Is risk management working for us?

As we are devising new strategies and techniques so our businesses are not in the news, our business is not worth the time of the hackers etc. I want to ask the question is risk management as a methodology really serving us well? Sure we justify and enumerate how much money to spend on security … Read more

Point of Sale Honeywell buffer overflow attack

Honeywell Point Of Sale(POS) systems – like the Dolphin Scanners: The components of Honeywell’s software (OLE for Retail POS systems to be exact) seem to be susceptible to buffer overflow attacks. Threatpost blogpost Relevant paragraph: “The Honeywell OPOS Suite provides a standard programming interface that allows POS hardware to be easily integrated into retail POS … Read more

Best Password Management

Due to the bad password practices of the general population, the latest example is the Sony Pictures hack uncovering the passwords of Sony Pictures employees(as well as SSN and more):     As in our previous post where  we discussed the hack. Now various forums are picking apart the very bad password practices of Sony Pictures … Read more

Is malware in your network?

How can you tell if malware is in your network? As the PCRE post at Internet Storm Center says: You can check your logfiles for certain signatures using “Perl Compatible Regular Expressions” (PCRE) Perl is a scripting programming language perl.com gets into some of it’s details. Of course that assumes you have a proxy server and … Read more