Is risk management working for us?
As we are devising new strategies and techniques so our businesses are not in the news, our business is not worth the time of the hackers etc. I want to…
Defend Your Systems
Discussion of public breaches of security
As we are devising new strategies and techniques so our businesses are not in the news, our business is not worth the time of the hackers etc. I want to…
Honeywell Point Of Sale(POS) systems – like the Dolphin Scanners: The components of Honeywell’s software (OLE for Retail POS systems to be exact) seem to be susceptible to buffer overflow…
A screenshot from the following Youtube video(below) – by Lenardo Ve: This is an instructive video how DNS can be hacked and attacked. And if successful it could cause an…
Due to the bad password practices of the general population, the latest example is the Sony Pictures hack uncovering the passwords of Sony Pictures employees(as well as SSN and more):…
How can you tell if malware is in your network? As the PCRE post at Internet Storm Center says: You can check your logfiles for certain signatures using “Perl Compatible…