keep up with known vulnerabilities

keep up with known vulnerabilities. Here are some examples of sites that regularly post an updated list of isolated vulnerabilities:

http://www.hardened-php.net/advisories.15.html

http://www.milw0rm.com/

http://www.twitter.com/milw0rm

One of the most common methods an attacker will use is to use a search engine to isolate sites running content management systems with known security holes and using the known exploit to gain access to your system. Keeping a watchful eye on matters such as this is a very important task as system administrator.

Trackback URI | Comments RSS

Leave a Reply

You must be logged in to post a comment.