Here's an interesting piece from 1998/1999 on how to find security holes. If a program has a bug in it that manifests under extreme circumstances,…
Here is a step by step process for how to deal with handling a security breach. 1. Figure out what type of breach has occurred…
Need to find out more about VPNs or Access Control? There is a great resource (other than Google) that can help. Check out the SANS…
Sadly we still see internet banking sites with rookie mistakes in configuration and/or coding. Many are susceptible to XSS and frame spoofing attacks. According to…
It must be Thursday. I'm just having my first cup of coffee and I've been up for three years hours. Symantec accuses Microsoft of abuse…
Just in from the folks at Secunia: Description: H D Moore has discovered a vulnerability in Microsoft Internet Explorer, which can be exploited by malicious…
Hmmm, another one. Microsoft is investigating new public reports of limited “zero-day†attacks using a vulnerability in Microsoft PowerPoint 2000, Microsoft PowerPoint 2002, Microsoft Office…
Recently a hacking tool for DRM was released that bypassed Microsoft controls for movies and music. This tool, FairUse4WM, exploits a hole in DRM that…
I've been reviewing web logs. I'm quite amazed to see the wide range of visitors from around the world that we have been getting here…
In light of the growing interest in RFID tags by government and industry alike we find the dark side. There was a presentation at HOPE…