hacker process explained: Don’t get SVAPEC’d Criminal Hackers use this method: Scan-> Vulnerability Assessment –> Penetrate and Exploit –> Control = SVAPE&C You should do the SVA…
Why do hackers want to hack you? To steal your data and reputation, so they can make money. (a criminal in Romania – $10000 is…
2nd show Fixvirus Security Show NewsofDay: POODLE(Padding Oracle On Downgraded Legacy) resurfaces – i.e. Not just the original issue https://www.openssl.org/~bodo/ssl-poodle.pdf – But the new one: https://www.imperialviolet.org/2014/12/08/poodleagain.html F5 has issued…
We will set up a daily(M-F) Tip-of-day and News-of-day segment Here is the first one – about tomorrows Patch Tuesday and plan for next year…
Our Blog at Oversitesentry.com goes over in some detail the new XSS attack vector. An exifdata image could include scripts that may affect you or your website…
It means anyone with Internet can email you anywhere in the world – that is a good thing (it may not be that useful if…
Securosis discusses the “CloudSOC” And as usual one has to decide what they will protect – is your data on the cloud? Where is your…