OWASP has new Testing Guidelines Document
OWASP Testing Guidelines 2014 In software development there are 5 stages: Define, Design, Develop, Deploy, and Maintain. OWASP released some more overall testing methodology. When to test is the question?…
Android Browser has bug which can cause malware downloads
Arstechnica has the story Browsers are generally designed to prevent a script from one site from being able to access content from another site. They do this by enforcing what…
Who to trust to “hack your systems”?
Taosecurity has an interesting post. Is your network a jumble of wires andnetwork equipment but not yet ordered? Hiring a 19 year old hacker without an Associates degree and some…
Fixed “Extortionware” Virus on Windows8 machine
The computer said the following (Image below) The customer did not actually give out money, but the person on the phone was very cryptic, yet was saying your computer is…
Third party vendor hacked – caused Goodwill and more CC breaches
Krebsonsecurity has the story again. C&K Systems performs a portion of Credit card and Debit card transaction processing. The most disturbing aspect of this breach knowledge is that they did…
