Metasploit 3.5.1 adds Cisco device exploitation

Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …

Metasploit achieves CVE compliance

Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …

Multiple vulnerabilities in RealPlayer

Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. Users should …

Advanced iPhone spy application

Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …

Run Nmap on Android

Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …

Nessus in the cloud

The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …

Tracking a pirated software license

When Avast Software spotted a license for its avast! Pro Antivirus software being distributed online, they decided to do a simple experiment – they didn’t take any …

Splunk 4.1.6 brings numerous fixes

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …