Website “WeKnowYourHouse.com” Threats Your Privacy and Safety

/
A new website known as WeKnowYourHouse.com combinations tweets by users who write about being home and sifts through those posts to find ones that also include the users' location data. Having those two pieces of information, which are publicly available, the site also incorporates Google Streetview to post an image of the person's home.

Fast analysis of large pcap files with CapLoader

/
Are you working with large pcap files and need to see the “whole picture” while still being able to quickly drill down to individual packets for a TCP or UDP flow? Then this is your lucky day, since we at Netresec are releasing our new tool CapLoader today!

A Review of CEH Certified Ethical Hacker Study Guide by Kimberly Graves

/
The “Certified Ethical Hacker: Study Guide” by Kimberly Graves have gained considerable attention and popularity in recent years in response to the need for professional information security practitioners to increase their awareness in the techniques, tools and motives used by hackers.

Database Security with Application Security, Inc.

/
The critical first step in any IT audit is to identify all assets and applications residing on the network... AppDetectivePro’s Database Discovery module provides complete visibility into the inventory of databases on any network. Simply connect a laptop running AppDetectivePro to the network, and without agents, database logins, or other knowledge, the solution will scan and identify every database by vendor and release level.

An Interview with The Chairman and Founder of SINET, Robert D. Rodriguez

/
The SINET is designed to create a demand pull environment through education, collaboration, access, knowledge transfer, technology transition and policy that leads to rapid identification, assessment, evaluation and integration of "best of class" IT security solutions.

The FireEye Malware Protection System (MPS)

/
The FireEye Malware Protection System (MPS) accurately blocks Modern Malware, such as Trojans, bots, crimeware, and advanced persistent threats, in real-time using an advanced multi-phase analysis engine to capture and confirm zero-day malware and targeted attacks. At the core of each security appliance are the FireEye Malware-VM™ and Malware-Callback™ technologies, which combines inbound and outbound filtering to break the malware infection lifecycle.

Invincea™ Browser Protection enables users to knock out sophisticated Web-borne threats–in real time

/
Invincea™ Browser Protection shields PC users against all types of Web-borne threats by seamlessly moving desktop Web browsers into a controlled virtual environment.

CBT Nuggets Review of the Certified Ethical Hacker (CEH) Course

/
CBT Nuggets site is a good resource for online video training. There were a few minor issues that come with age, such as the site intermemos.com no longer being available, but away from that, the content and presentation of the material was really good and easy to follow. The training package went into a lot of detail and in some cases going over the really basic information that most candidates for the CEH should already have a full grasp on, at least in my opinion. The prices are fair and consistent with other training sites, the one thing I would point out is if you get the 30 day license, you really make sure you have the time during that month to complete the training; there are approximately 11 and ½ hours of material in this course.