DDOS Attack Allows Million$ Transferred To Mule
After seeing a good ISACA presentation today at the Renaissance in Saint Louis (near airport) http://www.isaca.org/chapters5/Saint-Louis/Pages/default.aspx by Josh Vander Veen with SpearTip Here are my notes: Sophistication of criminal attack…
Internet Explorer is Most Vulnerable Browser
The Internet Storm Center has a great article on the most common vulnerabilities in web applications (XSS or Cross Site Scripting) https://isc.sans.edu/forums/diary/When+encoding+saves+the+day/20277/ This is where some data is attempted insertion…
DDOS Amplification Attack Study Shows Effectiveness
http://www.christian-rossow.de/publications/tcpamplification-woot2014.pdf written by: Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany The researchers did a variety of scans – udp and tcp…
#Cyberjoke v1.8 Friday
From http://www.glasbergen.com/wp-content/gallery/computer-cartoons/toon-1288.gif There are a lot more of many kinds of cartoons at glasbergen.com I like this one: JimmyKimmel – and his Cyber Security 3min on the street worth viewing…
Newsflash: The Internet is Not Secure
Am reading one of the articles from my Security Analyzed page at Network World http://www.networkworld.com/article/2309917/lan-wan/lan-wan-router-man.html William Yaeger created the multi protocol router from ireport.cnn.com: Christmas 1979 it happened. {Yeager goes…
