DDOS Amplification Attack Study Shows Effectiveness
http://www.christian-rossow.de/publications/tcpamplification-woot2014.pdf written by: Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany The researchers did a variety of scans – udp and tcp…
#Cyberjoke v1.8 Friday
From http://www.glasbergen.com/wp-content/gallery/computer-cartoons/toon-1288.gif There are a lot more of many kinds of cartoons at glasbergen.com I like this one: JimmyKimmel – and his Cyber Security 3min on the street worth viewing…
Newsflash: The Internet is Not Secure
Am reading one of the articles from my Security Analyzed page at Network World http://www.networkworld.com/article/2309917/lan-wan/lan-wan-router-man.html William Yaeger created the multi protocol router from ireport.cnn.com: Christmas 1979 it happened. {Yeager goes…
October2015 Patch Tuesday: Including Windows Shell Vulnerability
https://technet.microsoft.com/en-us/library/security/ms15-oct.aspx Has several patches including MS15-106 ” One memory corruption vulnerability (CVE-2015-6056) has been publicly disclosed.” from the following link: https://msisac.cisecurity.org/advisories/2015/2015-121.cfm As far as Microsoft patches go – the ones…
Expirian Board of Directors: Growth Through Acquisition – But Without Security Testing
David Krebs story: http://krebsonsecurity.com/2015/10/at-experian-security-attrition-amid-acquisitions/ I want to focus on Board of Directors decisions to grow through acquisition, wanting to do growth securely, but in practice has lots of problems. The…
