Surviving the Week – 5/11/12
Common User Passwords Profiler Interesting python script which when used in conjunction with information from social media i.e. Facebook, Twitter and Linkedin it can create […]
Common User Passwords Profiler Interesting python script which when used in conjunction with information from social media i.e. Facebook, Twitter and Linkedin it can create […]
Insight to online black markets and how they work A short article that provides a brief look at how bitcoins and Tor make anonymous black […]
We released a new white paper today, Top 10 Business Logic Attack Vectors. Why did we write this paper? Business logic vulnerabilities are not new, […]
Decline in web application vulnerabilities? Interesting article and kind of funny. No responsibility is taken for the problem. One of the reasons for this disparity […]
We’re looking forward to our upcoming webinar with 451 Research Director, Wendy Nather next week on 5/2. Wendy and I will be discussing a trend […]
Using Reverse Proxies To Secure Databases This study provides a unique technique to protect against SQL Injection. However, it is not a full proof solution […]
Another trends report for 2011 through Q1 2012 This report details the continued threat of vulnerabilities within web apps, mobile apps, and specific vulns with […]
An ebay Site is Vulnerable to SQL Injection The eBay site in Southeast Asia is vulnerable to SQL Injection. https://www.upsploit.com/index.php/advisories/view/UPS-2012-0003 Sites such as ebay have […]
The smell of melting Blackberries/iPhones/Droids. You have probably smelled it before. You began testing an application and forgot to blacklist the “Contact Us” page so […]
Will there be a blackout? The Anonymous hacker group has announced that they will bring down 13 root DNS servers by DDoS. Is this possible? […]
Joomla vulnerability One of the world’s leading CMS solutions, Joomla (Version 2.5.1) was vulnerable to Blind SQL Injection. Joomla reported the vulnerability February 29th and […]
One of the more common problems that we see is customers trying to bite off more of their application infrastructure at once than they can […]
Today’s show is Michael interviewing Kevin Riggins. Kevin is an Enterprise Security Architect for a Fortune 500 financial services company. Kevin and Michael have some […]
Podcast: Play in new window | Download (Duration: 35:40 — 40.8MB)
Subscribe: Apple Podcasts | RSS
“Laws are like sausages. It’s better not to see them being made.” – Otto von Bismarck I’m not sure how many of you have kids or how […]
The NTO team keeps growing and the demands of running the business and supporting our customers is keeping me busy… and its a blast. But […]
On Dan and Jim’s recent podcast, I learned that Julian Assange had been declared Hacker of the Year. Assange is certainly a person that elicits […]
Thanks go to Jeremiah Grossman for sitting down with Michael for some great discussion. Jeremiah is the CTO at Whitehat Security and a very well known figure […]
Podcast: Play in new window | Download (Duration: 22:40 — 35.3MB)
Subscribe: Apple Podcasts | RSS
As CEO, I’m constantly emphasizing the importance of customer support and trying to attend several support calls each week to stay on top of our […]
So, over the past few days we’ve seen several articles about the recent/potential hacking of one of our military UNAV planes over Iran. Naturally the […]
Wow! Six Months…and two job changes later, we are finally back to recording! YEAH!….Here the latest show from our intrepid hosts. Show Notes: InfoSec News […]
Podcast: Play in new window | Download (Duration: 42:20 — 60.6MB)
Subscribe: Apple Podcasts | RSS
Sorry I missed last week, this one will cover the last two weeks. NT OBJECTives Releases SQL Invader – NTO SQL Invader finally makes it easy […]
I hope that all of you in the US had a great Happy Thanksgiving. As is normal for a holiday weekend, the new is a […]
This week was a busy one for me, as I’m finally done traveling for awhile and and got back to working on NTOSpider6 and our […]
As as spend more time using twitter, I understand the need for shortened URL’s and make heavy use of them. But, when I am viewing […]
For those of you who know me as well as Dan, you know that we have spoken quite often on our podcast (Information Security Place […]
Copyright © 2024 | WordPress Theme by MH Themes