Blog Posts Tagged with "Debugging"
Buggy out the Door: Externally Discovered Defects (EDD)
August 15, 2012 Added by:Rafal Los
What if 25% of your bugs actually ARE discovered by your customers? There is a collision of a few things here that makes this matter a lot less simple than we'd like, and a lot less convenient if you think you have a solution to the problem, but in the end it is a problem...
Comments (0)
Chinese-Made US Military Chip: Backdoor or Debugging Function?
May 29, 2012 Added by:Plagiarist Paganini
News has been circulating on internet about a microchip used by the US military and manufactured in China that contains a secret "backdoor" that makes possible remote control of devices utilizing it. Security expert Robert Graham has declared that the bug is merely for debugging operations...
Comments (0)
The (Hidden) Cost of Security Fixes in Enterprise Software
May 29, 2012 Added by:Rafal Los
Who should pay for fixes necessary to patch security defects in software? The question is deeper than whether fixes should be made available free of charge for software components that are found to contain issues. There are more costs than simply acquiring the fix here, which is where the conversation changes...
Comments (1)
Who Fights for the Users?
March 11, 2012 Added by:Ali-Reza Anghaie
The No More Free Bugs effort has changed the landscape by which security research is done. Before, you had one monetized market for such research - the black market. Now a new player has entered the fray - Government - and I'm not entirely sure I like where this is going...
Comments (0)
Google Releases Vulnerability Fixes with Chrome 17.0.963.65
March 05, 2012 Added by:Headlines
Google has released Chrome 17.0.963.65 for Windows, Macintosh, Linux and Google Chrome Frame which provides fixes for multiple vulnerabilities identified may have allowed for denial-of-service (DoS) attacks or the execution of malicious arbitrary code...
Comments (0)
Log Management: Debugging Security
February 18, 2012 Added by:Danny Lieberman
Logs are key to security management not only for understanding what and why an event happened but also in order to prove regulatory compliance. The business requirements are that security logs should be both relevant and effective...
Comments (0)
Top Ten Mistakes Made By Linux Developers
December 11, 2011 Added by:Danny Lieberman
My colleague, Dr. Joel Isaacson talks about the top ten mistakes made by Linux developers. It’s a great article and great read from one of the top embedded Linux programmers in the world...
Comments (0)
AmEx Secures Website Admin Debugging Panel Error
October 06, 2011 Added by:Headlines
“An attacker could inject a cookie stealer combined with jQuery’s .hide() and harvest cookies which can, ironically enough, be exploited by using the admin panel provided by sloppy American Express developers," Femerstrand explained in a blog post...
Comments (0)
AAA Security Troubleshooting
June 27, 2011 Added by:Dawn Hopper
In troubleshooting authentication, using specific debug tacacs+ or debug radius commands often provide too detailed and obscure output to anyone except those extremely knowledgeable in the protocols. Instead, the debug AAA authentication generic command has several advantages...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization