Blog Digest February 2012

Blog Digest February 2012

These are the Changes of Cybersecurity Springtime

Marc Ruef
by Marc Ruef
time to read: 5 minutes

The scip Blog Digest is a monthly released summary of the most important, thrilling and crazy posts from the international blogosphere. While reading this digest it remains very easy to keep up to date with the events of cybersecurity and advanced technology. Follow our team on 𝕏 and the company on LinkedIn, to get the most recent news.

windows blinds closed

8 Breach Prevention Tips

experiment glowing uv blue red orange

A Career in Forensics: 5 Key Steps

calculator pen ruler paper

Algorithms: When is Random Really Random?

motherboard wide

A Milestone in IPv6 Deployment

android set go

Android malware employs steganography

nature ocean beach clouds

Attackers Use Fake Friends to Blend into Facebook

keys pile chaos colored

Block a country with my Cisco Router or Firewall

hacker hands on laptop

Chinese Hackers Suspected in Nortel Breach

mountain cliff forest sunset

Cybercriminals Moving Over To TLD .su

man build stones zen pile

Designing enterprise systems for the accidental incident

sea water sunset dark

Digital Exams on the iPad

abstract art strings dots blue

ESET researchers on Windows Phone 8 Security

apple and google

Exploring Your Browser LocalStorage

architecture building cctv camera gray

Five principles to better your security monitoring

sea boat sunset sky blue yellow

Five Schemes For Redeeming Trust in SSL

motherboard wide

Five Strategic Security Metrics To Watch

motherboard wide

How (And Why) Attackers Choose Their Targets

wooden toy letters

How Companies Learn Your Secrets

knight chain armor

How To Defend Your Database From Malicious Insiders

apple and google

How to navigate Google’s privacy options

jail guard tower barbwire

Incident Response: Have You Got a Plan?

spider web tree green

JSON CSRF with Parameter Padding

sky clouds green

Kippo is being detected by Metasploit

fighter jet flying rise clouds red

Maximizing Value in Pen Testing

mobile on boat

Mobile Devices Just Another Endpoint

temple poseidon dawn

Nessus 5.0 Released!

laptop programming code css

NYPD Developing THz Body Scanners to Detect Weapons

bullet single black

Penetration Testing for iPhone Applications

mosquito closeup green

Prevent VoIP Toll Fraud with Proper Configurations

laptop desk lamp scene

Quantifying Risk Reduction with an Unknown Denominator

man build stones zen pile

Redesigning the Windows Logo

datacenter colored

Server-side Polymorphic Android Applications

fly head eyes macro

Some IDS comments

calculator pen ruler paper

The Aftermath Of A Breach

motherboard wide

The Differences Between Security Certifications

watch vintage hand closeup

Timing Analysis Attacks in Anonymous Systems

usb stick connector closeup

Twelve Security Best Practices for USB Drives

sky clouds blue

When in the Cloud, Trust – but Verify

motherboard wide

When Was The Term ‘Exfiltration’ First Used?

windows blinds closed

Who has better privacy laws: USA or European Union?

motherboard wide

Why stream ciphers shouldn’t be used for hashing

About the Author

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

You want to test the security of your firewall?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here