<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Seguridad Internet Security News</title>
	<atom:link href="https://www.seguridad.im/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.seguridad.im</link>
	<description>Technology Security News and Tips</description>
	<lastBuildDate>Sun, 29 Jun 2025 06:01:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">34709016</site>	<item>
		<title>Nigerian scams affecting ecommerce merchants</title>
		<link>https://www.seguridad.im/2012/04/nigerian-scams-affecting-ecommerce-merchants/</link>
		
		<dc:creator><![CDATA[Seguridad Staff]]></dc:creator>
		<pubDate>Fri, 20 Apr 2012 12:29:38 +0000</pubDate>
				<category><![CDATA[Scams]]></category>
		<category><![CDATA[419 scam]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[nigeria]]></category>
		<category><![CDATA[nigeria scams]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">http://www.safebreaker.org/?p=65</guid>

					<description><![CDATA[Nigerian scams affecting ecommerce merchants If you&#8217;ve been involved in online business for any reasonable<img src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fnigerian-scams-affecting-ecommerce-merchants%2F&amp;action_name=Nigerian%20scams%20affecting%20ecommerce%20merchants&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[<table style="height: 29px;" border="0" cellspacing="0" cellpadding="5">
<tbody>
<tr>
<td valign="bottom">
<h1 align="left"><span style="font-size: small;">Nigerian scams affecting ecommerce merchants</span></h1>
</td>
</tr>
</tbody>
</table>
<p align="left">If you&#8217;ve been involved in online business for any reasonable length of time, or just been around the web generally, no doubt you&#8217;d be aware of &#8220;419&#8221; Nigerian scams; aka advance fee fraud. These have little bearing on ecommerce, but there&#8217;s a reasonably new Nigerian-type scam that<span id="more-65"></span> has a huge direct impact for online merchants; the &#8220;shipping clerk&#8221; scam, more on that later.</p>
<h2 align="left">&#8220;419&#8221; &#8211; Nigerian Scams</h2>
<p align="left">Just in case you&#8217;re one of the lucky few who has never been hassled by 419 scammers, it is the oldest Nigerian scam around. This classic Nigerian scam is also known as advanced fee fraud. My father used to work with the Department of Consumer Afffairs in Australia in the 1980&#8217;s and he saw it regularly then. In those days it was carried out by mail, fax and telephone. Even though it has had so much press coverage, it&#8217;s estimated that billions of dollars are fleeced from unsuspecting (and greedy) people each year.</p>
<div align="center"><center></p>
<table border="0" cellspacing="0" cellpadding="5">
<tbody>
<tr>
<td align="center">Thinking of doing business with a Nigerian company?Don&#8217;t take unnecessary risks &#8211; use the services of<br />
<a href="http://www.ddcheck.com/" target="_blank">ddCheck.com</a> &#8211; a due diligence &amp; company search service<br />
based in Nigeria; staffed by seasoned legal professionals!</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p></center></div>
<p align="left">The target receives an email claiming to be from an official representative of an important official (royalty, government). The scammer doesn&#8217;t ask for money up front, but wants to establish a working relationship with the target to help transfer money (which doesn&#8217;t exist) out of Nigeria or other African countries on behalf of their &#8220;client&#8221;.</p>
<p align="left">The target is promised a healthy fee for their assistance, sometimes millions of dollars. There are other variations on this theme, but the the basics remain &#8211; a large sum of cash needing to be transferred to a Western country.</p>
<p align="left">The scammer sends official looking documents etc. to convince the target of their credentials. The scammer then gets the target&#8217;s bank details under the premise of depositing cash *into* their account.</p>
<p align="left">That&#8217;s when problems start occurring. The scammer tells the target that in order to shift the money, they need to bribe government officials or pay for security of the transporting of the cash etc. The target often pays large amounts of money in order to help these scammers to release the fictitious amounts of cash. The scammer will siphon from the target for as long as they possibly can.</p>
<p align="left">Up until recently, 419 scammers had reasonably free reign in Nigeria and were fearless in their approaches. It&#8217;s my understanding that the Nigerian government is now cracking down on these gangs. Still, it doesn&#8217;t appear to have slowed down the number of scam emails I receive. While the Nigerian scam is performed in other countries, the vast majority of them will be from African states.</p>
<div align="center">
<table style="width: 339px;" border="1" cellspacing="0" cellpadding="3">
<tbody>
<tr>
<td width="360"><center></center></p>
