Some Restaurant software is unsafe for credit cards

Signature Systems Inc  based out of Newtown, PA sent out press release If you see your restaurant has PDQ software then you should likely reset your credit cards: Joanie’s – St. Louis, MO 6/19/2014 7:29 AM 8/1/2014 10:52 PM Joe’s Pizza – Greenville, IL 6/19/2014 8:05 AM 8/1/2014 11:59 PM Joe’s Pizza and Pasta – … Read more

Bash Shellcode truth

There are two Common Vulnerability and Exposure CVE-2014-6271 and CVE-2014-7169   Akamai has posted it’s response CERT has posted it’s vulnerability Note Red Hat has developed the following test: $ env x='() { :;}; echo vulnerable’ bash -c “echo this is a test” RedHat Blog also discusses it and has set up a FAQ Updating Bash on … Read more

What is the true value of a test scan and attack?

To test or not to test? We are constantly inundated over different advertisements, and have an inherent distrust of something new. The problem that a company has is that …    (picture of radar installation) the hackers are scanning the Internet for any machines they can access using free tools.   Scanning the Internet Is … Read more

Cyber -Crime is big business – and it is living right next to you.

NTVUganda story   Don’t look at the details of McKinnon and his extradition battle etc.  (picture also from NTVUganda.co.ug) This is what is important: “Kenya’s Cabinet Secretary for Information Fred Matiang’i estimates that the country lost nearly Ksh2 billion ($22.56 million) to cyber crime, with close to 1,000 Kenyans falling victim to Internet fraud on … Read more

OWASP has new Testing Guidelines Document

    OWASP Testing Guidelines 2014  In software development there are 5 stages: Define, Design, Develop, Deploy, and Maintain.   OWASP released some more overall testing methodology.  When to test is the question?  Ideally one tests at all stages of the SDLC (Software Development Life Cycle). But where is it most optimal to test? If … Read more