Quantcast
Channel: IT Trenches » infosec
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

A password reminder to carry with you

Okay, passwords may have reached the end of their useful life, but passwords are not gone yet. I know it is a challenge to come up with a unique secure password for all identities that we use to access...

View Article



Follow Twitter “How to become a hacker in 15 minutes”

Well, it looks like it might be time for me to join the “twitterpated“. Until now I did not see much value in this additional information source. With regards to Twitter, I tend to agree with President...

View Article

Malvertisements – 1.3 million viewed per day!

Last year the NY Times website had advertisements that served up some malicious content (Would you click if it showed on the NY Times website? – Really would you?). Now, in 2010, Dasient has released...

View Article

Federal Cybersecurity Game-Change R&D program announced

The Networking and Information Technology Research and Development (NITRD) Program has announced a cybersecurity game-change research and development program. On May 19, 2010, an event was held to...

View Article

SC Vision – web videos for infosec professionals

SC Magazine has announced the SC Vision TV website. Currently there is a collection of about 7 videos of interest to IT professionals on such topics as Driving More Informed Decision-Making in...

View Article


8-character passwords are so 1999 – 12 characters is 21st century

Today’s computers and add-on processors (think graphics processing units – GPU‘s) are extremely powerful. The GPU of today offers about 2 teraflops (10^12 floating operations/sec) of parallel...

View Article

Hackers send exploit code to Microsoft

Go ahead and report why your system crashed – send Microsoft the exploit code you are working on. As most Windows users know, you can send Microsoft details about what caused a system crash. In some...

View Article

DLL hole also affects EXE files

According to a Heise Media report, the DLL binary planting vulnerability is not just limited to DLL files but affects EXE files. The example given: An HTML file is saved along with a copy of a file...

View Article


Is there an orange ball in information security?

In Japan many retailers have what look like orange balls or waterballoons near checkouts. Bruce Schneier, a leading information security expert, recently blogged about these orange balls as...

View Article


Anatomy of a crimeware rootkit – scary stuff!

I came across a recent tutorial on reverse engineering the ZeroAccess / Max++ / Smiscer Crimeware Rootkit. This is a very malicious rootkit that has features such as: Modern persistence hooks into the...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images