Et Cetera

Thu
23
Jul

Are Companies Really Protecting Consumer Information

Contributed by Carl Brackett.

Technology has changed through the years and has affected the way items are purchased, whether it is online or at conventional stores. Cash or check is not the only means of paying for a purchase as people have started taking advantage of debit or credit cards since they are suppose to be safer than carrying cash. The real question that comes to mind, are people really safer using a debit or credit card?

People are under the impression that their information associated to these cards are safe and secure when making a transaction, but the fact is unclear to most individuals that the information is vulnerable when these companies do not take appropriate security measures to keep this information secure. Over the last several years, there have been many incidents where this data has been obtained from security breaches like Target, Wal-Mart, TJ Max, Home Depot, or online websites like Apple or eBay.

Tue
21
Jul

Crawling Ajax-driven Web 2.0 Applications

Contributed by Shreeraj Shah and restored from the old Infosecwriters.com archive.

Crawling web applications is one of the key phases of automated web application scanning. The objective of crawling is to collect all possible resources from the server in order to automate vulnerability detection on each of these resources. A resource that is overlooked during this discovery phase can mean a failure to detect some vulnerabilities. The introduction of Ajax throws up new challenges [1] for the crawling engine. New ways of handling the crawling process are required as a result of these challenges. The objective of this paper is to use a practical approach to address this issue using rbNarcissus, Watir and Ruby.

This document is in PDF format. To view it click here.

Tue
21
Jul

Regulations and Technologies to Reduce Breaches in Computer Networks

Contributed by Ming-Li Tabor.

From the records, there are more hackers attacking computer network systems. The systems include banks, companies, and hospitals. Millions of records were breached and billions of dollars were lost. The government regulations require data breach notification. According to Title II of the Communications Act of 1934, Internet service providers are liable to their customers. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) protects health information. Magnetic strip technology can help to reduce breaches. The methods include chip card, chip and pin, Europay, MasterCard, Visa card (EMV), and tokenization. Some technologies provide detection of intrusion. These technologies include honeypots, snort, and Open Source Tripwire. Honeypots collect information about the attacker’s activities. Snort is easily deployed on most nodes. Open Source Tripwire is a host-based detection system.

Tue
14
Jul

A DIY Guide for those without the patience to wait for whistleblowers

Written by Phineas Fisher. ISW is mirroring this paper for discussion. This type of work is what ISW, formerly known as SWG, was all about. Different approaches to the security world! Thank you!

'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I'm writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started. And trust me, once you've learned the basics you'll realize this really is easier than filing a FOIA request.

This document is in PDF format. To view it click here.

Wed
01
Jul

The 2014 Sony Pictures Hack: Theories of the Truth

Contributed by Mikal Chavez

Many users in today’s society are precarious about the topic of information security while exploring the depths of the virtual world. Fortunately, there are pre-configured layers of security provided by default via the operating systems firewall. However, how much protection do we truly believe the manufacturers and service providers offer in the terms of safeguarding our personal information?

In the content of this report, I intend to expand the recognition of newly discovered system vulnerabilities through malware insertion. These malicious tactics include cross-site scripting (XSS), embedded cookies and email spoofing used to exploit the information of a targeted user or enterprise. In doing so, my purpose is to share knowledge of the enterprise level of attack and inform best practice of disaster response methods by examining The 2014 Sony Pictures Hack.

Pages

Subscribe to RSS - Et Cetera