Perl Scripting vulnerability – Data Dumper
Perl discussion at lsexperts.de has a data Dumper vulnerability – review your Perl scripts to : Applications written in Perl should ensure that a sanity check on data serialized by…
Defend Your Systems
Perl discussion at lsexperts.de has a data Dumper vulnerability – review your Perl scripts to : Applications written in Perl should ensure that a sanity check on data serialized by…
What started as an environment of function and usability on Unix systems has devolved in another security exploit mess. US -CERT has the report for both potential exploits now (one…
There are two Common Vulnerability and Exposure CVE-2014-6271 and CVE-2014-7169 Akamai has posted it’s response CERT has posted it’s vulnerability Note Red Hat has developed the following test: $ env…
NTVUganda story Don’t look at the details of McKinnon and his extradition battle etc. (picture also from NTVUganda.co.ug) This is what is important: “Kenya’s Cabinet Secretary for Information Fred Matiang’i…
OWASP Testing Guidelines 2014 In software development there are 5 stages: Define, Design, Develop, Deploy, and Maintain. OWASP released some more overall testing methodology. When to test is the question?…