9 posts from January 2011

January 31, 2011

In a story published more than a year ago about rockyou.com hack, the hacker said a large portion of websites are storing passwords in clear text. In just the past few hours, a dating website...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

January 28, 2011

Today's Washington Post reports on a new file-sharing, whistleblower site called OpenLeaks. The story was also highlighted on Drudge. Interesting video on the homepage that is "must-see TV". The point of the video is to...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

January 27, 2011

Our blog on hacked .edu and .mil websites raised a lot of attention. Tony Bradley of PC World had an excellent, Kafkaesque take: Have you ever walked into a kitchen at night and turned on...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

January 25, 2011

It’s only January and we’ve just witnessed a first: cyber insecurity bringing down a government. The government of Tunisia, a Wikileak’s target, has been under severe scrutiny for corruption ever since Wikileaks exposed some dodgy...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

January 21, 2011

The list includes (with original hacker's typos): The "traffic" probably stands for the number of records within the DB tables. The "goods" in this case are probably the needed information for the "Level of Control."...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

January 19, 2011

Oracle patching needs fixing. In the past, Oracle provided a solid process of receiving reports, validating and scheduling fixes. Oracle had a lot of momentum around fixing database vulnerabilities. However, the quarterly patch cycle has...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

January 15, 2011

http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html Most interesting part: The worm itself now appears to have included two major components. One was designed to send Iran’s nuclear centrifuges spinning wildly out of control. Another seems right out of the movies:...Read More
Share:
Share on LinkedIn

January 13, 2011

Security continues its fast march towards becoming a business process. SAP is the mother of business process software companies. "SAP is acquiring software and related assets from its partner SECUDE in order to provide improved...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

January 04, 2011

Before we talk about cloud security, its important to define the different cloud offerings enterprises hope to protect. Cloud models are: Infrastructure as a Service (IaaS) – IaaS providers offer state-of-the-art flexible and secure cloud...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)