XARA – An old way to hack: Cross Application Resource Access

Cross Application Resource Access = XARA  is another way to hack applications on a computer, it was researched with the following paper:  https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view The Mac OSX and iOS operating systems were tested in the research paper by the 6 researchers:  Luyi Xing,  Xiaolong Bai, tongxin Li, XiaoFeng Wang, Kai Chen, and Xiaojing Liao In fact … Read more

Kenn White says OpenSSL Being Rewritten

At last weeks Showmecon Kenn White spoke about the project he is auditing OpenSSL. the following is from the webpage https://opencryptoaudit.org/people   When I first walked in to listen to his speech at the show, I was not paying attention, as the topic seemed to be about how some basic hacks were occuring. Including the ones … Read more

Assume YOU Are Hacked!!!

Let me explain with a small history lesson: It is a good assumption that as the Internet helped create a global community, we are no longer connecting our computers to a LAN – Local Area Network with a firewall that can defend the network against  the local regional troublemakers(the local youth or hackers that are learning … Read more

HIPAA Enforcement: 10% of any covered entity Will be audited says Office for Civil rights

At Showmecon  (www.showmecon.com – June8,9 2015) I went to a HIPAA compliance talk by Hudson Harris “HIPAA 2015- Wrath of the Audits”   It was an excellent talk by Hudson Harris  @legallevity  (his Twitter account) And this is what my report (or what I got out of it) is:   1.  10% of all HIPAA covered … Read more