Blog Digest August 2010

Blog Digest August 2010

These are the heated Cybersecurity Weeks

Marc Ruef
by Marc Ruef
time to read: 5 minutes

The scip Blog Digest is a monthly released summary of the most important, thrilling and crazy posts from the international blogosphere. While reading this digest it remains very easy to keep up to date with the events of cybersecurity and advanced technology. Follow our team on 𝕏 and the company on LinkedIn, to get the most recent news.

bunker green blue

15 Great Ways to Secure Your Website

network cables rj45 colored

Access Controls for Network Infrastructure, (Thu, Aug 5th)

document signing closeup

Analysis of using CPE for Nmap OS signatures

virus microscope closeup green

Anti-virus Products Mostly Ignore Windows Security Features

motherboard wide

Blog Post: Painting by Numbers

iphone6 on desk

Citi iPhone banking app contains security flaw

architecture corporate building skyscraper blue

Corporate Identity Theft Used to Obtain Code Signing Certificate

microscope closeup blue

Details of 100 million Facebook users were already exposed on the net

marbel orange lense flare

How large is a piece of Malware?

bunker green blue

How Secure Is A Password?

hacker hands on laptop

How to Hire a Hacker

nature tree water sunset yellow violet

Image Spam

cpu pin

Intel Should Not Consummate McAfee Acquisition

motherboard wide

It’s not what you write, but the words you use

jail hallway old

JailbreakMe: Security warning for iPhone and iPad owners

water penguin cleaning rock

Linux distribution popularity trends plotted

abstract art bamboo black white

Nmap favicon visualization

keys pile old

Passwords in the wild, part I: the gap between theory and implementation

apple and google

Playing in the Chrome Sandbox

wall concrete gray red

Potential Evasion Where IPS Fails to Validate TCP Checksums

man build stones zen pile

Redesigning the Credential Cracking Strategy

laptop facebook women

Return of the Facebook Snatchers

keylock digital encryption blue

Russia’s FSB Receives Decrypted BlackBerry Messages From Mobile TeleSystems

wallpaper lense flare blue green

Security Analysis of Smudges on Smart Phone Touch Screens

hacker hands on laptop

Snooping on Dot Matrix Printers

jail hallway old

Technical Analysis on iPhone Jailbreaking

leaf ice crystal closeup green

The Nine Circles of Responsible Vulnerability Disclosure Hell

golf putting green

Trends in Malware and Phishing

horse brown closeup eye

Trojan horse suspected of contributing to 2008 Madrid aircrash

architecture building inside sky

UAE to Ban BlackBerrys

keys pile chaos colored

UAE to block the Blackberry?

laptop programming code css bright

W32.Changeup: Visual Basic Polymorphic Code Uncovered

virus microscope closeup green

Who is Writing the Viruses?

windows facade

Windows LAN Addressing Validation (and a Scapy lesson)

wall concrete gray green

Wordle: Words Used by Major Spam Sending Botnets

coins us dollar cents

Zurich Insurance slammed with 2.28 million fine for losing customer data

About the Author

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

You want to test the security of your firewall?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here