Circles are Bad. OVAL is Good.

In information assurance, it is critical to have the best reporting about your vulnerabilities.  Vulnerabilities, as you may recall from an earlier blog, are software flaws that may leave a system open to exploitation.  There are tools that help identify and assess vulnerabilities.  They are called vulnerability scanners, or VA tools. These are tools designed […]
Read More ›

Social Engineering on Father’s Day

Social engineering is a powerful tool. But, it is tough art to practice.  It’s fun and interesting to read about it.  But, what if you wanted to experience first-hand how it works?  You can’t just waltz into some establishment and run a con game.  Sending phishing or spearphishing emails to friends will not endear you […]
Read More ›

Exploring Exploits

In security testing, studying and deploying exploits seems to be the most fun. Exploits provoke the most thought and reaction amongst learners, as well. So, what exactly is an exploit?  Let’s take a peek under the hood. Anatomy of Exploits They run the gamut in terms of how they work and what they do. The […]
Read More ›

Exploit vs. Antivirus: It’s No Contest

In a recent blog, we talked about the recent Java vulnerability and how it was still kicking around.  The flaw has been identified as CVE-2012-0507 in the Common Vulnerabilities and Exposures database.  You might be thinking that you are still safe, as you have antivirus.  Let’s find out how well it protects you. As of […]
Read More ›

What is a Vulnerability?

In discussions and meetings with other information security professionals, I hear a lot of misinformation. I’m a geek and like to be more precise, rather than less.  The use of the term vulnerability is a special pet-peeve of mine.  The core of information assurance is making sure you don’t have serious vulnerabilities. So, what exactly […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.