<table style="width: 328px;" border="0" cellspacing="0" cellpadding="3">
<tbody>
<tr>
<td width="312">
<p align="center"><span style="color: #336699; font-size: small;"><strong>New to Pay Per Click advertising?</strong></span></p>
<p align="center">Read our <a href="http://www.tamingthebeast.net/tools/pay-per-click.htm">free beginners guide to PPC</a>. Includes listings of companies offering <a href="http://www.tamingthebeast.net/tools/pay-per-click.htm#free-ppc-credit">free click credits</a>!</p>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</div>
<h2 align="left">Nigerian scams affecting ecommerce</h2>
<p align="left">It&#8217;s an unfortunate thing that every time I hear the word &#8220;Nigeria&#8221;, I instantly think &#8220;fraud&#8221;. In nearly a decade of being on the web, I can say with a great degree of certainty that I have received *1* legitimate business email originating from Nigeria. Most other merchants will have had similar experiences. I feel very sorry for those legitimate merchants trying to run an online business on a global scale from African countries; it must be very challenging for them.</p>
<p align="left">In my article on <a href="http://www.tamingthebeast.net/articles2/card-fraud-strategies.htm">card fraud strategies</a>, I mention that tracing the IP on an order receipt is a good way to prevent being defrauded. Also, if the billing address is the USA and the delivery address is Africa, Asia, Eastern Europe or other high risk countries, you can be reasonably confident that the order is fraud.</p>
<p align="left">The Nigerian scammers realize this and have added a new string to their bow &#8211; the &#8220;shipping clerk&#8221; scam.</p>
<h2 align="left">Nigerian &#8220;shipping clerk&#8221; scam</h2>
<p align="left">As with the 419 scam, Nigeria is not the only source of the shipping clerk scam, but it does appear to be the major point of origin currently. Here&#8217;s how it works:</p>
<p align="left">&#8211; The scammers steal the credit card numbers</p>
<p align="left">&#8211; They recruit people via email and forum postings in other western countries such as the USA to act as a delivery point for goods &#8211; i.e. a &#8220;shipping clerk&#8221;. They might also represent themselves as an export company wanting to service western clients, wanting to recruit clerks as payment processors.</p>
<p align="left">I received a &#8220;recruitment&#8221; letter a few days ago; here&#8217;s a sample:</p>
<p align="left">&#8212;&#8212;</p>
<p>I represent COMPANY NAME based in Lagos, Nigeria. My company purchases electronic products from all over the world for resale in Nigeria and we need reliable shipping clerks to act as reshippers. We will pay for products and have them shipped to you. In turn, you will ship them onto us &#8211; we will provide you with pre-paid shipping boxes etc.</p>
<p>We choose this method of business as it circumvents some of the logistical issues we have experienced in the past.</p>
<p>Note that, as our representative, you will receive $x for each $x value of goods we purchase that you ship to us. Please, to facilitate the conclusion of this transaction if accepted, do send me promptly by email the following:</p>
<p>(1)Your full names,</p>
<p>(2)Contact address and,</p>
<p>(3)Phone/fax numbers.</p>
<p align="left">&#8212;&#8212;&#8212;-</p>
<p align="left">In some emails, Nigeria may not be mentioned. The scammer may state they are based in another country such as the UK; but when the clerk is &#8220;hooked&#8221;, they are directed to ship to another country.</p>
<p align="left">&#8211; The scammers then place orders with the stolen card numbers using a forged IP in order to make the order look as though it came from country of the cardholders&#8217; address. They would use a delivery address of the shipping clerk.</p>
<p align="left">&#8211; The shipping clerk receives the goods and then reships them to the scammers.</p>
<p align="left">&#8211; The shipping clerk is paid via a cashier&#8217;s check, which is also fraudulent. Usually the check is for more than the clerk&#8217;s wage, so the clerk is directed to wire the excess to the scammer</p>
<p align="left">or</p>
<p align="left">&#8211; They would send the &#8220;clerk&#8221; fraudulent cashiers checks, purportedly from the scammers &#8220;clients&#8221; for the clerk to cash, directing the clerk to keep a percentage and to wire the rest to the scammer.</p>
<p align="left">After a period of time, the bank that cashed the check would discover that it is fraudulent and the clerk is then liable for the entire amount.</p>
<p align="left">In the case of the reshipping angle, then not only does the &#8220;clerk&#8221; get stung, but also the merchants who provided goods. The merchant not only loses the goods, but will also probably incur a chargeback fee. If a merchant has enough chargebacks recorded against them, then their account with the processor may also be threatened or higher processing fees applied.</p>
