Internet Explorer is Most Vulnerable Browser

The Internet Storm Center has a great article on the most common vulnerabilities in web applications (XSS or Cross Site Scripting) https://isc.sans.edu/forums/diary/When+encoding+saves+the+day/20277/   This is  where some data is attempted insertion into the web application somehow.   So the unfortunate browser response from Internet explorer is Internet Explorer: GET /myform/action/post?myparam=”>%20Test So what you say I … Read more

DDOS Amplification Attack Study Shows Effectiveness

http://www.christian-rossow.de/publications/tcpamplification-woot2014.pdf written by: Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany The researchers did a variety of scans – udp and tcp based scans to test the Internet. This table means that there are hundreds of thousands potential computers(network devices) on the Internet that can be used … Read more

#Cyberjoke v1.8 Friday

From http://www.glasbergen.com/wp-content/gallery/computer-cartoons/toon-1288.gif   There are a lot more of many kinds of cartoons at glasbergen.com I like this one:     JimmyKimmel – and his Cyber Security 3min on the street   worth viewing http://vidworthy.com/cybersecurity-no-never-heard-of/ What is your password Jamieson What is your password? my dogs name and the year I graduated from high School Jamieson2009 … Read more

Newsflash: The Internet is Not Secure

Am reading one of the articles from my Security Analyzed page at Network World  http://www.networkworld.com/article/2309917/lan-wan/lan-wan-router-man.html William Yaeger created the multi protocol router from ireport.cnn.com: Christmas 1979 it happened. {Yeager goes on to describe how they used router technology as a connection from the Standford Medical School to the Department of Computer Science.  He describes the … Read more

October2015 Patch Tuesday: Including Windows Shell Vulnerability

https://technet.microsoft.com/en-us/library/security/ms15-oct.aspx Has several patches including  MS15-106  ” One memory corruption vulnerability (CVE-2015-6056) has been publicly disclosed.”  from the following link: https://msisac.cisecurity.org/advisories/2015/2015-121.cfm   As far as Microsoft patches go – the ones that patch remote code execution in the vulnerability impact column. And 4 of the 6 have remote code execution.   As a systems person I … Read more