Tales from the Web Scanning Front: Blacklisting
The smell of melting Blackberries/iPhones/Droids. You have probably smelled it before. You began testing an application and forgot to blacklist the “Contact Us” page so […]
The smell of melting Blackberries/iPhones/Droids. You have probably smelled it before. You began testing an application and forgot to blacklist the “Contact Us” page so […]
Will there be a blackout? The Anonymous hacker group has announced that they will bring down 13 root DNS servers by DDoS. Is this possible? […]
Joomla vulnerability One of the world’s leading CMS solutions, Joomla (Version 2.5.1) was vulnerable to Blind SQL Injection. Joomla reported the vulnerability February 29th and […]
One of the more common problems that we see is customers trying to bite off more of their application infrastructure at once than they can […]
Today’s show is Michael interviewing Kevin Riggins. Kevin is an Enterprise Security Architect for a Fortune 500 financial services company. Kevin and Michael have some […]
Podcast: Play in new window | Download (Duration: 35:40 — 40.8MB)
Subscribe: Apple Podcasts | RSS
“Laws are like sausages. It’s better not to see them being made.” – Otto von Bismarck I’m not sure how many of you have kids or how […]
The NTO team keeps growing and the demands of running the business and supporting our customers is keeping me busy… and its a blast. But […]
On Dan and Jim’s recent podcast, I learned that Julian Assange had been declared Hacker of the Year. Assange is certainly a person that elicits […]
Thanks go to Jeremiah Grossman for sitting down with Michael for some great discussion. Jeremiah is the CTO at Whitehat Security and a very well known figure […]
Podcast: Play in new window | Download (Duration: 22:40 — 35.3MB)
Subscribe: Apple Podcasts | RSS
As CEO, I’m constantly emphasizing the importance of customer support and trying to attend several support calls each week to stay on top of our […]
So, over the past few days we’ve seen several articles about the recent/potential hacking of one of our military UNAV planes over Iran. Naturally the […]
Wow! Six Months…and two job changes later, we are finally back to recording! YEAH!….Here the latest show from our intrepid hosts. Show Notes: InfoSec News […]
Podcast: Play in new window | Download (Duration: 42:20 — 60.6MB)
Subscribe: Apple Podcasts | RSS
Sorry I missed last week, this one will cover the last two weeks. NT OBJECTives Releases SQL Invader – NTO SQL Invader finally makes it easy […]
I hope that all of you in the US had a great Happy Thanksgiving. As is normal for a holiday weekend, the new is a […]
This week was a busy one for me, as I’m finally done traveling for awhile and and got back to working on NTOSpider6 and our […]
As as spend more time using twitter, I understand the need for shortened URL’s and make heavy use of them. But, when I am viewing […]
For those of you who know me as well as Dan, you know that we have spoken quite often on our podcast (Information Security Place […]
WAF & IPS Effectiveness Report, by Larry Suto There has been a lot of discussion, articles and analyst reports about WAF’s over the years (some […]
Web application security news from the last couple weeks. [I guess I didn’t figure out how to keep going with this weekly post when Im […]
Interesting news out of an agency we in the security industry don’t think about very much, the SEC (Securities and Exchange Commission). Reuters reports that the SEC […]
Last week was a travel week. On Wednesday I was in Austin for some meetings, then headed to Houston for the second annual HouSecCon on […]
Conference: B-Side Title: Pentultimate Hack – Manipulating Layers 8 & 9 of the OSI Model (Management & Budget) Speaker: Rafal Los (aka Wh1t3Rabbit) This talk […]
Conference: B-Sides Title: Transparent Botnet Command and Control for Smartphones over SMS Speaker: Georgia Weidman The title actually says most of it. SMS is used […]
Conference: B-Sides Title: How to Hide Your Pr0n Speaker: Orlando Barrera II and Josh Sokol Pr0n being a fanciful distortion of “porn”… itself a fanciful […]
The hacks are continuing to take place on more and more critical sites. Mysql.com hacked, serving malware – These type of hacks against critical open […]
Copyright © 2024 | WordPress Theme by MH Themes