Studying Data Breaches as a whole

IBM has an infographic and a report: http://www-935.ibm.com/services/us/en/security/infographic/cybersecurityindex.html http://www-935.ibm.com/services/us/en/it-services/security-services/cost-of-data-breach/ (we make a point to show you the whole link, so you know exactly where you are going) The image above is a snippet from the infographic  IBM has gathered this information from the Ponemon Institute research report (you can download these reports if you register … Read more

Does windows have a Shellshock problem too?

Windows administrators were sitting back and watching the Shellshock CVE (Common Vulnerabilities Exposures) fireworks CVE-2014-6277 and CVE-2014-6278 Now that we(Security IT community) are thinking Shellshock …  Does windows have a problem as well? First of all let’s define “Shellcode” – as in Projectshellcode.com   Shellcode is when one can create a “shell” from the attacked machine and … Read more

Perl Scripting vulnerability – Data Dumper

Perl discussion at lsexperts.de  has a data Dumper vulnerability – review your Perl scripts to : Applications written in Perl should ensure that a sanity check on data serialized by Data::Dumper is performed.   WordPress vulnerabilities page which was recently set up. Andreas Kurtz found malicious iOS apps  after iOS 8 was released. The issue … Read more