Good afternoon everybody! I hope your day is going well.
Here are today's Interesting Information Security Bits from around the web.
- A nifty series on dumping passwords from the memory of a system.
Dumping Memory to extract Password Hashes Part 1 | Attack Research
Tags: ( passwords ) - Part 2.
Dumping Memory to extract Password Hashes Part 2 | Attack Research
Tags: ( passwords ) - An interesting article with some interesting conversation in the comments. I tend to agree that IDS outside the firewall isn't really buying us much except for in very specific cases like one presented in the comments.
Why is your IDS outside your Firewall?
Tags: ( ids ) - More good reading on implementing a change management program.
Black Fist Security: Change Management part 2
Tags: ( change-management ) - Like the old adage says, "Lie, D*mn lies, and statistics." 🙂 Not really. Just make sure the statistics/metrics you are presenting make sense and the comparisons you are making are accurate.
Beware the Security Metric
Tags: ( metrics ) - Some good thoughts on things to consider when outsourcing.
Security Manager's Journal: Geography is a small detail in security world
Tags: ( outsourcing ) - A nifty walk-through on reverse engineering an iPhone app.
Reverse Engineering iPhone AppStore Binaries
Tags: ( iphone reverse-engineering ) - Looks like Conficker is upping the ante.
Conficker gets upgraded with defenses * The Register
Tags: ( malware ) - Oh boy, new toys. HD Moore has released a new toy that let's you perform war dialing using VOIP. Shiny!
Metasploit's HD Moore releases 'war dialing' tools | Zero Day | ZDNet.com
Tags: ( tools pentest wardialing ) - This is the second of two articles on the perils of metadata. This part offers some tips on reducing data leakage due to metadata.
Tech Insight: How To Prevent Dangerous Leaks From Your Metadata - DarkReading
Tags: ( metadata )
That's it for today. Have fun!
Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.
Kevin
{ 0 comments }