Security Engineering — The Book
Security Engineering — The Book is a guide do build dependable distributed systems written by Ross Anderson. All chapters from the second edition now available free online! →
Security Engineering — The Book is a guide do build dependable distributed systems written by Ross Anderson. All chapters from the second edition now available free online! →
Shellshock Bash Vulnerability has been keeping me busy last few days. Shellshock is a nasty bug that causes problems. Because ePanorama.net is running on Linux server, I has to do the necessary steps to keep the site safe. First step was to analyze the problem: Does my system have vulnerable bas version? The answer is yes →
http://safeandsavvy.f-secure.com/2014/09/29/danger-of-public-wifi/ Posted from WordPress for Android →
http://www.washingtonpost.com/news/speaking-of-science/wp/2014/09/29/londoners-accidentally-pay-for-free-wi-fi-with-a-firstborn-because-no-one-reads-anymore/?tid=sm_fb Posted from WordPress for Android →
Unix/Linux Bash: Critical security hole uncovered and it seems to be all around in the news. The claim is that popular Linux and Unix shell has a serious security problem that means real trouble for many web servers. Let’s check the facts fist, is this real from some reliable source. There is Vulnerability Summary for →
http://arstechnica.com/security/2014/09/android-browser-flaw-a-privacy-disaster-for-half-of-android-users/?utm_medium=referral&utm_source=pulsenews Posted from WordPress for Android →
http://spectrum.ieee.org/riskfactor/consumer-electronics/standards/looking-for-the-key-to-security-in-the-internet-of-things Posted from WordPress for Android →
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls?dom=PSC&loc=slider&lnk=1&con=phony-cell-towers-could-be-intercepting-your-calls Posted from WordPress for Android →
Avoiding the top 10 software security design flaws is a document published as part of the IEEE Computer Society cybersecurity initiative. IEEE Computer Society Center for Secure Design. The Center intends to shift some of the focus in security from finding bugs to identifying common design flaws in the hope that software architects can learn →
Taking a Trip to the ATM? Beware of ‘Skimmers’. Skimming is the theft of credit card information used in an otherwise legitimate transaction. Instances of skimming have been reported where the perpetrator has put a device over the card slot of an ATM (automated teller machine), which reads the magnetic strip as the user unknowingly →