Wifi Attacks Succeed Against All:WEP/WPA
When do Wifi attacks Succeed? It depends on your setup Some basics: First of all, change your default admin password (since default admin passwords are on the Internet so that…
Defend Your Systems
When do Wifi attacks Succeed? It depends on your setup Some basics: First of all, change your default admin password (since default admin passwords are on the Internet so that…
Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, and Sharon Goldberg wrote a paper (out of Boston University) http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf “Attacking the Networking Time Protocol” Apparently if your servers and clients (which…
After seeing a good ISACA presentation today at the Renaissance in Saint Louis (near airport) http://www.isaca.org/chapters5/Saint-Louis/Pages/default.aspx by Josh Vander Veen with SpearTip Here are my notes: Sophistication of criminal attack…
The Internet Storm Center has a great article on the most common vulnerabilities in web applications (XSS or Cross Site Scripting) https://isc.sans.edu/forums/diary/When+encoding+saves+the+day/20277/ This is where some data is attempted insertion…
http://www.christian-rossow.de/publications/tcpamplification-woot2014.pdf written by: Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany The researchers did a variety of scans – udp and tcp…