Make Software Secure Now!
Just for fun I wanted to make the headline to be “Make Software Secure Again” But when was software secure? Never, as we assumed it was secure but actually SW…
Passwords in Compliance Standards
Compliance standards have similar goals (PCI – HIPAA – SOX – e-discovery) and the question is what should your password policy be to fulfill compliance and your own security risk…
Browser Sessions Trick Can Hack Encrypted Webservers
BlackHat¹ videos are up now… Specifically HEIST video² – Http Encrypted Information can be Stolen through TCP windows By Tom Van Goethem & Mathy Vanhoef Belgian researchers The technical video…
Diamond Model Intrusion Analysis
Did you want to set up your own Intrusion Analysis department? Or at least give a framework for creating a method to understand a breach. Then read this document at…
Zmodo camera Has hardcoded Security Flaw
Here is the “moneyquote”: Once it is scanned, you assign a name and connect to the camera. A very simple and elegant setup solution to get up and running quickly.…