<p align="left">This kind of scam has cost ecommerce merchants millions of dollars in the last year. It is difficult to catch as all the usual initial anti-fraud screens would see it as a legitimate order; i.e., the order IP matches the country as does the delivery address. In some cases, the scammer may provide the credit card details to the clerk and direct them which goods to buy and from where.</p>
<p align="left">In order for merchants to pick up on these sorts of fraudulent transactions, further screening is required. It&#8217;s not unusual for people to provide a delivery address different from the card billing address, so automatically voiding these transactions is not recommended, but the order should be placed in suspension until further investigations are carried out.</p>
<p align="left">It may be that merchants need to look at the transaction details in their entirety i.e.:</p>
<p align="left">&#8211; the $ amount of the purchase<br />
&#8211; the number of items purchased<br />
&#8211; does the IP match the state of the cardholder?<br />
&#8211; does the delivery address match the billing address?</p>
<p align="left">In regards to IP tracking, you can use a free tool such as is offered on<a href="http://www.dnsstuff.com/" target="_blank">DNSStuff.com</a> (using the WHOIS Lookup) feature. Just enter the originating IP of the order in that box and if you find that the ISP doesn&#8217;t operate in the State of the cardholder, that could indicate possible fraud.</p>
<p align="left">When in doubt, pick up the phone &#8211; call the cardholder and find out if they indeed made the transaction and if they did, ask them if it was on behalf of another company.</p>
<p align="left">It&#8217;s a sad world that we have to spend so much time in battling online parasites; but the problem isn&#8217;t going to go away any time soon. In the world of ecommerce, anti-fraud vigilance is equally as important as marketing and product presentation skills.</p>
<p align="left">Related resources:</p>
<p align="left"><a href="http://www.tamingthebeast.net/articles2/card-fraud-strategies.htm">Card fraud strategies</a></p>
<p align="left"><a href="http://www.tamingthebeast.net/articles4/ppc-fraud.htm">Pay per click anti-fraud strategies</a></p>
<p align="left">Michael Bloch<br />
Taming the Beast<br />
<a href="http://www.tamingthebeast.net/">http://www.tamingthebeast.net</a><br />
Tutorials, web content, tools and software.<br />
Web Marketing, Internet Development &amp; Ecommerce Resources<br />
____________________________</p>
<p>Copyright information&#8230;. This article is free for reproduction but must be reproduced in its entirety, including live links &amp; this copyright statement must be included. Visit <a href="http://www.tamingthebeast.net/">http://www.tamingthebeast.net</a> for free Internet marketing and web development articles, tutorials and tools! Subscribe to our popular ecommerce/web design ezine!</p>
<img decoding="async" src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fnigerian-scams-affecting-ecommerce-merchants%2F&amp;action_name=Nigerian%20scams%20affecting%20ecommerce%20merchants&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">65</post-id>	</item>
		<item>
		<title>Device Hardening, Vulnerability Scanning and Threat Mitigation for Compliance and Security</title>
		<link>https://www.seguridad.im/2012/04/device-hardening-vulnerability-scanning-and-threat-mitigation-for-compliance-and-security/</link>
		
		<dc:creator><![CDATA[Seguridad Staff]]></dc:creator>
		<pubDate>Fri, 20 Apr 2012 12:07:22 +0000</pubDate>
				<category><![CDATA[Web Server Security]]></category>
		<category><![CDATA[File Integrity Monitoring]]></category>
		<guid isPermaLink="false">http://www.safebreaker.org/?p=38</guid>

					<description><![CDATA[Device Hardening, Vulnerability Scanning and Threat Mitigation for Compliance and Security By Mark Kedgley All<img src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fdevice-hardening-vulnerability-scanning-and-threat-mitigation-for-compliance-and-security%2F&amp;action_name=Device%20Hardening%2C%20Vulnerability%20Scanning%20and%20Threat%20Mitigation%20for%20Compliance%20and%20Security&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[<p>Device Hardening, Vulnerability Scanning and Threat Mitigation for Compliance and Security<br />
By <a href="http://ezinearticles.com/?expert=Mark_Kedgley">Mark Kedgley</a></p>
<p>All security standards and Corporate Governance Compliance Policies such as PCI DSS, GCSx CoCo, SOX (Sarbanes Oxley), NERC CIP, HIPAA, HITECH, GLBA, ISO27000 and FISMA require devices such as PCs, Windows Servers, Unix Servers, network devices such as firewalls,<span id="more-38"></span> Intrusion Protection Systems (IPS) and routers to be secure in order that they protect confidential data secure.</p>
