Invite to discuss

Want posts & news about #applications on your wall?

Sign Up

applications

Posts
713
Experts
282
Views
402.2K
Shares
1.8K
Upvotes
9.9K

Posts

Big Bad Backdoors: Part Four (Governments are Threatening Our Cybersecurity)

This image is courtesy of The White House. Here's the moment you've all been waiting for. The conclusion to my Big Bad Backdoors series is here! In the first three parts, I discussed some notable backdoor incidents. In part one, I went back to 1998 to remind my readers about how Back Orifice could bring any Windows 95 or Windows 98 install to its knees. Part two examined a home WiFi roRead more
Start the discussion...

SAP ABAP PLATFORM SECURITY

The previous articles of SAP Security for CISO series covered examples of potential attacks on these systems, so now it is high time to learn how these attacks can be conducted via vulnerabilities discovered in SAP systems. At the outset, let’s consider patching process in SAP. When the vendor fixes vulnerabilities in its program components, it releases an SAP Security Note. It is a small… Read more
1
Start the discussion...
ThreatModeler

New Partner Program for Security Providers

According to a recent survey on cybersecurity trends,[i] one of the biggest obstacles organizations face to strengthening their cybersecurity position is a lack of skilled staff. This has led to organizations increasingly relying on 3rd party solutions and service providers to meet their growing cybersecurity needs. The outsourced services which organizations are mo… Read more
Start the discussion...

BSidesLV 2017: Your machine learning model isn't that special

First, "my model isn't special?" Lest I be guilty of calling calling someone's baby ugly, your model might be special. But in information security, it's probably not the model architecture that makes it especially so. In fact, in conjunction with bsideslv‍, I'm going to be giving away code to create various models for static detection of malware us… Read more
1
Start the discussion...

BSidesLV 2017: Fear & loathing in building management systems

Since December 2015 I've had a bit of an unhealthy obsession with building management systems. Having first identified a building that shouldn't have been on the internet (see itnews.com.au/news/the-it-flaw-that-left-an-aussie-natsec-agency-base-open-to-attack-459743) I had enumerated facilities from airports to nuclear reactors in Australia. This is not however all bad news. Over the p… Read more
1
Start the discussion...
Start the discussion...