Point of Sale Honeywell buffer overflow attack

Honeywell Point Of Sale(POS) systems – like the Dolphin Scanners: The components of Honeywell’s software (OLE for Retail POS systems to be exact) seem to be susceptible to buffer overflow attacks. Threatpost blogpost Relevant paragraph: “The Honeywell OPOS Suite provides a standard programming interface that allows POS hardware to be easily integrated into retail POS … Read more

Best Password Management

Due to the bad password practices of the general population, the latest example is the Sony Pictures hack uncovering the passwords of Sony Pictures employees(as well as SSN and more):     As in our previous post where  we discussed the hack. Now various forums are picking apart the very bad password practices of Sony Pictures … Read more

Is malware in your network?

How can you tell if malware is in your network? As the PCRE post at Internet Storm Center says: You can check your logfiles for certain signatures using “Perl Compatible Regular Expressions” (PCRE) Perl is a scripting programming language perl.com gets into some of it’s details. Of course that assumes you have a proxy server and … Read more

Escalation Privilege threats – What’s the big deal?

Mitre has a nice article on how thin client technology with Secure Remote Peripheral Encryption Tunnels (SeRPEnT). Their image shows how a thin client can have a trusted connection to the server and thus have a trusted connection to the server.     The article pushes thin clients and as we all know thin clients can … Read more