2Q report by IBM X-Force, 23% of websites vulnerable.

CSRF or Cross Site Request forgery is the highest likely method of attack Broken Authentication is second And cross-site scripting(XSS) is third SQL Injection as well as security misconfigurations are also higher than 10% of he vulnerability types.   The IBM report at X-Force blog  recounts the challenges a web application scanner has as to … Read more

Apple beats estimates, what is this backdoor in iOS?

today Apple beat estimates:  Deadline.com  with 35.2 mil iPhones sold   threatpost  has the info about a “stream of data” on an iPhone It looks like Jonathan Zdziarksi, a forensic scientist  and at Twitter: @JZdziarski. found a backdoor in iOS, it is supposedly used by Apple for troubleshooting, diagnostics and enterprise.   Apple responded to … Read more

Another CC breach at Goodwill industries or not?

KrebsonSecurity has a good rundown on what we know so far. Basically there has been a breach, some CC companies are noticing bad traffic, and the US secret service is in on the act. July 17th  the first card companies were noticing suspicious traffic. There is no other information in the news reports Goodwill Industries … Read more

Excellent Security computing scientific papers collection

By Bradley Susser’s Blog bot24.blogspot.com  Science papers direct link I like Back to Basics  where the paper reviews our bad security model –  which used to work as networks were small and fixed computers on the inside protected from systems on the Internet.   Today our security model is where new devices get set up … Read more

New attack vector – Man-in-the-Browser Malware –

OWASP has a good description of Man-in-the-Browser or MITB attacks. I am trying to explain it with an image (this is a fictional account)- 1. the Customer (person trying to go use a financial website) goes to “Bank in USA” website. 2. The “Bank in USA” sends information to create a web interface for Customer. … Read more