OS & Software

8a958994958cdf24f0dc051edfe29462

Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Turkey – Another story on use of fraudulent digital certificates

January 04, 2013 Added by:Pierluigi Paganini

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

A New Way of Detecting Cybersecurity Attacks

January 04, 2013 Added by:Larry Karisny

Current IDS solutions have high instances of false positives and true negatives and are extremely costly to maintain. Current IDS solutions were not designed for today's hyper connected business processes with high volume of instances. Attempting to detect misuse or anomalous behaviors requires infinite numbers of rules, patterns or algorithms, which is not possible, and is therefore the cause of ...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

An Eleven Character Linux Denial of Service Attack & How to Defend Against it

January 03, 2013 Added by:Dan Dieterle

Meet the “Fork Bomb”. Basically all it does is instruct Linux to open processes – over and over again for an almost infinite number of times. Your RAM and CPU usage rises until the system no longer responds to input.

Comments  (0)

7e364bbac217114a59e547b354e7f7ad

Don’t Be Caught Playing the Fool (A Lesson in Why Change Control is Important)

January 03, 2013 Added by:Gary McCully

This is a real world story around the dangers of not following proper change control processes when placing new systems in production. In this blog I will discuss how one person’s actions could have resulted in an attacker gaining complete access to the organization’s internal network. I am hoping this example will cause organizations to take their change control processes a little more seriou...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Bug Bounty Programs - As a Service?

January 02, 2013 Added by:Rafal Los

Now, admittedly you already probably know I'm not a huge proponent of "bug bounty" programs, as I see the abuses and failure potential outweigh the redemption value in the cases I've seen outside of the few 'big names'... but this caught my attention because they may actually be onto something.

Comments  (0)

296634767383f056e82787fcb3b94864

Would a Malware BuyBack Program Work?

December 27, 2012 Added by:Jeffrey Carr

Most malware writers just want to be paid for their research; something that isn't happening frequently enough or at a rate that's considered fair by the researchers. As a result, some of those researchers are exploring grey markets in offensive malware development or are selling 0-days to clients...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Stuxnet is Back! No, new agencies have misunderstood

December 27, 2012 Added by:Pierluigi Paganini

Everytime news related to Stuxnet is spread on the Internet, immediately the worldwide security community writes on cyber war and the possible consequences of a cyber attacks, but what is really happening this time?

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Obligatory 2013 Infosec Predictions Post

December 26, 2012 Added by:Simon Moffatt

Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...

Comments  (0)

759c37c6aff04cd46262f93652b5fad5

Analysis of the Microsoft MS12-081 Vulnerability

December 19, 2012 Added by:Spencer McIntyre

This vulnerability would be useful for penetration testers and attackers alike depending on how it could be exploited and any other limiting factors. The following information is the result of a technical analysis of the patch on a Windows XP SP3 system...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran, the cyber shooting range, new malware detected

December 19, 2012 Added by:Pierluigi Paganini

Analysis revealed that the malicious code has a simple and efficient design that allows it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection...

Comments  (4)

Af9c34417f8e5e0d240850bb353b5d40

Security is Inconvenient, Deal With It!

December 17, 2012 Added by:Keith Mendoza

ZD Net had an article entitled "Kernel vulnerability places Samsung devices at risk" and I thought "so, what's new" until I followed the link to the forum post on xda-developers. Then I just lost it because I'm certain that this is a result of plain and simple laziness...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

How to get into your house through SmartTV

December 14, 2012 Added by:Pierluigi Paganini

Security experts posted a video that demonstrates how it is possible to attack a Samsung Smart TV exploiting a 0-day vulnerability to gain root access on it. The hacker could remotely wipe data from attached storage devices, monitoring and controlling the victim TV...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Common Malware Types: Cybersecurity 101

December 12, 2012 Added by:Fergal Glynn

The amount and variety of malicious programs out there is enough to make your head spin. This blog post will break down the common types of malicious programs and provide a brief description of each...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Skynet, the potential use of Tor as a bulletproof botnet

December 10, 2012 Added by:Pierluigi Paganini

In September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor...

Comments  (0)

296634767383f056e82787fcb3b94864

Flipping Malware: A Profit Opportunity for Corporate IT Departments

December 09, 2012 Added by:Jeffrey Carr

Some of the more forward-looking DOD contractors who have robust internal CERT with engineers who do reverse-engineering could be in the best position to offer free or low-cost network defense to corporations who want to "flip" the malware found on their network for a nice profit...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »