passwords

Good afternoon everybody! I hope your day is going well. Things look a little different below because Delicious's API appears to be having issues at the moment.  Anyway, here are today's Interesting Information Security Bits from around the web.

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Just go read it. Seriously. But make sure you aren't drinking anything when you do. 🙂
    If Twitter were all we had for security ...
    Tags: ( humor )
  2. Looks like something very nifty is coming soon to a phishing station near you.
    Coming soon to a pentest near you... | carnal0wnage.attackresearch.com
    Tags: ( tools )
  3. You might want to go ahead and changed your default passwords. It could get pretty expensive if you don't.
    Security Fix - Default Passwords Led to $55 Million in Bogus Phone Charges
    Tags: ( passwords )
  4. A great collection of sources for reverse engineering and malware analysis information from Rob.
    Getting your fill of Reverse Engineering and Malware Analysis | Room362.com
    Tags: ( reverse-engineering malware-analysis )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Mike Murray and Lee Kushner have a podcast series that each of us should be listening to.
    When Your Security Career Gets Hacked - Dark Dominion Blog - Dark Reading
    Tags: ( career )
  2. Both amusing and helpful.
    Job Interview: How To Nail An Interview (20 Tips)
    Tags: ( career interviewing )
  3. Go ahead write those passwords down. Just not all of it. I like this idea as long as we are careful in picking the "pin" part, i.e. don't use your birthday 🙂
    Put Your Passwords on a Post-it - F-Secure Weblog : News from the Lab
    Tags: ( passwords )
  4. The annual FBI cryptography challenge is up. Go crack em' up.
    FBI Annouces Annual Can-You-Crack-the-Code Challenge
    Tags: ( cryptography challenge )
  5. Christofer is talking about something he touched on at RSA and before, who manages the network in the virtually cloudy world, the server admins or the network admins or both?
    Rational Survivability >> Quick Bit: Virtual & Cloud Networking - Where It ISN'T Going...
    Tags: ( virtualization networking )
  6. Another PDF parsing vulnerability in BES. I believe a patch is now available.
    How to control a Blackberry Enterprise Server with just a PDF | Graham Cluley's blog
    Tags: ( pdf rim blackberry vulnerability )
  7. McAfee did a study to determine what the riskiest search terms are. This report is the result of that study. Note: Link goes to PDF (via: eWeek)
    The Web's Most Dangerous Search Terms
    Tags: ( malware search )
  8. This is a nice article on using ITIL to improve and strengthen your information security program.
    How ITIL Can Improve Information Security
    Tags: ( itil )
  9. An interesting exploration of a insider attack on California Water Service Company that occurred recently.
    Ascension Blog >> He did WHAT?!?!
    Tags: ( breach )
  10. L0phtcrack is back and raring to go.
    L0phtcrack 6 Site Is Live : Liquidmatrix Security Digest
    Tags: ( passwords tools l0phtcrack )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Some interesting stats, however, the title is a bit misleading, the percentages for 20's, 30's and 40's are 25%, 23% and 20% respectively. Not exactly what I would call significant regarding 20's.
    ID theft up, and 20somethings suffer most | Security - CNET News
    Tags: ( theft identity )
  2. A very nice diagram depicting risk. Hat tip: Gunnar Peterson
    Telic Thoughts: Threats, vulnerabilities and risk
    Tags: ( risk )
  3. Time to update your PHP installations.
    PHP plugs security holes | Zero Day | ZDNet.com
    Tags: ( vulnerability patches php )
  4. Christofer waxes poetic on cloud computing.
    Rational Survivability: Ron Popeil and Cloud Computing In Poetic Review...
    Tags: ( cloud )
  5. A nice post that shows you how to build a u3 USB keyfob that will gather information from a windows system using nothing but built in tools.
    Syn: USB Enumerator vs USB Hacksaw
    Tags: ( tools usb u3 information-gathering )
  6. A nifty little how-to on using self-signed certs with Burp.
    un-excogitate.org >> Blog Archiv >> Self-signed Certificates in Burp
    Tags: ( pentest burp )
  7. Woot! L0phtCrack is alive again. I'm jealous of those who will get to see the launch live at Source Boston.
    L0phtCrack 6
    Tags: ( cracking password windows )
  8. Irongeek has written a set of PHP scripts that demonstrate all 10 of the vulnerabilities described by the OWASP Top 10. Very cool stuff.
    Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 10
    Tags: ( tools )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 1 comment }

Good afternoon everybody! I hope your day is going well. Here are today's Interesting Information Security Bits from around the web.

  1. Not only is malware watching what you type, now it is taking screen captures of what you are looking at.
    Bot software peers at victims' screens
    Tags: ( malware botnet )
  2. Once again, failure to effectively secure data on a mobile storage device bites someone in a tender place.
    New Zealand man buys MP3 player with U.S. troop data | Security - CNET News
    Tags: ( breach )
  3. A very nice article about storing passwords securely.
    How To Protect Your Users From Password Theft
    Tags: ( passwords )
  4. Jeremiah is collecting the top web hacking techniques for 2008. This year the winner gets a free pass to Blackhat.
    Jeremiah Grossman: Calling all Researchers! Send in the Top Web Hacking Techniques of 2008
    Tags: ( hacking )
  5. Qualys has release a free e-book titled "PCI Compliance for Dummies." Obviously, registration required, etc. Drazen thinks it's worth a read.
    Hat tip: http://beastorbuddha.com/2009/01/27/pci-compliance-for-dummies-from-qualys/
    e-Book: "PCI for Dummies"
    Tags: ( pci )
  6. Some good advice regarding tap vs span port decisions.
    TaoSecurity: Why Network Taps
    Tags: ( network ids taps )

That's it for today.

Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

-Kevin

Reblog this post [with Zemanta]

{ 0 comments }