A password reminder to carry with you
Okay, passwords may have reached the end of their useful life, but passwords are not gone yet. I know it is a challenge to come up with a unique secure password for all identities that we use to access...
View ArticleFollow Twitter “How to become a hacker in 15 minutes”
Well, it looks like it might be time for me to join the “twitterpated“. Until now I did not see much value in this additional information source. With regards to Twitter, I tend to agree with President...
View ArticleMalvertisements – 1.3 million viewed per day!
Last year the NY Times website had advertisements that served up some malicious content (Would you click if it showed on the NY Times website? – Really would you?). Now, in 2010, Dasient has released...
View ArticleFederal Cybersecurity Game-Change R&D program announced
The Networking and Information Technology Research and Development (NITRD) Program has announced a cybersecurity game-change research and development program. On May 19, 2010, an event was held to...
View ArticleSC Vision – web videos for infosec professionals
SC Magazine has announced the SC Vision TV website. Currently there is a collection of about 7 videos of interest to IT professionals on such topics as Driving More Informed Decision-Making in...
View Article8-character passwords are so 1999 – 12 characters is 21st century
Today’s computers and add-on processors (think graphics processing units – GPU‘s) are extremely powerful. The GPU of today offers about 2 teraflops (10^12 floating operations/sec) of parallel...
View ArticleHackers send exploit code to Microsoft
Go ahead and report why your system crashed – send Microsoft the exploit code you are working on. As most Windows users know, you can send Microsoft details about what caused a system crash. In some...
View ArticleDLL hole also affects EXE files
According to a Heise Media report, the DLL binary planting vulnerability is not just limited to DLL files but affects EXE files. The example given: An HTML file is saved along with a copy of a file...
View ArticleIs there an orange ball in information security?
In Japan many retailers have what look like orange balls or waterballoons near checkouts. Bruce Schneier, a leading information security expert, recently blogged about these orange balls as...
View ArticleAnatomy of a crimeware rootkit – scary stuff!
I came across a recent tutorial on reverse engineering the ZeroAccess / Max++ / Smiscer Crimeware Rootkit. This is a very malicious rootkit that has features such as: Modern persistence hooks into the...
View Article
More Pages to Explore .....