Thursday, September 25, 2008

Bruce Schneier on Sarah Palins email hacked

Here is a post of Bruce Schneier and Sarah Palins hacked email account. Not only is his comment interesting but the commens on his post are thought provoking as well. There runs a fine line between Security and Usability.

U.S. top on list as source of botnet attacks

I found an interesting article on how the
U.S. tops list as source for botnet attacks, you can view it here. I found an interesting statistic which stated:

The United States was the top source of distributed attack traffic, originating nearly three times as many attacks as second-place China, according to a recent study by security service provider SecureWorks Inc.
The figures are based on identified attacks attempted against the companyĆ¢€™s 2,000 customers so far in 2008. The bad guys launching the attacks were not always based in this country, but they used compromised computers in the United States to form botnets as platforms for the attacks.
According to SecureWorks, 20.6 million attacks originated from U.S. computers and 7.7 million from Chinese computers.

Saturday, September 20, 2008

New Security Tools from Microsoft

I stumbled upon this link from the Security Bloggers Network. What is nice about this is it makes it easier to put emphasis on application security when you have a company like MS giving you tools. Here is the link: http://msdn.microsoft.com/en-us/security/cc967276.aspx

I've looked it over briefly, we will have to see how their new Threat Modeling tools works. I've downloaded the current one and it's a little cumberson to work with, a little too much work. The video for the new one looks like they have streamlined the process. Only time will tell

Thursday, September 18, 2008

White Paper on by passing the .NET Validate Request

This is an interesting paper. I have looked it over once but I have not had a chance to really analyze it. Here is a pdf of how to by pass the .NET Validate Request

Enjoy!

Monday, September 08, 2008

WhiteHat Vulnerability Stats

Here is a good blog post on Hacker Center regarding a recent webinar by WhiteHat. It has a good top ten list of vulnerabilities, something all developers should be aware of.