Quantcast
Channel: IT Security Matters » Vulnerability
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Tom’s Guide: 12 Computer Security Mistakes You’re Probably Making

21 September 2014 12 Computer Security Mistakes You’re Probably Making. Thanks Tom for this great Not-To Do list. My favorite: Not-To-Do-List   Enjoy reading!Filed under: Opinion, Survival tips Tagged:...

View Article


Image may be NSFW.
Clik here to view.

Software manufacturers have no sense for IT security

27 September 2014 Manufacturers of scientific software could make one’s life really hard. For ease of their own business they make detailed specifications about the software versions required for the...

View Article


Image may be NSFW.
Clik here to view.

A brief introduction to Trusteer Apex Advanced Malware Protection

18 October 2014 The Trusteer approach to malware protection could be ground-breaking in the defence of zero-day exploits and phishing attacks. Trusteer analysed millions of applications exposed to the...

View Article

Image may be NSFW.
Clik here to view.

Software manufacturers have no sense for IT security – Part II

23 October 2014 Sometimes malware protection software works too well. I found some emails with malicious executables, disguised as pdf files, in the attachment in my junk-mail folder. Unfortunately the...

View Article

Image may be NSFW.
Clik here to view.

Twitter’s Digits Service Inherently Insecure?

6 November 2014 At a first glance Twitter’s Digits authentication service seems to be a major step forward to secure authentication in the web. But if you dig deeper you find a vulnerability that could...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Publishes Critical Vulnerability MS14-066 in Windows SSL Library

15 November 2014 On November 11, 2014 Microsoft published in Security Bullentin MS14-066 a vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability is...

View Article

Image may be NSFW.
Clik here to view.

Sony-pocalypse is still stuck in my mind

13 December 2014 The more technical details about the Sony attack come to light, the more restless I become. Although the attacker delivered a high sophisticated piece of code, the impact of this...

View Article

Image may be NSFW.
Clik here to view.

How to mitigate Drive-by-Downloads Attacks

24 January 2014 Bad news for Adobe Flash Player users. A new critical vulnerability (CVE-2015-0311) was found in Adobe Flash Player 16.0.0.28… Successful exploitation could cause a crash and...

View Article


Image may be NSFW.
Clik here to view.

An ISO 27001 Certification is worth every dollar

15 May 2015 Some weeks ago I took part in an ISO 27001 Foundation training. The students were all IT professionals, some of them involved in certification projects. Many of them complained about the...

View Article


Image may be NSFW.
Clik here to view.

Security falls often by the wayside if availability is a priority

16 May 2015 When we talk about information security we often forget printing. We add labels like ‘Confidential’ or ‘Top secret’ to documents to make it clear to everyone that these documents contain...

View Article
Browsing latest articles
Browse All 10 View Live