Security Basics mailing list archives

Re: Vulnerability Data


From: lonervamp () gmail com
Date: Fri, 11 Feb 2011 12:52:01 -0700

Great question!

There is Zone-H.org (http://www.zone-h.org) which usually focuses on web defacements. Likewise the Vulnerabl Sites 
Database (http://www.vs-db.info).

There is the datalossdb.org (http://datalossdb.org) which tends to focus on # of records lost and by whom, via public 
records, but does also track the general breach types. I'm sure this gets interesting once an attack uses more than 1 
weakness and it sometimes doesn't satisfy the questions that security persons have about specific incidents.

There is the sanitized annual Verizon DBIR paper 
(http://securityblog.verizonbusiness.com/2010/07/28/2010-dbir-released/) which contains stats on distilled incident 
details.

But I'm not sure there is something specifically that will document, on an ongoing basis, various attacks mapped to 
discussions on how those attacks were performed/successful. Maybe not always in painful, recreation-type details, but 
enough to make it clear where the biggest problems lie (SQLi, lack of laptop disk encryption, social eng, weak 
passwords, LOIC/DDoS...) and that will include such hits as  Gawker, HBGary Federal, Mozilla and Apple/AT&T last 
year...  Some attacks are interesting while others border on the inane (guessed security questions).

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: