July 2016

Vulnerable: Slackware Slackware Linux 14.1 Slackware Linux x86_64 -current Slackware Linux 14.1 x86_64 Slackware Linux 14.0 x86_64 Slackware Linux 14.0 Slackware Linux 13.37 x86_64 Slackware Linux 13.37 Slackware Linux 13.1 x86_64 Slackware Linux 13.1 Slackware Linux 13.0 x86_64 Slackware Linux 13.0 Slackware Linux -current Oracle Glassfish Server 3.1.2 Oracle Glassfish…

Share
Read More

A new service from Microsoft for their Office 365 Business Premium subscribers will allow business users to make appointments for their services around the clock through a unique scheduling page/portal. read more Source: Security Bloggers Network @ July 21, 2016 at 08:56PM 0

Share
Read More

Useful resources from F-Secure: Evaluating the Customer Journey of Crypto-Ransomware and the Paradox Behind It (Hat-tip to ESET’s Stephen Cobb for bringing it to my attention.) Infographic/comic strip (OK, not my sort of thing, but may be useful for other educationalists: Five Habits of Successful Ransomware Criminals Commentary by The Register: Ransomware…

Share
Read More

I am very happy to announce that a honeypots workshop will take place during DEFCON 24 in Las Vegas. The workshop is titled “Analyzing Internet Attacks with Honeypots“, lasts half a day (4 hours) and will be presented by me. It takes place on Friday the 5th of August, from 2PM…

Share
Read More

As an Emergency Medical Technician and former ER tech, I am amazed by the amount of change that healthcare has undergone. I am not talking about the advances in medicine though that is certainly impressive. I am referring to the intersection of technology and how it supports many of the…

Share
Read More

This vulnerability was discovered by Richard Johnson and Yves Younan of Cisco Talos. Talos is releasing an advisory for a vulnerability in OpenOffice Impress. (TALOS-2016-0051/CVE-2016-1513). Talos has discovered an exploitable out-of-bounds vulnerability which exists in OpenOffice when handling MetaActions. A specially crafted OpenDocument Presentation .ODP or Presentation Template .OTP file…

Share
Read More

In preparing for my Cloud Security World 2016 talk, "Automagic! Shifting Trust Paradigms Through Security Automation," I did a lot of thinking about what can be automated, how to automate, and how to demonstrate and measure value around all that… Source: Security Bloggers Network @ July 21, 2016 at 08:56PM…

Share
Read More

DDoS attacks are growing in size and sophistication, says a new report from Arbor Networks, and those attacks have continued to impact a variety of organizations over the past few weeks. According to Arbor networks, a current average-sized DDoS attack is capable of taking down almost any organization’s server at…

Share
Read More

Last year, the notorious “Stagefright” flaw in Google’s Android operating system affected millions of devices, allowing hackers to execute code simply by sending a malicious MMS message. Dubbed one of the biggest security concerns ever, the vulnerability appears to be back – this time, targeting iPhones, iPads, iMacs and Macbooks….

Share
Read More