Skip to main content

Posts

Showing posts from February, 2007
Cisco Multiple Products Multiple Remote Denial Of Service Vulnerabilities

So you think Cisco products are the most secure and stable? Think again... based on BugTraq ID 22561 at Securityfocus.com the following Cisco products suffers from "Failure to Handle Exceptional Conditions" which allows remote attackers to remotely exploit your network.

Affected Cisco products are:
Cisco PIX/ASA 7.0.4 .3
Cisco PIX/ASA 7.0.4
Cisco PIX/ASA 7.0.1 .4
Cisco PIX/ASA 7.0
Cisco PIX/ASA 7.1(2)
Cisco PIX/ASA 7.0(5)
Cisco PIX Firewall 6.3.5 (112)
Cisco PIX Firewall 6.3.3 (133)
Cisco PIX Firewall 6.3.2
Cisco PIX Firewall 6.3.1
Cisco PIX Firewall 6.3 (5)
Cisco PIX Firewall 6.3 (3.109)
Cisco PIX Firewall 6.3 (3.102)
Cisco PIX Firewall 6.3 (3)
Cisco PIX Firewall 6.3 (1)
Cisco PIX Firewall 6.3
Cisco FWSM 3.1(3.24)
Cisco FWSM 3.1(1.9)
Cisco FWSM 3.1(1.7)
Cisco FWSM 3.1 (3.3)
Cisco FWSM 3.1 (3.2)
Cisco FWSM 3.1 (3.18)
Cisco FWSM 3.1 (3.11)
Cisco FWSM 3.1 (3.1)
Cisco FWSM 3.1
Cisco FW…
Security Flaw found in MS Office 2007Researchers have discovered a "highly critical" security flaw in newly released Office 2007, despite Microsoft's efforts to deliver its most secure version yet of the productivity software. Despite Microsoft's efforts to lock down the update, eEye finds a hole that could let an outsider run malicious software on a PC. So what else is new? Aren't we tired of reading about MS software products are not secure, Windows Vista has security flaws within 1-month of product launch (Experts sceptical on Vista security) and then this...
The consumer version of Office 2007, which launched only four weeks ago, is designed to withstand higher scrutiny by malicious code writers, as Microsoft subjected the software to code auditors as part of its security development lifecycle. But researchers at eEye Digital Security found a file format vulnerability in Microsoft Office Publisher 2007, which could be exploited to let an outsider run code o…
Why You Need to Change Your Broadband Router Password
In this article, Sid Stamm, Zulfikar Ramzan, and Markus Jakobsson have developed a clever, and potentially devastating, attack against home routers. If you are using these mentioned routers in your office, it's time to change that default password.
So how does it work? First, the attacker creates a web page containing a simple piece of malicious JavaScript code. When the page is viewed, the code makes a login attempt into the user's home broadband router, and then attempts to change its DNS server settings to point to an attacker-controlled DNS server. Once the user's machine receives the updated DNS settings from the router (after the machine is rebooted) future DNS requests are made to and resolved by the attacker's DNS server.And then the attacker basically owns the victim's web connection.The main condition for the attack to be successful is that the attacker can guess the router password. This is surp…
Is Your Business Safe From Internet Security Threats?
Spyware, malware, viruses, unauthorized network access, weak passwords and hacker attacks can be devastating to small businesses. Here's how to protect your company from internet security threats.

Keeping your networks secure and your data safe is critical to the success of your business. Which is why I always emphasize on attacking costs and complexities in implementing network security solutions that works without you having to painfully administer it.

Most small-medium business owners assume that large corporations are far more vulnerable to Internet security threats than they are. In reality, however, it's often the other way around! For example, the destructive Mydoom worm affected one out of three small and mid-sized businesses--but only one out of six large enterprises, according to the Internet Security Alliance, a non-profit organization that provides a forum for information security issues.
Because they have a false s…
Helix Nebula
Dust from comets that survived the death of their star is clouding the "eye" of the distant Helix nebula, reveals this image from NASA's Spitzer Space Telescope released on February 12. The nebula, which lies about 700 light-years from Earth, is the colorful remnant of a dying sunlike star that cast off its outer layers to become a white dwarf. Similar nebulae litter our galaxy, but the Helix nebula is now among the few known to show evidence of cosmic survivors. A haze of red around the dead star at the center of the formation is most likely being caused by dust from colliding comets, NASA scientists concluded.Full story here.
Do you know that the Final Testament (Quran) has mentioned this 1,400 over years ago?
Refer to Submission.org for details.God Almighty is great!
Lake Winnebago, Wisconsin, February 13, 2007—Ice fisher Darren Horness sidles up to the 102-pound (46-kilogram), 72-inch (1.8-meter) female sturgeon he speared on Lake Winnebago, Wisconsin.

Story and photo by National Geographic. Full details here.
Monster Glowing Squid Caught on Camera

The first ever video footage of wild Dana octopus squid has revealed that the giant animals possess an unusual weapon: glowing arms used to blind and stun their prey. The footage was captured by a Japanese research team using cameras linked to baited lures.

Full story here.
450 kg Squid Caught in New Zealand!

NEW Zealand fishermen in the Ross Sea have caught what's thought to be the largest squid ever found, weighing an estimated 450kg. Full story here.

More stories on this here and here.

This colossal squid...
if calamari were made from it, the rings would be the size of tractor tyres! Imagine dining or snacking on a calamari the size of a tractor tyre?



Past stories on colossal squids:

1) Super squid surfaces in Antartic
2) Giant octopus puzzles scientists
3) Giant Squid and Colossal Squid Fact Sheet

Calamaris anyone?
Web 2.0 explained in a YouTube video

http://www.siliconvalleywatcher.com/mt/archives/2007/02/here_is_what_we.php

After watching that video, I asked myself these questions: What can CommGate do to be a catalyst of Web 2.0 for small-medium businesses? How can CommGate be a platform to support interactions between business applications, databases, text, video, audio - securely? I know that if we can answer these questions, CommGate will be a very successful company - the most widely used platform for Web 2.0 for small-medium businesses.

Just think about it: AJAX technologies is capable of replacing fat clients. Imagine dragging and dropping security policies on a web-browser?
Web based applications such as vTigerCRM replaces a desktop based CRM system while empowering users and businesses to work from anywhere to access their customer data securely.
The CommGate built-in VPN makes that a reality.
Alfresco and KnowledTree Document Management System replaces a traditional file-server wi…