Excellent Security computing scientific papers collection

By Bradley Susser’s Blog bot24.blogspot.com  Science papers direct link I like Back to Basics  where the paper reviews our bad security model –  which used to work as networks were small and fixed computers on the inside protected from systems on the Internet.   Today our security model is where new devices get set up … Read more

New attack vector – Man-in-the-Browser Malware –

OWASP has a good description of Man-in-the-Browser or MITB attacks. I am trying to explain it with an image (this is a fictional account)- 1. the Customer (person trying to go use a financial website) goes to “Bank in USA” website. 2. The “Bank in USA” sends information to create a web interface for Customer. … Read more

Computer hacker pleads guilty on ATM fraud

CBS local in New York has an audio spot $14mil  in 2 days in 17 countries on 15000 ATM devices. Apparently JPMorgan Chase processed debit card transactions for the American Red Cross.   The hackers increased the withdrawal limits on the debit cards and then used the card information to withdraw money all over the … Read more

NASDAQ, PNC Bank, Heartland Payment Systems, 7-Eleven, JC Penney hacked

Arstechnica has an old story that I thought was interesting: From 2005 – 2012 there were multiple break -ins thus the hacker “owned” the various company sites. The overwhelming attack vector sued was SQL -injection. Her is an excerpt that I want to emphasize: “NASDAQ is owned,” Aleksandr Kalinin, a 26-year-old resident of St. Petersburg, Russia, … Read more

Everything Matters – what is important? HP Loadrunner vulnerability

Managers have to make decisions as to what to focus on: HP Loadrunner vulnerability is one of those. specifically 11.52 and here is the money quote:   RESOLUTION HP has provided LoadRunnner patch 11.52 Patch 1 to resolve this issue. Download the patch from HP Software Support Online (SSO). Note: For LR versions before 11.52 … Read more