They haven't had one in a while....so it's about time again.New Mac Trojan Disables Security, Steals Passwords...
Continue Reading...I was out the latter part of last week so I missed my 'deadline'. Here's an article hot off the press that you may be interested in:The realities of using WAFs for PCI DSS 6.6 complianceEnjoy!As always, check out www.principlelogic.com/resources.html for all of my past articles, webcasts, podcasts, and more.Publish Post...
Continue Reading...In regards to my post yesterday about your calling out for better computer security at the Federal level, you may want to consider hardening your systems with the OMB Federal Desktop Core Configuration Checklists found at the following link:http://nvd.nist.gov/ncp.cfm?fdcc_chklstUs taxpayers have funded this and other great security documents for people just like you....
Continue Reading...Here's an interesting quote I just came across that fits nicely into the mold of security policy management and enforcement:"The test for determining the scope of this provision must not be subject to manipulation by those whose power it is designed to restrain." - from the Supreme Court's decision restoring the writ of habeas corpus...
Continue Reading...So, U.S. Representative Frank Wolf's computers have gotten hacked into...Now he's wasting everyone's time on the House floor by calling for greater protection of congressional computer and information systems. What a dummy!Mr. Wolf: computers are getting hacked left and right day in and day out in business and in government. So now that you've been victimized we all of a sudden need tighter controls!? How about obeying your own law ...
Continue Reading...If you write Windows apps (standard 32-bit or .NET) and want to protect them against reverse engineering and tampering check out V.i. Labs Code Armor. I haven't used it so I can't comment on how well it works...it just seems like a neat product.While most organizations have many, many security issues at a much higher level they need to focus on first, I could see such a product as a ...
Continue Reading...What? You mean that when an organization pays thousands and thousands of dollars to become a PCI assessor it doesn't guarantee the quality of their work is going to be top notch!!?? An assessor quality assurance program is in the works....? Is the marketing machine failing these vendors?I'm shocked. ;-)...
Continue Reading...Here's an information security article of mine that was published this week:The realities of PCI DSS 6.6 application code reviewsI'll have a follow-up to this one on the realities of Web application firewalls coming soon.As always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...I was ordering some Aqua Globes today (I don't normally fall for these as-seen-on-TV products but this one seems to fit a need I have) and saw on their site a bold statement of "100% SECURE SITE". You can see it here. Apparently the same folks that have infiltrated other e-commerce sites claiming "HACKER PROOF".Wow - what a BOLD statement!I wonder how often they test their site/application using automated scanners ...
Continue Reading...I just learned how a lesser-known Web vulnerability scanner can prove to be as valuable as the big dog high-end scanners. Acunetix Web Vulnerability Scanner - an excellent Web scanning tool, especially for the price - found a weak Web login/password combo. Obviously something that can lead to all sorts of security issues. It would take a lot more time and effort to uncover this in a real-world Web security ...
Continue Reading...