If Humans Weak Link Then Fix mobile security losses
If the weakest link in Security or the equal parts of security : People, Process, and Technology, then we need to help the people in your organization with keeping up…
Is the Router the Weak Link?
New Cisco attacks on the IOS operating system (a Cisco operating system). http://tools.cisco.com/security/center/viewAlert.x?alertId=40411 There are actually no product vulnerabilities, but just plain old administrative access problems. What happens if someone…
Newsflash: Software has bugs – 0day vulnerabilities
FireEye and Kaspersky had zero-day vulnerability bugs in their software. http://www.zdnet.com/article/fireeye-kaspersky-hit-with-zero-day-flaw-claims/ It is not news that software has flaws, and that some flaws are vulnerabilities that can be exploited by…
Best computer Jokes #Cyberjoke Friday v1.5
Best image from Google image search ” computer jokes” What can be described as funniest joke? Well there is an Edinburgh fringe joke contest and in 2011 there was a…
Application Security Testing : Do It Now
Yes as Veracode says: https://www.veracode.com/blog/2015/07/application-security-assessment-reviewing-your-testing-program-sw They list 3 misconceptions: QA (Quality Assurance) is when development is done. Third party software does not need testing Developers don’t care about security We…
