You think your firewall is safe from hackers?
The Internet Storm Center has a post about how to get information from computers on the Internet. So you want to use the Internet? If you want to use…
Discussion of public breaches of security
The Internet Storm Center has a post about how to get information from computers on the Internet. So you want to use the Internet? If you want to use…
etutorials.org explains some Heap Overflow attacks This is an important sentence and diagram( from the etutorials.org: “Where the details of stack overflow exploitation rely on the specifics of hardware…
The 23rd USENIX Security conference 8/20 – 8/22 2014 discussed many subjects There is a specific paper about “An Internet-Wide View of Internet-Wide Scanning” by Zakir Durumeric University of Michigan zakir@umich.edu, Michael Bailey University…
In the realm of incidence reporting and response Management: CERT has a process to use. One has to have a Computer Security Incident Response Team (CSIRT) A security incident occurs when…
In 2011 Cisco put out a report there are 12.5 Billion devices connected to the Internet and since we have 6.8 Billion people there are more devices than people (tablets,…