Blog Digest August 2012

Blog Digest August 2012

These are the heated Cybersecurity Weeks

Marc Ruef
by Marc Ruef
time to read: 4 minutes

The scip Blog Digest is a monthly released summary of the most important, thrilling and crazy posts from the international blogosphere. While reading this digest it remains very easy to keep up to date with the events of cybersecurity and advanced technology. Follow our team on 𝕏 and the company on LinkedIn, to get the most recent news.

man build stones zen pile

5 Design Tricks Facebook Uses To Affect Your Privacy Decisions

wall concrete gray red

10 Tips For Protecting Mobile Users

surface raindrops reflection

Attack Surface Analyzer 1.0 Released

motherboard wide

Backup Security Best Practices

keys pile old

Bad password choices: don’t miss the point

screen programming chaotic colored

Brainfuck beware: JavaScript is after you!

forest trees high up

Bring it on: Companies bring sensitive data to the cloud despite doubts

hacker hands on laptop

Bypassing CAPTCHAs by Impersonating CAPTCHA Providers

suits hanging boutique blue

Dilbert Comic Strip – Government Agencies

hacker hands on laptop

Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate

concrete hole big gray

Ending mixed scripting vulnerabilities

suits hanging boutique blue

Endpoint Security Management Buyer’s Guide

coffee espresso table bright

Flamer Analysis: Framework Reconstruction

fortress citadel ferriere overview

Information Security: Analysis of the FinFisher

screen programming code html closeup

Introduction to HTTP Response Headers for Security

hacker hands on laptop

I Was a Teenage Hacker

mobile on boat

Mobile Security Experts on BYOD

hacker hands on laptop

No, ‘hacker’ really does mean ‘hacker’

motherboard wide

Not So Random Numbers. Take Two

rooftop sitting looking down city

Overreaction and Overly Specific Reactions to Rare Risks

field poppy flower pink green

Plaintext Caching with iOS Document Interaction APIs

suits hanging boutique blue

Pragmatic WAF Management: Policy Management

suits hanging boutique blue

Pragmatic WAF Management: the Trouble with WAF

laptop programming code css bright

Quality Coding Takes A Break For The Holidays. But Why?

wall concrete gray green

Spam from an Android botnet

motherboard wide

Stamping Out Hash Corruption, Like a Boss

frog and butterfly

Surprises in our advanced threat awareness survey

marbel orange lense flare

Tackling Modern Malware

motherboard wide

The Importance of Security Engineering

keys pile old

The Password Dilemma – Unique and Complex is the Key

tree wood slices closeup

Web Application Fingerprinting

keys pile old

Why passwords have never been weaker and crackers have never been stronger

About the Author

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

You want to test the strength of your enterprise regarding malware attacks?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here