<p>There are a number of buzzwords being used in this area &#8211; Security Vulnerabilities and Device Hardening? &#8216;Hardening&#8217; a device requires known security &#8216;vulnerabilities&#8217; to be eliminated or mitigated. A vulnerability is any weakness or flaw in the software design, implementation or administration of a system that provides a mechanism for a threat to exploit the weakness of a system or process. There are two main areas to address in order to eliminate security vulnerabilities &#8211; configuration settings and software flaws in program and operating system files. Eliminating vulnerabilites will require either &#8216;remediation&#8217; &#8211; typically a software upgrade or patch for program or OS files &#8211; or &#8216;mitigation&#8217; &#8211; a configuration settings change. Hardening is required equally for servers, workstations and network devices such as firewalls, switches and routers.</p>
<p>How do I identify Vulnerabilities? A Vulnerability scan or external Penetration Test will report on all vulnerabilities applicable to your systems and applications. You can buy in 3rd Party scanning/pen testing services &#8211; pen testing by its very nature is done externally via the public internet as this is where any threat would be exploited from. Vulnerability Scanning services need to be delivered in situ on-site. This can either be performed by a 3rd Party Consultant with scanning hardware, or you can purchase a &#8216;black box&#8217; solution whereby a scanning appliance is permanently sited within your network and scans are provisioned remotely. Of course, the results of any scan are only accurate at the time of the scan which is why solutions that continuously track configuration changes are the only real way to guarantee the security of your IT estate is maintained.</p>
<p>What is the difference between &#8216;remediation&#8217; and &#8216;mitigation&#8217;? &#8216;Remediation&#8217; of a vulnerability results in the flaw being removed or fixed permanently, so this term generally applies to any software update or patch. Patch management is increasingly automated by the Operating System and Product Developer &#8211; as long as you implement patches when released, then in-built vulnerabilities will be remediated. As an example, the recently reported Operation Aurora, classified as an Advanced Persistent Threat or APT, was successful in infiltrating Google and Adobe. A vulnerability within Internet Explorer was used to plant malware on targeted users&#8217; PCs that allowed access to sensitive data. The remediation for this vulnerability is to &#8216;fix&#8217; Internet Explorer using Microsoft released patches. Vulnerability &#8216;mitigation&#8217; via Configuration settings ensures vulnerabilities are disabled. Configuration-based vulnerabilities are no more or less potentially damaging than those needing to be remediated via a patch, although a securely configured device may well mitigate a program or OS-based threat. The biggest issue with Configuration-based vulnerabilities is that they can be re-introduced or enabled at any time &#8211; just a few clicks are needed to change most configuration settings.</p>
<p>How often are new vulnerabilities discovered? Unfortunately, all of the time! Worse still, often the only way that the global community discovers a vulnerability is after a hacker has discovered it and exploited it. It is only when the damage has been done and the hack traced back to its source that a preventative course of action, either patch or configuration settings, can be formulated. There are various centralized repositories of threats and vulnerabilities on the web such as the MITRE CCE lists and many security product vendors compile live threat reports or &#8216;storm center&#8217; websites.</p>
<p>So all I need to do is to work through the checklist and then I am secure? In theory, but there are literally hundreds of known vulnerabilities for each platform and even in a small IT estate, the task of verifying the hardened status of each and every device is an almost impossible task to conduct manually.</p>
<p>Even if you automate the vulnerability scanning task using a scanning tool to identify how hardened your devices are before you start, you will still have work to do to mitigate and remediate vulnerabilities. But this is only the first step &#8211; if you consider a typical configuration vulnerability, for example, a Windows Server should have the Guest account disabled. If you run a scan, identify where this vulnerability exists for your devices, and then take steps to mitigate this vulnerability by disabling the Guest Account, then you will have hardened these devices. However, if another user with Administrator privileges then accesses these same servers and re-enables the Guest Account for any reason, you will then be left exposed. Of course, you wont know that the server has been rendered vulnerable until you next run a scan which may not be for another 3 months or even 12 months. There is another factor that hasn&#8217;t yet been covered which is how do you protect systems from an internal threat &#8211; more on this later.</p>
