Passwords in Compliance Standards
Compliance standards have similar goals (PCI – HIPAA – SOX – e-discovery) and the question is what should your password policy be to fulfill compliance and your own security risk…
Browser Sessions Trick Can Hack Encrypted Webservers
BlackHat¹ videos are up now… Specifically HEIST video² – Http Encrypted Information can be Stolen through TCP windows By Tom Van Goethem & Mathy Vanhoef Belgian researchers The technical video…
Diamond Model Intrusion Analysis
Did you want to set up your own Intrusion Analysis department? Or at least give a framework for creating a method to understand a breach. Then read this document at…
Zmodo camera Has hardcoded Security Flaw
Here is the “moneyquote”: Once it is scanned, you assign a name and connect to the camera. A very simple and elegant setup solution to get up and running quickly.…
Modern Hackers Good-Bad-Both
I have explained some of the description and history of a hacker on Fixvirus.com post¹: I want to refocus on the 3 types of hackers: White, Gray, and Black hat.…
