Jul 262012

0 Barracuda SSL VPN Security Appliance   Input Filter & Exception Bypass VulnerabilityBarracuda SSL VPN Security Appliance – Input Filter & Exception Bypass Vulnerability

DOWNLOAD: http://www.vulnerability-lab.com/resources/videos/563.wmv
ARTICLE: http://www.vulnerability-lab.com/get_content.php?id=563

The information provided in this test video is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply.

Domains: www.vulnerability-lab.com – www.vuln-lab.com
Contact: admin@vulnerability-lab.com – support@vulnerability-lab.com – research@vulnerability-lab.com
Section: video.vulnerability-lab.com – forum.vulnerability-lab.com – news.vulnerability-lab.com
Social: twitter.com/#!/vuln_lab – facebook.com/VulnerabilityLab – youtube.com/user/vulnerability0lab

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed),
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

Copyright © 2012 Vulnerability-Lab

Duration : 0:7:46

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jul 232012

0 WatchGuard Security Week in Review: Episode 26In this weekly security podcast, Corey Nachreiner, CISSP and Director of Security Strategy for WatchGuard Technologies, summarizes the week’s biggest network and information security stories — often sharing useful security tips where appropriate.

Visit our blog post for full details:

Duration : 0:9:59

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , , , , , ,

Jul 072012

0 WatchGuard Security Week in Review: Episode 24In this weekly security podcast, Corey Nachreiner, CISSP and Director of Security Strategy for WatchGuard Technologies, summarizes the week’s biggest network and information security stories — often sharing useful security tips where appropriate.

Visit our blog post for full details:

Duration : 0:8:29

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , , , , , , ,

Jun 022012

0 Kaspersky Internet Security 2012 Review** UI = User Interface**
-In this video, I put Kaspersky’s latest Internet Security product, Kaspersky Internet Security 2012, to the test. Kaspersky has a strong reputation, but will it rise to the test or will it crumble?
-Any antivirus programs you want us to test? let us know in the comments
-Care to advertise in this video. Private message The Computer Hospital via the link below

The Computer Hospital’s Channel:

Duration : 0:15:1

Continue reading »

Technorati Tags: , , , , , , , , , , , ,

May 252012

0 The Breakdown of a Fake AV ScammerWhat are the chances of a fake antivirus (AV) scammer calling a security vendor? Probably slim, until this week when one such scammer calls Noah Magram, principal software engineer with Sourcefire. After talking to a series of agents for 30 minutes, Noah fires up a virtual machine. The video starts when the scammers get access to his “computer.”

(Note: Unfortunately, as Noah points out, scammers often try to use good services with bad intentions. Listen carefully as a few of these services are, indeed, legitimate.)

Duration : 0:7:57

Continue reading »

Technorati Tags: , , , , ,

May 212012

0 Computer Security and Organizational LearningFrom the speaker, Josh More: “This is a talk that I’ll be giving at Secure360. It’s the culmination of a lot of thinking I’ve been doing about how Agile/Lean applies to Security.”
Presented at DC612

Duration : 1:26:45

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , ,

May 172012

0 NetSafe Computer Security Experiment (2008)PLEASE NOTE: This video is staged for TV and shows unprotected Windows machines being used online. All Windows default security has been disabled with firewalls turned off and software updates not applied.

The intention of the video was to demonstrate how important it is for end users to follow the computer security ‘Net Basics’ – simple steps that still apply today:

- Update your operating system and software
- Do not turn off the Windows firewall
- Use anti-virus and anti-spyware software (nowadays bundled in a security suite)
- Back up your system and personal files
- Secure your home network, especially if you use a wireless connection

This video was originally shot in 2008 to mark International Computer Security day on 2nd December. The following description is taken from an original 2008 news story available at http://reseller.co.nz/reseller.nsf/news/454142D389BACC5FCC25751200743973

- – - – - – - – - – - –

In an experiment designed to underscore how vulnerable household computers are to security threats, NetSafe and IBM uncovered weaknesses in user behaviour.

Held to market International Computer Security day, four New Zealanders ranging from a teenage boy to a senior citizen went about online day-to-day tasks on poorly secured computers. The first attempt at intrusion happened within the first two minutes and the first computer was unusable after one hour and 40 minutes.

NetSafe executive director Martin Cocker says the results illustrate how important computer security is. “From this experiment we’ve seen just how quickly computers are attacked, and how the activity one undertakers online increases or decreases your computer’s security. We hope that New Zealanders will look at the experiment and take steps to make their computer a hard target for online criminals.”

As soon as the computers were connected to the internet they were probed for vulnerabilities and directly attacked. They were then bombarded with attempts to upload viruses and spyware (malware) — some of which were successful.

IBM security specialist John Martin says the computers had no antivirus or firewall software but the participants went online as if they were bulletproof. “Our computers are not at fault here, we are the ones downloading and storing this stuff without checking to see if we have the appropriate security,” he says.

Duration : 0:10:6

Continue reading »

Technorati Tags: , , , , , , , , , ,

Apr 072012

0 Mac Malware Flashback Trojan Infects Half a Million ComputersBad news Mac lovers: even you can get malware, and you might already have it.

A new report from a Russian security firm says over half a million Apple computers have been infected with the Flashback Trojan, a virus that turns their computer into part of a controllable botnet. And over half of the infected computers are reportedly in the U.S.

The malware was first detected last year, disguised as a Flash Player update. It later messed with Java programming language, installing code from sites without the owners’ permission. Apple has finally released a new security update that should help fight the virus if your computer has it.

Unfortunately, it may be time for Mac users to stop bragging that they can’t get viruses. And time for them to finally run that pesky software update!

Duration : 0:0:50

Continue reading »

Technorati Tags: , , , , , ,

Dec 092011

0 The Early Show   Smartphone malware attacks on the rise: reportA computer security company says malware attacks on cell phones are expected to reach an all-time high this year, with Android phones being the most susceptible. Erica Hill and Chris Wragge talk to CNET senior editor Bridget Carey for the details.

Duration : 0:3:39

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , ,

Nov 212011

0 ESET Smart Security 5 is here!The Next Generation of Computer Security. Upgraded to counter even the most sophisticated cyberthreats.

Unique proactive protection delivers security before new threats become public knowledge. Whether it’s web-browsing, exchanging e-mails, or paying bills online, you can rely on real-time, continual and consistent level of protection from even never-before-seen forms of malware.

Visit ESET on Facebook: http://fb.eset.com

Download a free trial version of ESET Smart Security 5 at http://www.eset.com/

Duration : 0:1:36

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , , ,