NEW YEAR 2011 |
2000-01-01 | Manuel Humberto Santander Pelaez | Happy New Year 2011!!! |
NEW |
2014-08-22/a> | Richard Porter | PHP 5.5.16 is available http://www.php.net/ChangeLog-5.php#5.5.16 |
2014-08-22/a> | Richard Porter | PHP 5.4.32 Released http://www.php.net/ChangeLog-5.php#5.4.32 |
2013-12-05/a> | Alex Stanford | Dec OUCH! is out - "Securing Your New Tablet". Download & share with family/friends. www.securingthehuman.org/ouch |
2013-05-07/a> | Adam Swanger | May 2013 OUCH! - Strong Passwords: Passphrases, Using Passwords Securely http://www.securingthehuman.org/resources/newsletters/ouch/2013#May2013 |
2013-04-04/a> | Adam Swanger | April 2013 OUCH! - Protecting Your Kids Online http://www.securingthehuman.org/resources/newsletters/ouch/2013#april2013 |
2013-03-06/a> | Adam Swanger | March 2013 OUCH! - Social Networking Safely http://www.securingthehuman.org/resources/newsletters/ouch/2013#march2013 |
2013-02-06/a> | Adam Swanger | February 2013 OUCH! - Email Phishing Attacks http://www.securingthehuman.org/resources/newsletters/ouch/2013#february2013 |
2013-01-10/a> | Adam Swanger | January 2013 OUCH! - Dangers of Java http://www.securingthehuman.org/resources/newsletters/ouch/2013#january2013 |
2012-12-13/a> | Adam Swanger | December 2012 OUCH! - Seven Steps to a Secure Computer http://www.securingthehuman.org/resources/newsletters/ouch/2012#december2012 |
2012-11-14/a> | Adam Swanger | November 2012 OUCH! - Two-Factor Authentication http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-10-03/a> | Adam Swanger | October 2012 OUCH! - Losing Your Mobile Device http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-09-12/a> | Adam Swanger | September 2012 OUCH! - Hacked: Now What? http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-08-09/a> | Adam Swanger | August 2012 OUCH! - Counterfeit Websites http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-07-11/a> | Adam Swanger | July 2012 OUCH! - The Tech-Support Phone Call Scam http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-06-07/a> | Adam Swanger | June 2012 OUCH! - Using The Cloud Safely http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-05-03/a> | Adam Swanger | May 2012 OUCH! - Safely Disposing of Your Mobile Device - http://bit.ly/ja6TMH |
2012-04-05/a> | Adam Swanger | April 2012 OUCH! - Metadata http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-03-08/a> | Adam Swanger | March 2012 OUCH! - The Dos and Don'ts of Email http://bit.ly/ja6TMH |
2012-02-09/a> | Adam Swanger | February 2012 OUCH! - Securing Your Mobile Device Apps http://www.securingthehuman.org/resources/newsletters/ouch#2012 |
2012-01-13/a> | Adam Swanger | January 2012 OUCH! released - This month we focus on how to secure home Wi-Fi networks, now in German also! http://bit.ly/ja6TMH |
2011-06-15/a> | Johannes Ullrich | Latest issue of "Ouch!" is out http://www.securingthehuman.org/resources/newsletters/ouch |
2000-01-01/a> | Manuel Humberto Santander Pelaez | Happy New Year 2011!!! |
YEAR |
2000-01-01/a> | Manuel Humberto Santander Pelaez | Happy New Year 2011!!! |
2011 |
2012-01-12/a> | Rob VandenBrink | PHP 5.39 was release on the 10th, amongst other things, it addresses CVE-2011-4885 (prevents attacks based on hash collisions) and CVE-2011-4566 (integer overflow when parsing invalid exif header) |
2011-10-29/a> | Richard Porter | The Sub Critical Control? Evidence Collection |
2011-10-28/a> | Daniel Wesemann | Critical Control 20: Security Skills Assessment and Training to fill Gaps |
2011-10-28/a> | Russ McRee | Critical Control 19: Data Recovery Capability |
2011-10-27/a> | Mark Baggett | Critical Control 18: Incident Response Capabilities |
2011-10-26/a> | Rick Wanner | Critical Control 17:Penetration Tests and Red Team Exercises |
2011-10-17/a> | Rob VandenBrink | Critical Control 11: Account Monitoring and Control |
2011-10-13/a> | Guy Bruneau | Critical Control 10: Continuous Vulnerability Assessment and Remediation |
2011-10-12/a> | Kevin Shortt | Critical Control 8 - Controlled Use of Administrative Privileges |
2011-10-11/a> | Swa Frantzen | Critical Control 7 - Application Software Security |
2011-10-10/a> | Jim Clausing | Critical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs |
2011-10-07/a> | Mark Hofman | Critical Control 5 - Boundary Defence |
2011-10-06/a> | Rob VandenBrink | Apache HTTP Server mod_proxy reverse proxy issue |
2011-10-04/a> | Rob VandenBrink | Critical Control 2 - Inventory of Authorized and Unauthorized Software |
2011-10-04/a> | Johannes Ullrich | Critical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers |
2011-10-03/a> | Mark Hofman | Critical Control 1 - Inventory of Authorized and Unauthorized Devices |
2011-10-03/a> | Mark Baggett | What are the 20 Critical Controls? |
2011-10-03/a> | Tom Liston | Security 101 : Security Basics in 140 Characters Or Less |
2011-10-02/a> | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Introduction to the controls |
2011-10-02/a> | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Schedule |
2011-09-21/a> | Mark Hofman | October 2011 Cyber Security Awareness Month |
2011-02-23/a> | Manuel Humberto Santander Pelaez | Bind DOS vulnerability (CVE-2011-0414) |
2011-01-03/a> | Johannes Ullrich | What Will Matter in 2011 |
2000-01-01/a> | Manuel Humberto Santander Pelaez | Happy New Year 2011!!! |