Attention Retailers and Restaurants: Three Simple Ways to Avoid What Happened to Michaels, Target and Neiman Marcus
I feel like I’m stuck in Bill Murray’s Groundhog Day. Yet again, it came to my attention that a major American retailer has been hit with POS (point-of-sale) malware. This time, it’s hobby shop giant Michaels.
I hear that Target’s POS malware crisis, which made international headlines last December and […]
This article explains the Heartbleed bug and shows how it can be exploited.
Heartbleed is a flaw in implementing the Heartbeat extension of OpenSSL. It is just an extension of OpenSSL which keeps the session alive for HTTPS connections, much like the Keep-Alive header in HTTP.
As per RFC, the formal […]
In this article I am going to discuss a few of the most important vulnerabilities which exist in almost all applications in the world. They are cracking the authentication mechanism, poor session handling, and accessing different paths of the operating system via exploiting the path traversal vulnerability.
Cause of the […]
In 1945, Léon Theremin, a Russian inventor, invented one of the first covert listening devices, also known as “bugs.” The device was a predecessor of the Radio-frequency identification (RFID) technology. RFID technology can be defined as the wireless non-contact use of radio-frequency electromagnetic fields to transfer data with […]
Organisations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organisation makes different strategies in implementing […]
In cloud computing, there are a number of components used to build the cloud infrastructure. At the lowest layer there are actual hardware components like servers, network attached storage and network components. In order to limit the possibility of spreading an infection, networks need be properly separated into multiple […]
Darn, I had to change my Dropbox password a few days ago. For good measure, I changed my Google password, too. Although I only use it for OAuth these days, well, especially for OAuth, I changed my Facebook password, too.
Do you notice when you buy things online or log […]
Prohibition of Perfidy
Article 37 of AP I – Prohibition of perfidy
1. It is prohibited to kill, injure or capture an adversary by resorting to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under […]
What is Jus in Bello and Does it Regulate Cyber Attacks?
Jus in bello is a Latin term that means “law in waging war.” From a scholar’s point of view, it is known also as international humanitarian law (IHL), whereas military experts refer to it as the law of armed […]
How is it that something can be so incredibly large and minutely small at the same time? If you’re as fascinated by natural science as I am, then you’re likely also watching Neil deGrasse Tyson’s reboot of the ‘Cosmos’ series. Maybe it makes you think about planets, our solar […]
Background on DoD 8570
Before certifications, the only measurement of someone knowing what they said they know was through an educational degree or an impressive resume. The military was always used to training its members when they entered into the service. They provided some On the Job Training (OJT) while […]
To the uninitiated, Tor, formerly known as The Onion Router, is probably the most popular proxy network for internet anonmyzing. It’s called an onion router because traffic goes through many layers of encrypting servers. The gateway IP of the user and the destination IP are also encrypted, as opposed […]
More and more, small, medium, and even large businesses are migrating from Microsoft products. Many of them are ridding themselves of Microsoft completely.
If you were to ask those IT departments why, they’ll give you a number of different reasons.
A motivating factor for many businesses is how the Linux kernel […]
The revelations of Edward Snowden totally changed our perception of NSA cyber capabilities. Day by day, the IT security community is reading about secret surveillance programs, exploits, and automated hacking platforms to compromise any kind of technology, infiltrating networks all over the world.
The last collection of leaked documents proved […]
Over the past twenty years or more, corporations in nearly all industries have been outsourcing and offshoring at hyperdrive.
Venture capitalist firms, public shareholders, various types of financial firms, and corporate executives are driven by the temptation of reducing labor expenses, so they’re delegating accountability and responsibility to foreign parties. […]
In this article I am going to tell you about biometric template security and current technologies in which researchers are working to improve biometric template security. But this won’t be a normal, traditional article of mine. I am going to write this article in question/answer format. Before reading this […]
The year 2014 started with a diplomatic crisis in Crimes and Ukraine. The tension rose just after the 2014 Ukrainian revolution, in which the government of President Viktor Yanukovych was ousted after a popular revolt in Kiev. In the region there are groups contrary to the protest that desire […]
Typically, Internet banking and e-commerce websites are considered to be highly secure, with web mechanisms that implement more foolproof solutions for user authentication, such as client-side digital certificates rather than the user name and password combination in order to ensure the safety of user sensitive data. SSL not only […]
In this tutorial we’ll talk about OpenVPN client connection settings, which come in handy when the connection to the OpenVPN server does not work. We’ll be using GopenVPN GUI client program that can be very useful to connect/disconnect to certain OpenVPN network right from the desktop without entering command […]
The documents leaked by Edward Snowden revealed to the world the amazing spying machine built by US intelligence, its capabilities appears virtually infinite, the US agents, in fact, are able to infect targets even if they are not online, they are able to control any communication and can practically […]