Like any normal web application, Sharepoint may fall prey to OWASP Top 10 vulnerabilities with a special focus on XSS, mostly due to inadequate patching and misconfiguration. On this post, we focus on recon / what sharepoint is exposing. Google Dorks F…
Keep Your Home Safe While on Vacation
Do you have summer vacation on the brain? We don’t blame you! With warmer weather fast approaching, it’s hard not to start thinking about where and what you want to do for summer vacation. Even with all the excitement of planning your vacation, it’s important to think about your home while you are away. Nothing is worse than coming back … Read More
The post Keep Your Home Safe While on Vacation appeared first on Security Source.
How can we use the cloud and comply with global privacy laws?
The cloud clearly provides a number of benefits for businesses and associations, but as many are aware, remaining compliant with regional, federal and industry law and regulations is a major challenge.
Layered Database Security in the age of Data Breaches
We live in a time of daily breach notifications. One recently affected organization in Germany put out a statement which said: “The incident is not attributable to security deficiencies.” and “Human error can also be ruled out.” They went on say that …
Data Breaches: The Encryption Challenges
This article is the third in a series that discusses data breach threats and possible solutions. The first two articles, “What You Need to Know,” and “Threats and Consequences,” make it clear that businesses need to take action to reduce data …
PCI DSS disses multi-step authentication
The PCI Council has published an “Information Supplement” on multi-factor authentication (pdf). The document that multi-step and mutl-factor authentication are not the same and that the former is not acceptable.
PCI DSS requires that all factors in …
Vault 7: Marble Framework Reveals How the CIA Evaded Forensics & Attributed Malware to Other Countries
Wikileaks has published part 3 of Vault 7, a multi-part leak revealing a previously…
Source: Vault 7: Marble Framework Reveals How the CIA Evaded Forensics & Attributed Malware to Other Countries appeared first on Freedom Hacker the number one source for hacking news, security news & everything cyber.
What You Need to Know About Caching Video Series
In this “unofficial” video series, Akamai Solutions Engineers Tedd Smith and CJ Arnesen explain the basics of caching: what it is, why it’s important, and how to get the most out of it. A great introduction to Akamai, caching, and content delivery netw…
Toolsmith #124: Dripcap – Caffeinated Packet Analyzer
Dripcap is a modern, graphical packet analyzer based on Electron.
Electron, you say? “Electron is a framework for creating native applications with web technologies like JavaScript, HTML, and CSS. It takes care of the hard parts so you can focus on th…
OUTSMARTING THIEVES: Some are not as sophisticated as you might think!
Taking a close look at ways to keep your family safe and protect what is important to you. Part 5 of a 5-part series. Protecting the things that are important to you can seem daunting. But keep in mind, some thieves trying to steal from you aren’t really all that sophisticated. In fact, sometimes, they […]
The post OUTSMARTING THIEVES: Some are not as sophisticated as you might think! first appeared on ProSec Integration, LLC.