“The Energy Department's top auditor this month said the Obama administration should look to shrink, close or take other steps to reduce costs at the 16 DOE national laboratories, the Center for Public Integrity reported on Wednesday. No particular facility became a target for potential shutdown in the advice issued by DOE Inspector General Gregory Friedman
“Microsoft has confirmed that a number of Xbox Live accounts of their current and former employees have been compromised by attackers using “several stringed social engineering techniques”, but has denied that it stores or in any way utilizes users' Social Security Numbers, The Verge reports.
“The danger Hurricane Sandy posed to nuclear power plants along the East Coast highlights some of the same vulnerabilities that terrorists looking to release harmful radiation into the environment could exploit, watchdog groups said this week. The unprecedented storm posed two main challenges to atomic energy facilities: rising water levels and interruptions to the electricity grid.
“The United States has declared WikiLeaks and its founder Julian Assange to be an “enemy,” an Australian newspaper reported Wednesday. The Sydney Morning Herald, which has been reporting for months on behind-the-scenes government communications about Assange, wrote that declassified Air Force documents showed that military employees found to have been in contact with WikiLeaks personnel could be charged with “communicating with the enemy.”The maximum punishment for communicating with the enemy is death.
“Under the Cybercrime Legislation Amendment Bill 2011 passed in the Australian Parliament this week, new laws enable the law enforcement authority in Australia to compel Internet Service Providers and Telecommunication Carriers to “collect, monitor and retain” internet records of users. While laws allowing more serious incursion into privacy have been postponed passage until after next year's election, civil activists questioned the haste to pass legislation before public and parliamentary debate and commented that the bill's passage “reflects an international trend towards the enactment of harmonised laws to the detriment of national sovereignty.”…”
“There has already been some Twitter buzz around this even though we have not announced it publicly yet, indeed, some of you have already noticed it:We have introduced behavioural information in our reports. The idea behind this is that the samples submitted to VirusTotal get executed automatically in a controlled (sandboxed) environment and the actions performed are recorded in order to give the analyst a high level overview of what the sample is doing.