<p>So tight change management is essential for ensuring we remain compliant? Indeed &#8211; Section 6.4 of the PCI DSS describes the requirements for a formally managed Change Management process for this very reason. Any change to a server or network device may have an impact on the device&#8217;s &#8216;hardened&#8217; state and therefore it is imperative that this is considered when making changes. If you are using a continuous configuration change tracking solution then you will have an audit trail available giving you &#8216;closed loop&#8217; change management &#8211; so the detail of the approved change is documented, along with details of the exact changes that were actually implemented. Furthermore, the devices changed will be re-assessed for vulnerabilities and their compliant state confirmed automatically.</p>
<p>What about internal threats? Cybercrime is joining the Organised Crime league which means this is not just about stopping malicious hackers proving their skills as a fun pastime! Firewalling, Intrusion Protection Systems, AntiVirus software and fully implemented device hardening measures will still not stop or even detect a rogue employee who works as an &#8216;inside man&#8217;. This kind of threat could result in malware being introduced to otherwise secure systems by an employee with Administrator Rights, or even backdoors being programmed into core business applications. Similarly, with the advent of Advanced Persistent Threats (APT) such as the publicized &#8216;Aurora&#8217; hacks that use social engineering to dupe employees into introducing &#8216;Zero-Day&#8217; malware. &#8216;Zero-Day&#8217; threats exploit previously unknown vulnerabilities &#8211; a hacker discovers a new vulnerability and formulates an attack process to exploit it. The job then is to understand how the attack happened and more importantly how to remediate or mitigate future re-occurrences of the threat. By their very nature, anti-virus measures are often powerless against &#8216;zero-day&#8217; threats. In fact, the only way to detect these types of threats is to use File-Integrity Monitoring technology. &#8220;All the firewalls, Intrusion Protection Systems, Anti-virus and Process Whitelisting technology in the world won&#8217;t save you from a well-orchestrated internal hack where the perpetrator has admin rights to key servers or legitimate access to application code &#8211; file integrity monitoring used in conjunction with tight change control is the only way to properly govern sensitive payment card systems&#8221; Phil Snell, CTO, NNT</p>
<p>See our other whitepaper &#8216;File-Integrity Monitoring &#8211; The Last Line of Defense of the PCI DSS&#8217; for more background to this area, but this is a brief summary -Clearly, it is important to verify all adds, changes and deletions of files as any change may be significant in compromising the security of a host. This can be achieved by monitoring for should be any attributes changes and the size of the file.</p>
<p>However, since we are looking to prevent one of the most sophisticated types of hack we need to introduce a completely infallible means of guaranteeing file integrity. This calls for each file to be &#8216;DNA Fingerprinted&#8217;, typically generated using a Secure Hash Algorithm. A Secure Hash Algorithm, such as SHA1 or MD5, produces a unique, hash value based on the contents of the file and ensures that even a single character changing in a file will be detected. This means that even if a program is modified to expose payment card details, but the file is then &#8216;padded&#8217; to make it the same size as the original file and with all other attributes edited to make the file look and feel the same, the modifications will still be exposed. This is why the PCI DSS makes File-Integrity Monitoring a mandatory requirement and why it is increasingly considered as vital a component in system security as firewalling and anti-virus defences.</p>
<p>Conclusion Device hardening is an essential discipline for any organization serious about security. Furthermore, if your organization is subject to any corporate governance or formal security standard, such as PCI DSS, SOX, HIPAA, NERC CIP, ISO 27K, GCSx Co Co, then device hardening will be a mandatory requirement. &#8211; All servers, workstations and network devices need to be hardened via a combination of configuration settings and software patch deployment &#8211; Any change to a device may adversely affect its hardened state and render your organization exposed to security threats &#8211; file-integrity monitoring must also be employed to mitigate &#8216;zero-day&#8217; threats and the threat from the &#8216;inside man&#8217; &#8211; vulnerability checklists will change regularly as new threats are identified</p>
