Tag Archives: NSS Labs

Consumer AVs And Exploit Prevention

Targeted attacks exploiting endpoint vulnerabilities are becoming more and more common and increasingly aggressive.... Read More

If Phishing Goes Mobile…

One of the most surprising things I noticed concerning the Lockheed Martin Affair, was the affirmation contained in the Reuters Article, made  by Rick Moy, president of NSS Labs, indicating that the initial RSA attack was followed by malware and phishing campaigns seeking specific data to link tokens to end-users (an indirect evidence of the same authors behind the infamous RSA breach and the Lockheed Martin attack.... Read More

More Random Thoughts on the RSA Breach

[caption id="" align="alignright" width="266" caption="Image via Wikipedia"]The X-35, Joint Strike Fighter from Lockheed M...[/caption]

Probably it was a quite easy prediction, however it looks like what I suggested on my random thoughts on the RSA Breach has definitively come true: RSA was not the target, probably its customers were.... Read More

TCP Split Handshake: Why Cisco ASA is not susceptible

As I told yesterday, I was not very satisfied with the updated NSS remediation guide concerning the TCP Split Handshake issue, published after the second round of testing on Cisco and Fortinet devices.... Read More

TCP Split Handshake: The (Never)ending Story…

[caption id="" align="alignright" width="240" caption="Image by Audric Leperdi via Flickr"]Cisco ASA 5510 Adaptive Security Appliance Cluster[/caption]

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible... Read More

Other Considerations On TCP Split Handshake

The storm unleashed by NSS Labs test for the TCP split handshake attack which affected 5 firewall vendors  is far from being quiet.... Read More

TCP Split Handshake Attack Explained

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible... Read More