Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I've put the recording + slides + Q&A all together here for your convenience. Take your pick.
Additionally, find this month's Security Bulletin here, a list of all the Audit IDs here, and the PDF of the presentation here. If you have additional questions not listed here, please feel free to comment below and we'll get our Research Team to answer.
LIVE Q&A
During the webinar there were some great questions brought up that we wanted to get answered immediately. Below are the live audience questions and our Research Team's answers: Q: Which one is more vulnerable to attacks - .com or .net sites and client computers attached to them? DJ: Both are equally vulnerable. The domain extension, in this case, does not have a whole lot of significance. JD: It's not the name or location of the site that makes it vulnerable, it's the content. Q: Are the article sources available? DJ: Yes they're available and below. CTx:- Uncle Sam: If It Ends in .Com, It's .Seizable
- Should US intelligence agency have a role in protecting electric grid?
- Social Engineer Gets into RSA Conference for Free
- Juniper buys web security company for $80 million
- Windows 8 Kill Switch
- Chrome Adopted As US State Department "Alternative" Certified Browser
- Chinese Spy on NATO Officials using Facebook
- IE10 ForceASLR
- Final Conclusion to the LulzSec Story (3 articles I referenced) - http://www.reuters.com/article/wp-content/uploads/09/us-cyber-arrests-martyn-idUSBRE82807M20120309, http://gizmodo.com/5890886/read-the-full-lulzsec-indictments-right-here, http://gizmodo.com/5890879/how-the-feds-turned-lulzsecs-leader-against-his-own
- Duqu Mystery Language
- Vulnerability in AMD CPUs causes Stack Corruption