<p>All NewNetTechnologies software solutions are built using the latest technology, which means they can be fully adapted to suit all business environments. For more information on <a target="_new" href="http://www.newnettechnologies.com">File Integrity Monitoring</a> view our software solutions on <a target="_new" href="http://www.newnettechnologies.com">http://www.newnettechnologies.com</a> which provide 100% of the features you need but at a fraction of the cost of traditional solutions.</p>
<p>
Article Source: <a href="http://ezinearticles.com/?expert=Mark_Kedgley" target="_new">http://EzineArticles.com/?expert=Mark_Kedgley</a></p>
<p><a href="http://ezinearticles.com/?Device-Hardening,-Vulnerability-Scanning-and-Threat-Mitigation-for-Compliance-and-Security&#038;id=4995769" target="_new">http://EzineArticles.com/?Device-Hardening,-Vulnerability-Scanning-and-Threat-Mitigation-for-Compliance-and-Security&#038;id=4995769</a></p>
<p></p>
<img decoding="async" src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fdevice-hardening-vulnerability-scanning-and-threat-mitigation-for-compliance-and-security%2F&amp;action_name=Device%20Hardening%2C%20Vulnerability%20Scanning%20and%20Threat%20Mitigation%20for%20Compliance%20and%20Security&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">38</post-id>	</item>
		<item>
		<title>Penetration Testing Detects Both Known and Unknown Vulnerabilities</title>
		<link>https://www.seguridad.im/2012/04/penetration-testing-detects-both-known-and-unknown-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Seguridad Staff]]></dc:creator>
		<pubDate>Fri, 20 Apr 2012 11:47:56 +0000</pubDate>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[application penetration]]></category>
		<category><![CDATA[penetration test]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[security testing]]></category>
		<category><![CDATA[web testing]]></category>
		<guid isPermaLink="false">http://www.safebreaker.org/?p=36</guid>

					<description><![CDATA[Penetration Testing Detects Both Known and Unknown Vulnerabilities By Adam Gilley It is known as<img src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fpenetration-testing-detects-both-known-and-unknown-vulnerabilities%2F&amp;action_name=Penetration%20Testing%20Detects%20Both%20Known%20and%20Unknown%20Vulnerabilities&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[<p>Penetration Testing Detects Both Known and Unknown Vulnerabilities<br />
By <a href="http://ezinearticles.com/?expert=Adam_Gilley">Adam Gilley</a></p>
<p>It is known as Ethical Hacking, the act of being active in planning attacks over the website&#8217;s security and networking. It is the Penetration Testing that is referred to here in this article. Both known and unknown vulnerabilities that harms the overall<span id="more-36"></span> integrity of a website and the system, its network, data is pointed out when a penetration test is carried out in order out arrive at a just conclusion to solve the problem. Every now and then security threats haunts web masters and a security breach is often what take place if proper measures are put into action. The security threats may arise, due to a possible network security hole somewhere in the system, bad or inaccurate configuration or when automatic update option has been disabled. To ascertain the possible cause that might make hacker activity a child&#8217;s play for a particular website or server, it is essential to carry out willful hacking by means of penetration.</p>
<p>The hacker activity as part of the vulnerability assessment in a penetration procedure is to willingly enter malicious code and undertake hacking. The only difference between the ethical hacking in penetration testing and the one carried out by real hacker is that the hacking conducted as an essential component of the penetration, gives periodic reports of how a particular hacking activity is effecting the website and the server security that is then forwarded to the admin for proper remediation management.</p>
<p>The penetration procedure is a &#8220;Black Box Testing&#8221; that involves tests where the attackers have no knowledge of the network infrastructure. This gives them the opportunity to carry out hacking as would have been carried out by a real hacker and in this way other unknown vulnerabilities that are not quite obvious to take place but posing a serious threat over the network and on live servers is pointed out and a proper solution is brought into the forefront to make a website secure to its fullest. Penetration testing carries out automated and manual discovery and exploitation of vulnerabilities, it validates compromised system with &#8220;tag&#8221; or copy of retrieved data conducted by certified staff.</p>
<p>Advantages of Penetration Testing:-</p>
<p>1) Penetration testing reveals possible network security holes.<br />
<br />2) More realistic risk assessment in the penetration procedure as it would have carried out by real hacker for better threat resolution.<br />
