Blog Digest December 2011

Blog Digest December 2011

Cybersecurity Winter is coming

Marc Ruef
by Marc Ruef
time to read: 4 minutes

The scip Blog Digest is a monthly released summary of the most important, thrilling and crazy posts from the international blogosphere. While reading this digest it remains very easy to keep up to date with the events of cybersecurity and advanced technology. Follow our team on 𝕏 and the company on LinkedIn, to get the most recent news.

power plant tower night

1% of CMS-Powered Sites Expose Their Database Passwords

laptop keyboard blue key

Abusing IP Protocols to Create Covert Channels

wooden bridge forest green

Authentication: What is a factor anyway?

hacker hands on laptop

Can you crack it – interesting challenge

motherboard wide

Cisco says 70% of young workers ignore IT rules

android set go

Does Android Malware Exist?

windows facade

Dump Windows password hashes efficiently – Part 1

laptop facebook women

Facebook bans at work linked to increased security breaches

hashdays

hashdays: There goes 2011, here comes 2012!

motherboard wide

HTML scriptless attacks

nature tree water sunset yellow violet

Image Steganography Tutorial & Concept

road bridge walking forest fog

Insecure Object Mapping

usb stick connector closeup

Lost USB keys have 66% chance of malware

mushroom forest ground

Metasploit: Six Ways to Automate Metasploit

mobile on boat

Mobile Device Location Tracking, and Why It Matters

abstract art bamboo black white

Nmap on Amazon Kindle

laptop programming code css bright

Quality Coding Takes A Break For The Holidays. But Why?

business ties tips table wood

Remote control manager FAIL

mobile on boat

Rethinking Mobile Security

laptop programming code css

Schneier on Security: Recent Developments in Full Disclosure

screen programming php closeup

Security Holes In Software Decreased This Year, Early Data Shows

laptop programming code css bright

Static Code Analysis

forest trees steps green

Steps to Avoid Mental Stagnation

motherboard wide

Ten Best Practices For Meeting SOX Security Requirements

pool billiard ball eight side

The ‘Security’ Impact of Performance

art image butterfly dots colored

The Art of Profiling Cybercriminals

motherboard wide

The more things change, the more they stay the same!

landscape winter alps mountain snow cabinet white sky blue

Top 10 Security Mistakes SMBs Make

sea boat sunset sky blue yellow

Trusted Execution In Untrusted Cloud

firefox lego

Understanding Firefox and SQLite Tables for Forensics

laptop facebook women

Using Facebook as a proxy

nature grass closeup green

Using Fuzzing to Spice Up a Penetration Test

hacker hands on laptop

VLAN Hacking

forest trees high up

What Data Lurks on Your Old Smartphone?

frog and butterfly

Why I Will Never Feel Threatened by Programmers in India

windows facade

Windows Phone SMS attack discovered, reboots device

About the Author

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

You want to test the security of your firewall?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here