November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,644 hits
Tag Archives: 2015
Ghost to the Shell
During a code audit, researchers at Qualys discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc which can get access to the shell. The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to … Continue reading
Posted in Security Blog
Tagged 2015, gethost, GHOST, Linux, qualys, vulnerability
Comments Off on Ghost to the Shell
Game of Hacks
Test your application hacking skills! You will be presented with vulnerable pieces of code and you must find which vulnerability exists in that code as quickly as possible. You can also submit questions.
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, Malicious Code and Application Attacks, Secure Coding, Security Awareness Video Games, Software Development Security
Comments Off on Game of Hacks
HealthCare.gov Includes Health Data in its own URLs
The website, Healthcare.gov leaks data via referer (mispelled accidentally, but stuck) headers. When you visit a website in general, the referer codes tells the new loading site, where you came from. Since healthcare.gov stores information in the referer headers, It’s … Continue reading
Posted in Security Blog
Tagged 2015, cyber, cyberprofiling, healthcare.gov, leaks, profiling, referer, referrer
Comments Off on HealthCare.gov Includes Health Data in its own URLs
Is that a Mouse in your Pocket or?
You ready to bring unauthorized hardware on my ‘secure’ network? Mouse-box, the computer in a mouse, is still in prototype. All we know right now is that it is running ChromeOS or Linux. Maybe a variant of Kali will work too. … Continue reading
4.5 Malware Variants a Second
According to German Independent IT Security company AV-TEST, there are 12,000,000 variants of malware a month. That’s about 4.5 every second! Malware, a combination of the words Malicious and Software, can be downloaded or sent to users to click on … Continue reading
Posted in Security Blog
Tagged 2015, antivirus, malware, security, Security Awareness, viruses
Comments Off on 4.5 Malware Variants a Second
Want Someone’s Password? Just Ask!
Posted in Security Blog
Tagged 2015, passwords, Security Awareness
Comments Off on Want Someone’s Password? Just Ask!
XKCD Comic on Password Strength and Random Words
Use the Four Random English Word Generator!
Posted in Security Blog
Tagged 2014, 2015, passwords, Security Awareness, xkcd
Comments Off on XKCD Comic on Password Strength and Random Words
Worst Passwords of 2014
An analysis of the most leaked passwords that were posted online throughout 2014, out of the 3.3 million passwords leaked online, the most common, Top 15 were: 123456 password 12345 12345678 qwerty 1234567890 1234 baseball dragon football 1234567 monkey letmein … Continue reading
Posted in Security Blog
Tagged 2014, 2015, authentication, Information Technology Security Awareness, passwords, reputational security, two-factor
Comments Off on Worst Passwords of 2014
Progressive Insurance’s Snapshot Can be Used to Control Vehicles
2,000,000 vehicles already have the Progressive Snapshot plugged into them via the OnBoardDiagnostic(OBD)-II Port. Digital Bond Labs described at a security conference last week how the Snapshot could be used to hack into some vehicles’ onboard networks. Testing was limited … Continue reading
Posted in Security Blog
Tagged 2015, car hacking, Flo, mitm, Progressive Insurance, Snapshot, zombie
Comments Off on Progressive Insurance’s Snapshot Can be Used to Control Vehicles