Bash Shellcode truth
There are two Common Vulnerability and Exposure CVE-2014-6271 and CVE-2014-7169 Akamai has posted it’s response CERT has posted it’s vulnerability Note Red Hat has developed the following test: $ env…
Defend Your Systems
There are two Common Vulnerability and Exposure CVE-2014-6271 and CVE-2014-7169 Akamai has posted it’s response CERT has posted it’s vulnerability Note Red Hat has developed the following test: $ env…
NTVUganda story Don’t look at the details of McKinnon and his extradition battle etc. (picture also from NTVUganda.co.ug) This is what is important: “Kenya’s Cabinet Secretary for Information Fred Matiang’i…
OWASP Testing Guidelines 2014 In software development there are 5 stages: Define, Design, Develop, Deploy, and Maintain. OWASP released some more overall testing methodology. When to test is the question?…
Krebsonsecurity has the story again. C&K Systems performs a portion of Credit card and Debit card transaction processing. The most disturbing aspect of this breach knowledge is that they did…
Internet Storm Center has some more discussion The bottom line is Symantec has said its software products can only catch 50% or so of the viruses out there. PCMag says…