Target hacked in 11 steps – 4 should’ve been stopped
CIO magazine has the 11 steps of the hack Step 3 exploit a web vulnerability should have been remediated, although the hackers were in the network they would have had…
Heap overflow attacks cause problems and then exploit system
etutorials.org explains some Heap Overflow attacks This is an important sentence and diagram( from the etutorials.org: “Where the details of stack overflow exploitation rely on the specifics of hardware architecture,…
JPMorgan Spent $250 mil dollars on security defense – still hacked.
In JPMorgan’s shareholder letter states on page 22. Ja,oe Dimon is Chairman and Chief Executive Officer By the end of 2014, we will have spent more than $250 million annually…
Microsoft says uninstall latest patch updates
Microsoft says MS14-045 some KB updates should be uninstalled due to crashes. ZDnet also describes an apparent flaw in KB2993651 Two of these (2970228 and 2975719) are among the updates…
How many scans are attacking the Internet?
The 23rd USENIX Security conference 8/20 – 8/22 2014 discussed many subjects There is a specific paper about “An Internet-Wide View of Internet-Wide Scanning” by Zakir Durumeric University of Michigan…
