Is the Router the Weak Link?

New Cisco attacks on the IOS operating system (a Cisco operating system). http://tools.cisco.com/security/center/viewAlert.x?alertId=40411 There are actually no product vulnerabilities, but just plain old administrative access problems. What happens if someone gets your admin account on the router? The hacker will not change routes so you fix it, the hacker will upload a hacker special malware … Read more

Newsflash: Software has bugs – 0day vulnerabilities

FireEye and Kaspersky had zero-day  vulnerability bugs in their software. http://www.zdnet.com/article/fireeye-kaspersky-hit-with-zero-day-flaw-claims/ It is not news that software has flaws, and that some flaws are vulnerabilities that can be exploited by hackers.  What is news is that FireEye is a cybersecurity company: With firewall devices among their product lines. http://www.theregister.co.uk/2015/09/08/fireeye_0day/  Says that the security researcher put … Read more

Application Security Testing : Do It Now

Yes as Veracode says: https://www.veracode.com/blog/2015/07/application-security-assessment-reviewing-your-testing-program-sw They list 3 misconceptions: QA (Quality Assurance) is when development is done. Third party software does not need testing Developers don’t care about security   We have to perform QA during development as well as after. All software needs security testing and not just functional testing. Sio what should you … Read more

Dangerous Vulnerability? Some Routers Bad UPnP Authentication

This is the problem with some security issues(complicated technical issues that require expertise to fix): http://www.kb.cert.org/vuls/id/361684 Home routers implementing the UPnP protocol do not sufficiently randomize UUIDs in UPnP control URLs, or implement other UPnP security measures. This attack has the beginnings of a potential problem, some vendors have sufficient protection built-in: “Some vendors have … Read more

Focus on Quality Improves Computer Security

There is a great white paper at sans.org      Elizabeth Stanton wrote it to highlight “Security through Quality Assurance Practices”   I found it by doing a google search “quality computer security”. In my quest for trying to explain to non-security people why they need to pay more attention to computer security without blasting headlines … Read more