Circles are Bad. OVAL is Good.
jun 26, 2012
In information assurance, it is critical to have the best reporting about your vulnerabilities. Vulnerabilities, as you may recall from an earlier blog, are software flaws that may leave a system open to exploitation. There are tools that help identify and assess vulnerabilities. They are called vulnerability scanners, or VA tools. These are tools designed […]
Social Engineering on Father’s Day
jun 18, 2012
Social engineering is a powerful tool. But, it is tough art to practice. It’s fun and interesting to read about it. But, what if you wanted to experience first-hand how it works? You can’t just waltz into some establishment and run a con game. Sending phishing or spearphishing emails to friends will not endear you […]
jun 12, 2012
In security testing, studying and deploying exploits seems to be the most fun. Exploits provoke the most thought and reaction amongst learners, as well. So, what exactly is an exploit? Let’s take a peek under the hood. Anatomy of Exploits They run the gamut in terms of how they work and what they do. The […]
Exploit vs. Antivirus: It’s No Contest
jun 7, 2012
In a recent blog, we talked about the recent Java vulnerability and how it was still kicking around. The flaw has been identified as CVE-2012-0507 in the Common Vulnerabilities and Exposures database. You might be thinking that you are still safe, as you have antivirus. Let’s find out how well it protects you. As of […]
What is a Vulnerability?
maj 30, 2012
In discussions and meetings with other information security professionals, I hear a lot of misinformation. I’m a geek and like to be more precise, rather than less. The use of the term vulnerability is a special pet-peeve of mine. The core of information assurance is making sure you don’t have serious vulnerabilities. So, what exactly […]