Archive for the 'infosec' Category
Wednesday, February 20th, 2013
report from a computer security company that links Chinese hack group APT1 to China’s government [Army] ————— aPt1 is believed to be the 2nd Bureau of the People’s Liberation army (PLa) General staff Department’s (GsD) 3rd Department (总…
Posted in china, government, infosec, Security | Comments Off | permalink
Wednesday, February 20th, 2013
report from a computer security company that links Chinese hack group APT1 to China’s government [Army] ————— aPt1 is believed to be the 2nd Bureau of the People’s Liberation army (PLa) General staff Department’s (GsD) 3rd Department (总…
Posted in china, government, infosec, Security | Comments Off | permalink
Monday, November 21st, 2011
Guide to Computer Security – Log Management, NIST Publication 800-92 (SEP-2006) / Describes enterprise log management, collection & analysis from policy and technology perspectives.
Posted in analysis, compliance, enterprise, infosec, it, log, management, policy | Comments Off | permalink
Monday, November 21st, 2011
Guide to Computer Security – Log Management, NIST Publication 800-92 (SEP-2006) / Describes enterprise log management, collection & analysis from policy and technology perspectives.
Posted in analysis, compliance, enterprise, infosec, it, log, management, policy | Comments Off | permalink
Saturday, October 22nd, 2011
Worm uses bug in jmx-console to execute shell code, then it installs perl-based control daemon that connects to IRS, and tries to discover other JBoss’es near by by using jgroups UDP multicast. Here is more details, including the source code http://pa…
Posted in bug, infosec, jboss, jbossas, jmx-console, update, virus, work, worm | Comments Off | permalink
Saturday, October 22nd, 2011
Worm uses bug in jmx-console to execute shell code, then it installs perl-based control daemon that connects to IRS, and tries to discover other JBoss’es near by by using jgroups UDP multicast. Here is more details, including the source code http://pa…
Posted in bug, infosec, jboss, jbossas, jmx-console, update, virus, work, worm | Comments Off | permalink
Tuesday, September 13th, 2011
MOXIE MARLINSPIKE talk at BlackHat USA 2011 about current problems with SSL and CA sustem, and the feature of SSL w/out CAs.
Posted in authenticity, blackhat, CA, crypto, infosec, Security, ssl, trust, video | Comments Off | permalink
Tuesday, September 13th, 2011
Posted in authenticity, blackhat, CA, crypto, for:@twitter, has:for, infosec, Security, ssl, trust, video | Comments Off | permalink
Thursday, August 25th, 2011
read this if you need to conduct pen and security testing on / from EC2 instances
Posted in amazon, aws, cloud, ec2, infosec, policy, Security, vulnerability | Comments Off | permalink
Thursday, August 25th, 2011
Posted in amazon, aws, cloud, ec2, infosec, policy, Security, vulnerability | Comments Off | permalink