IDApro and Microsoft
I want to respond to the following tweet, but in more than 140 characters:40mcomex @comex Reply Retweet Favorite · OpenIn which Microsoft posts an IDA screenshot of their own code? RT@dragosr:...
View ArticleInfoSec Daily Podcast Episode 603
Episode 603 - Irish Data, Certificate Authorities, 10.8 million, Skype, OH Infragard & Pastebin
View ArticleThe “Man in the Browser” attack
Gizmodo reports: New “Man in the Browser” Attack Bypasses Banks’ Two-Factor Authentication Systems Except there is nothing new about this attack. OWASP documented it in 2007 and it was widely known...
View ArticleSBN Sponsor Post
Get a sneak peak into RSA Conference 2012 with podcasts from industry experts and speakers.http://bit.ly/fmaLXU
View ArticleSix ways to be a model cyber citizen
Be cyber security aware, use security best practices and report cyber crime Use an antivirus product as it helps not only to protect you but prevents your computer from hosting malware that affect...
View ArticleDShield
DShield is an extension of the SANS Internet Storm Center and is a "distributed intrusion detection system for data collection and analysis", to quote their site. What this means, quite simply, is that...
View ArticleAT&T provides free user information yet again
In 20101, a few grey hat hackers (like weev) were arrested for downloading information about new iPad users that ATT had provided freely on its website. All the hackers did was download what ATT freely...
View ArticleSqlitespy for Sqlite Database analysis
Sqlite is the ubiquitous database for mobile applications on iPad, iPhone and Android. It is also used by certain internet browsers, web application frameworks and software products for their local...
View ArticleCSO Column: Improve your security leadership with one simple lesson from improv
Improv is great to watch and even more fun to learn and play (perform). There is a fundamental concept of improv that is essential for success — in improv, in life, and definitely for security...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleReal Government Cloud Computing Efforts
What’s really going on with cloud computing in government? That’s been the key question for both public and private sector technology and security leaders over the past few years. Other perplexing...
View ArticleFUD It’s What’s For Breakfast
I have screamed at vendors in the past for resorting to using fear uncertainty and doubt (FUD) to promote their wares. This does little more than a blistering disservice to the industry as a whole....
View ArticleNew Research: Majority of Cloud Deployments Not Secure
Surprised? Don’t be [notice the almost - but not quite- complete lack of any mention of ‘I told you so’]… ☁
View ArticleSolving Kioptrix Level 2 (SQL Injection)
*** SPOILER ALERT *** *** SPOILER ALERT *** *** SPOILER ALERT *** *** SPOILER ALERT *** It's no secret that I like a challenge and I recently came across the Kioptrix series of challenge VM's....
View ArticleMindshaRE: Yo Dawg, I heard you like reversing…
Posted by Aaron Portnoy ...so I reversed your reversing tool to help you reverse better. MindshaRE is our periodic look at some simple reverse engineering tips and tricks. The goal is to keep things...
View ArticleGovernment Ready to Use Physical Force During Cyberattack?
Here's a quote I came upon after researching DDoS attacks against root name servers. "If the United States found itself under a major cyberattack aimed at undermining the nation’s critical information...
View ArticleVoice spam tried to disrupt election in Ontario, Canada
This week, news has emerged in Canada of a police investigation into the use of robocalling (automated phone dialling, a.k.a. voice spam) in an apparent attempt to disrupt an election result.
View ArticleSSCC 84 – Cookie-gate, laptop security advice, Stratfor malicious emails and...
Paul Ducklin hosts this week's Chet Chat with the tables turned... Chet is the guest. They discussed the recent Google cookie-gate incident, House Intelligence Committee advice on using laptops while...
View Article