Blog Digest March 2012

Blog Digest March 2012

These are the Changes of Cybersecurity Springtime

Marc Ruef
by Marc Ruef
time to read: 4 minutes

The scip Blog Digest is a monthly released summary of the most important, thrilling and crazy posts from the international blogosphere. While reading this digest it remains very easy to keep up to date with the events of cybersecurity and advanced technology. Follow our team on 𝕏 and the company on LinkedIn, to get the most recent news.

phone old gray closeup

7 Problems with Cell Phone Forensics

youtube video controls playing

10 Movie Scenes Of Authentication Worth Rewatching

wall concrete gray red

10 Tips to Fight Insider Fraud

forest trees high up

2012 Database Threats

mosquito closeup green

Actually, my name is Duqu – Stuxnet is my middle name

calculator pen ruler paper

Algorithms: When is Random Really Random?

sky clouds green

Clickjacking, Cursorjacking and Common Facebook Vulnerabilities

sea water field aerial green blue

Configuring Network Level Authentication for RDP

horse brown closeup eye

Detecting Brazilian Banking Trojans with Snort http_inspect

document signing closeup

DGA’s vs Automated Malware Signature Generation

hacker hands on laptop

Doing Biz with Hackers: Do Bad Guys Make the Best Good Guys?

motherboard wide

Five Strategic Security Metrics To Watch

apple and google

How to prepare for Google’s privacy changes

umbrella top rain drops dark blue

How to Protect Yourself from Skimmers

windows facade

How Windows 8 Sharing Blows Mountain Lion Out of the Water

iphone6 on desk

iOS Data Security – Protecting Data on unmanaged Devices

motherboard wide

iPad 3 Out – Now Keep It Safe

water penguin cleaning rock

Linux 3.3 release

marbel orange lense flare

Malware reporting study: more infomation leads to higher cleanup rate

motherboard wide

MS12-020 BinaryDiff

mosquito closeup green

Prevent VoIP Toll Fraud with Proper Configurations

laptop programming code css bright

Quality Coding Takes A Break For The Holidays. But Why?

concrete hole big gray

Reflections on a Past Vulnerability, Kind Of…

windows facade

Reliable Windows 7 Exploitation: A Case Study

laptop programming code css bright

Safe Coding and Software Security Infographic

meeting room empty windows

Snort.org Blog: Rule Category Reorganization

social media icons blue

Social networks & Deactivated Friend Attack, the cybercrime paradise…

motherboard wide

Some evidence on multi-word passphrases

water penguin cleaning rock

Some random observations on Linux ASLR

concrete hole big gray

The End of Vulnerabilities?

fighter jet flying rise clouds red

The Futility of Web Pen Testing

motherboard wide

The XOR Bypass

landscape winter alps mountain snow cabinet white sky blue

Top 10 Oracle Steps to a Secure Oracle Database

usb stick connector closeup

Twelve Security Best Practices for USB Drives

sky clouds green

What They Don’t Teach You in ‘Thinking Like the Enemy’ Classes

tree wood slices closeup

When Do I Need to Apply This Update – Adding Priority Ratings to Adobe

motherboard wide

When Was The Term Exfiltration First Used?

About the Author

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

You want to test the strength of your enterprise regarding malware attacks?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here