Tags » Infosec

The State of Guest Wi-Fi Security

Most guest Wi-Fi networks today are open SSID’s with no encryption that have a captive portal that requires users to click through some terms and conditions. 1,517 more words


Week in review: SD-WAN deployment, security DevOps, a new taxonomy for SCADA attacks

Here’s an overview of some of last week’s most interesting news and articles:

Compromised ad company serves Magecart skimming code to hundreds of websites
The attackers managed to compromise Adverline, a French online advertising company with a European-focused clientele, and inject payment card skimming code into one of its JavaScript libraries for retargeting advertising. 915 more words


Domained – Multi Tool Subdomain Enumeration

Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to… 312 more words


Reverse Engineering - Breaking Software Restrictions

TL;DR Replacing crucial instructions with NOP can sometimes result in a bypass of software restrictions.

The long version is as follows. If you are a person who is interested in reverse engineering or exploit development, it would be safe to assume that you’ve heard of the amazing Corelan Team. 742 more words


Serious Security: What 2000 years of cryptography can teach us

These days, a lot of your data gets encrypted when you save it to disk or send it over the internet.

The data gets decrypted again when you read it back in or after it’s received at the other end. 3,622 more words


2018's Most Common Vulnerabilities Include Issues New and Old

The most common vulnerabilities seen last year run the gamut from cross-site scripting to issues with CMS platforms.

from Dark Reading – All Stories https://ubm.io/2W3hL3L