lazy2hack.blogspot.com
Lazy to Hack: July 2014
http://lazy2hack.blogspot.com/2014_07_01_archive.html
If you're lazy to hack, get all the news here! Trend Micro Threat Resource Center:. Malware scare on Amazon.in. Amazon India, the Indian arm of the world’s biggest e-commerce player has certainly been making all the right moves and a few months ago reportedly hit the $200 million mark in sales and could hit the $1 billion number by March 2016. When it comes to online shopping, reputation is everything and Amazon certainly knows that. And once a user comes across malware warnings, he would also be war...
ishub.blogspot.com
IDS – an Information security tool to protect your network - Information Security Hub - Collection of Best InfoSec Articles
http://ishub.blogspot.com/2008/09/ids-information-security-tool-to.html
Friday, September 26, 2008. IDS – an Information security tool to protect your network. How an Intrusion Detection System or IDS can help Network administrator, Information Security professionals, IS Auditors and Penetration testers for detection of any external or internal network intrusion(s). Labels: Article from Others. Subscribe to: Post Comments (Atom). Subscribe free via email. Enter your email address:. My Favourite Blog List. Roger's Information Security Blog. Information Security Short Takes.
lazy2hack.blogspot.com
Lazy to Hack: July 2015
http://lazy2hack.blogspot.com/2015_07_01_archive.html
If you're lazy to hack, get all the news here! Trend Micro Threat Resource Center:. IoT to generate 20 trillion gigabytes of data by 2025. Internet of Things (IoT) has been gaining quite a fair bit of attention in the headlines recently. SO what can we expect out of this emerging technology trend? The research shows multiple device ownership and increased Internet speeds as being key drivers of cloud adoption and IoT. Asia Pacific broadband speeds will be fastest in the world. While Asia Pacific leads in...
dailysecurity.net
Security models | ePsiLoN's Information Security Blog
http://www.dailysecurity.net/category/domains/security_models
EPsiLoN's Information Security Blog. Impressions, experience, thoughts etc. Maritime Cybersecurity Mind Map. Recently I have been researching the cyber threats in the maritime industry, what has been done and which areas are not well investigated. I have summarised the initial recon in this field in a mind map – not very accurate. November 26, 2014. April 21, 2015. Simple approach for risk summarisation. Sorry, this entry is only available in Български. September 22, 2011. November 6, 2011. March 2, 2011.
dailysecurity.net
ISMS | ePsiLoN's Information Security Blog
http://www.dailysecurity.net/category/domains/isms
EPsiLoN's Information Security Blog. Impressions, experience, thoughts etc. Nice Software Vulnerability Management white paper by Chad Butler – Mind maps. Your external security consultant just sent you the vulnerability report from the last test you ordered? What shall you do with all those findings and how to successfully communicate with the concerned parties? What could go wrong and why? March 21, 2014. July 7, 2014. Other really cool stuff. Free IDA Pro Binary Auditing Training Material.
dailysecurity.net
DLink dir655 rev B firmware reverse engineering – part 1 | ePsiLoN's Information Security Blog
http://www.dailysecurity.net/2014/09/08/dlink-dir655-rev-b-firmware-reverse-engineering-part-1
EPsiLoN's Information Security Blog. Impressions, experience, thoughts etc. DLink dir655 rev B firmware reverse engineering – part 1. Recently I stumbled upon Paul dot com blog post Reverse Engineering Firmware Primer. And decided to see if I could repeat the process and to test my newly installed Debian VM packed with RE tools. Here is my take on the task. To repeat the steps one generally needs binwalk and cpio. 1) Got a firmware copy. It comes zipped so you need to unpack it first. Modified: Thu Jul 18.
dailysecurity.net
Maritime Cybersecurity Mind Map | ePsiLoN's Information Security Blog
http://www.dailysecurity.net/2014/11/26/maritime-cybersecurity-mind-map
EPsiLoN's Information Security Blog. Impressions, experience, thoughts etc. Maritime Cybersecurity Mind Map. Recently I have been researching the cyber threats in the maritime industry, what has been done and which areas are not well investigated. I have summarised the initial recon in this field in a mind map – not very accurate and may be could benefit some improvements but putting it out there. Maritime Cybersecurity Mind Map. November 26, 2014. April 21, 2015. Autodafe fuzzer compile fix →. Your card...
dailysecurity.net
Autodafe fuzzer compile fix | ePsiLoN's Information Security Blog
http://www.dailysecurity.net/2014/12/18/autodafe-fuzzer-compile-fix
EPsiLoN's Information Security Blog. Impressions, experience, thoughts etc. Autodafe fuzzer compile fix. I wanted to take a look at an old fuzzer called AutoDafe because its name popped up in several papers I read in regards to protocol and file formats fuzzing. The last version is from August 2006 which is far back in time, but still – it might be worthy looking at. It is available at http:/ autodafe.sourceforge.net/. So I went and download it. During the compilation however an error popped up:. List wi...
vendoraccesscontrol.com
Blog | Vendor Access Control
http://www.vendoraccesscontrol.com/category/blog
Skip to primary content. Skip to secondary content. October 9, 2015. I was just recommending LastPass on a corporate Chatter. Then I read that LogMeIn has bought LastPass. Since that time LogMeIn annoyed people by doing away with their free product (making my need to block it much less). And also engaged in rampant price hikes for those foolish enough to pay for the service. It is very disappointing. The post LogMeIn Buys LastPass. Appeared first on Roger's Information Security Blog. October 8, 2015.
SOCIAL ENGAGEMENT