<br />3) Penetration testing brings about the formulation of a security strategy to analyze and identify threats, the cause and bring about a ready powerful solution to mitigate it.<br />
<br />4) Penetration testing prevents financial losses through loss of revenue and data due to the unethical processes.<br />
<br />5) A reliable penetration procedure that conducts risk audits to determine network operation and integrity.<br />
<br />6) Accurate and up-to-date known and unknown vulnerability assessments through penetration testing.<br />
<br />7) Preparation of disaster scenarios under the Black Box Testing and injecting malicious codes to analyze the cause and effect and assessing a prior attack scenario as well which in turn helps in error resolution and mitigating the possibility of a threat on the network.</p>
<p>Penetration testing should therefore be carried out whenever there is a change in the network infrastructure by highly experienced staff who will scrutinize internet connected systems for any weakness or disclosure of information, which could be used by an attacker to compromise the confidentiality, availability or integrity of your network.</p>
<p>Adam Gilley, the writer for this article, defines <a target="_new" href="http://www.techrate.com/penetration-testing-certified-security.htm">penetration testing</a> and points out the advantages of this type of testing. Regarded as an essential component of Black Box Testing the procedure carries out ethical hacking with proper assessments for data, server and network security threats and mitigating them from the very roots. Visit for more info at <a target="_new" href="http://www.techrate.com">www.techrate.com</a></p>
<p>
Article Source: <a href="http://ezinearticles.com/?expert=Adam_Gilley" target="_new">http://EzineArticles.com/?expert=Adam_Gilley</a></p>
<p><a href="http://ezinearticles.com/?Penetration-Testing-Detects-Both-Known-and-Unknown-Vulnerabilities&#038;id=6901458" target="_new">http://EzineArticles.com/?Penetration-Testing-Detects-Both-Known-and-Unknown-Vulnerabilities&#038;id=6901458</a></p>
<p></p>
<img decoding="async" src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fpenetration-testing-detects-both-known-and-unknown-vulnerabilities%2F&amp;action_name=Penetration%20Testing%20Detects%20Both%20Known%20and%20Unknown%20Vulnerabilities&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">36</post-id>	</item>
		<item>
		<title>Understanding Vulnerability Management</title>
		<link>https://www.seguridad.im/2012/04/understanding-vulnerability-management/</link>
		
		<dc:creator><![CDATA[Seguridad Staff]]></dc:creator>
		<pubDate>Thu, 19 Apr 2012 23:48:39 +0000</pubDate>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[understanding vulnerability management]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">http://www.safebreaker.org/?p=34</guid>

					<description><![CDATA[Understanding Vulnerability Management By Harry Raymond With business today being almost invariably carried out with<img src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Funderstanding-vulnerability-management%2F&amp;action_name=Understanding%20Vulnerability%20Management&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[<p>Understanding Vulnerability Management<br />
By <a href="http://ezinearticles.com/?expert=Harry_Raymond">Harry Raymond</a></p>
<p>With business today being almost invariably carried out with the support of computer technologies, owners need to be acutely aware of the risks facing their business and ensure that they have appropriate web application security in place. They should also undertake penetration testing as appropriate. In particular,<span id="more-34"></span> owners of organisations should be aware of IT vulnerabilities and how such vulnerabilities can be countered and managed.</p>
<p>What Are Vulnerabilities?</p>
<p>Vulnerabilities can be defined as bugs in software or hardware or a misconfiguration that can be improperly used by an individual to the detriment of an organisation or business. Quite often in the world of IT, patch management, configuration management and security management are grouped together as one IT problem, being the collective problem of vulnerability management.</p>
<p>The Importance of Vulnerability Management:</p>
<p>For organisations to effectively protect their IT assets and systems, it is useful to engage in a process of penetration testing and ongoing network security monitoring.</p>
<p>Vulnerability management can sometimes seem deceptively simple. However, in increasingly complex business environments and for organisations of all sizes, vulnerability management is quite complex and involved. In any one organisation, unique applications, remote and mobile users and specialised, much relied upon servers are prominent features and all of these have distinct needs that unfortunately cannot be &#8216;fixed&#8217; or secured and then abandoned. Ongoing attention is required.</p>
