Blog Digest September 2010

Blog Digest September 2010

This is what is going to change in Cybersecurity Autumn

Marc Ruef
by Marc Ruef
time to read: 4 minutes

The scip Blog Digest is a monthly released summary of the most important, thrilling and crazy posts from the international blogosphere. While reading this digest it remains very easy to keep up to date with the events of cybersecurity and advanced technology. Follow our team on 𝕏 and the company on LinkedIn, to get the most recent news.

lock old big door blue

‘Padding Oracle’ Crypto Attack Affects Millions of ASP.NET Apps

apple mouse

Apple’s secret ‘wispr’ request

motherboard wide

Automated Padding Oracle Attacks with PadBuster

phone old gray closeup

Cell Phones Powered by Conversation?

architecture corporate building skyscraper blue

Consumerization and Corporate IT Security

forest conifer closeup green

Exploring Stuxnet’s PLC Infection Process

animal bird parrot

Feature: Compromising Twitter’s OAuth security system

hacker hands on laptop

Hackers blind quantum cryptographers

snake head water drop green

How dangerous is image file metadata?

skull old front top

Iceberg – Dead Ahead

wall narrow orange red blue

Implementing two Factor Authentication on the Cheap, (Tue, Sep 21st)

flower meadow white yellow closeup

Integrity Levels and DLL Injection

mailbox side blue

Is that Bill Gates staring back at you from Outlook 2010?

mountain cliff forest sunset

IT Security Workers Are Most Gullible of All: Study

bullet single black

Making Penetration Testers Lives Awful

marbel orange lense flare

Malware Analysis and Response Step by Step Decision Tree

motherboard wide

Not every elliptic curve is the same: trough on ECC security

motherboard wide

Prior Knowledge Of User’s Cert Warning Behavior

suits hanging boutique blue

Product management and organization

abstract art strings dots blue

Researcher Claims ‘Evercookie’ Can’t Be Removed

android set go

Security issues on Android

motherboard wide

Setting a Bad Example: How Not To Validate User Input

wood fire burning hot closeup

SIP / VoIP Firewall: Differencies between Telephony and Security world

wall concrete gray green

Spammers Introduce New Email Internet Headers

motherboard wide

Static Analysis Fatigue

screen programming chaotic colored

The brain speaks: Scientists decode words from brain signals

motherboard wide

The Effect of Snakeoil Security

eye woman blue closeup

The names and faces behind the ‘onMouseOver’ Twitter worm attack

gun money table yellow

Thoughts on ‘Cyber Weapons’

spider web water drops closeup black white orange

Website Security Statistics Report (2010) – Industry Bechmarks

laptop facebook women

What to do if your Facebook profile has been hacked

watch rolex daytona crown macro

Why do you spend time verifying vulnerability reports?

document signing closeup

Why Not Mix Signed and Unsigned Values in C/C++?

About the Author

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

You want to test the security of your firewall?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here