<p>Technology presents an ever evolving and changing space. Software companies are known to release code that is not always adequately tested or secured, security is not built into hardware as standard and all too often administrators of systems on the ground are left to manage the problems and issues that arise. Added to this, there are also regulations for compliance that companies must abide by.</p>
<p>All of these factors in combination result in a potentially stressful situation for management and business owners. And, as we all know, high pressure environments can quickly lead to mistakes and errors which are sometimes expensive.</p>
<p>A Window of Vulnerability:</p>
<p>The difficulties pertaining to vulnerability management create a &#8216;Window of Vulnerability&#8217;. This term is used to explain the length of time in which a computer system has inadequate web application security and is exposed and vulnerable to a particular security flaw, problem with configuration or any other factor that limits the overall security of the system.</p>
<p>When thinking about Windows of Vulnerability, there are two types that need to be understood:</p>
<p>� Unknown Window of Vulnerability &#8211; this refers to the amount of time taken between the vulnerability being identified and the system being patched</p>
<p>� Known Window of Vulnerability &#8211; this refers to the time from a patch being released by a vendor and the system being patched.</p>
<p>For most organisations, the second of these terms is the most significant. However, businesses also need to plan to mitigate problems and so recognition of the Unknown Window of Vulnerability is also very important.</p>
<p>Some organisations offer information on known vulnerabilities in advance of vendor patches being made available (this service is for payment). A number of large organisations recognise the benefits of this, but it does come with a note of warning. Such services are generally expensive and it is recommended that companies do their own research into the quality and quantity of vulnerabilities.</p>
<p>Vulnerability management is important as no organisation wants to leave themselves open to exploitation. It is also important for organisations to know and have strategies to protect themselves from multiple levels of risk to vulnerabilities. Here, the time taken to identify and deal with vulnerability (by way of a patch or workaround) is critical. Organisations should also be committed to ongoing network security auditing and thorough penetration testing to best protect their IT interests.</p>
<p>By the way, do you want to learn more about Computers and Technology? If so, I suggest you check <a target="_new" href="http://www.technicalities.com.au/">IT Support</a> and <a target="_new" href="http://www.technicalities.com.au/Page/BusinessITSupport">Business IT Support</a>.</p>
<p>
Article Source: <a href="http://ezinearticles.com/?expert=Harry_Raymond" target="_new">http://EzineArticles.com/?expert=Harry_Raymond</a></p>
<p><a href="http://ezinearticles.com/?Understanding-Vulnerability-Management&#038;id=6153894" target="_new">http://EzineArticles.com/?Understanding-Vulnerability-Management&#038;id=6153894</a></p>
<p></p>
<img decoding="async" src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Funderstanding-vulnerability-management%2F&amp;action_name=Understanding%20Vulnerability%20Management&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34</post-id>	</item>
		<item>
		<title>Hello world!</title>
		<link>https://www.seguridad.im/2012/04/hello-world/</link>
					<comments>https://www.seguridad.im/2012/04/hello-world/#comments</comments>
		
		<dc:creator><![CDATA[Seguridad Staff]]></dc:creator>
		<pubDate>Thu, 05 Apr 2012 00:44:48 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.safebreaker.org/?p=1</guid>

					<description><![CDATA[Welcome to Seguridad Internet Security News: your source for the latest software security alerts and<img src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fhello-world%2F&amp;action_name=Hello%20world%21&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[<p>Welcome to Seguridad Internet Security News: your source for the latest software security alerts and tips on website security and safe computing.</p>
<p>Watch for our grand opening soon!</p>
<p>&nbsp;</p>
<img decoding="async" src="https://www.webanalytics.im/piwik.php?idsite=68&amp;rec=1&amp;url=https%3A%2F%2Fwww.seguridad.im%2F2012%2F04%2Fhello-world%2F&amp;action_name=Hello%20world%21&amp;urlref=https%3A%2F%2Fwww.seguridad.im%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
					<wfw:commentRss>https://www.seguridad.im/2012/04/hello-world/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 2/210 objects using APC
Page Caching using Disk: Enhanced 
Database Caching 1/139 queries in 0.023 seconds using Memcached (Request-wide modification query)

Served from: www.seguridad.im @ 2026-05-20 14:15:39 by W3 Total Cache
-->