A few weeks ago, there was some kind debate in Belgium about the need of a CERT (Computer Emergency Response Team). With the growing number of computers and networks incidents reported today, everybody agree to request the setup of a strong CERT infrastructure per country and managed by legal authorities!
Category: Security
Asset Management Using Nmap
Nmap is probably the most known and used open source port scanner on the Internet. I’ll explain how to use this wonderful network toolbox to automate a simple asset management solution. “Know your network!” This is the main focus of this post. Today, having a global and up-to-date overview of
Hackers Only Responsible for 1% of Data Breaches
According to a study, only one percent of data breaches are caused by hackers! On first position of data breaches causes: negligent team members! Source: Data News.
NVidia GPU Used to Crack WPA(2) Keys
I found this article which speaks about a Russian firm which developed a tool to use NVidia GPU (up to four) to decrypt WPA or WPA2 encryption systems (bruteforce method). Here is the product: ElcomSoft Distributed Password Recovery. Conclusion? Wi-Fi protections are not sufficient enough to ensure confidentiality! Always use
Unresolvable Captcha!
I read a story (in French – translated here) about a French ISP which uses an online form protected by an unresolvable Captcha! Funny but frustrating if you really need to contact them! Check out the form and feel free to test it: http://faq.1and1.fr/contact/1.php.
One Day in the Life of the SANS Internet Storm Center
Yesterday, I attended a very interesting session about the SANS “Internet Storm Center” (ISC). This event was organized by the Belgian ISSA Chapter in Brussels. As I’m a daily ISC users for a long time, it was very interesting to have a “back stage” overview of this organization. The Internet
Cyber Security Awareness Month
“October is Cyber Security Awareness Month and this year the SANS Internet Storm Center is going to offer daily tips on each of the six steps of incident handling areas according to the following schedule: Preparation: October 1-4 Identification: October 5-11 Containment: October 12-18 Eradication: October 19-25 Recovery: October 26-31
Workstation (Un)locking Using Bluetooth
When you use a workstation (PC, laptop or thin client), it’s important to lock it when you are away for a while or funny things may happen. Usually, the screen is automatically locked after a configurable inactivity period. To unlock it you need to type a password or, on some
Intrusive Browser Alert Advertisement
Some advertisers spammers have great ideas to send unsolicited messages to a targeted audience. Their goal is to convince the end-user to click on an advertisement. A new method seemed to appear on the web recently: They simulate a browser security warning! Often, users doesn’t even read the warning message
DiY Network Sniffer
From time to time, network administrators have to use a sniffer to capture flows of packets . In a switched environment, packets are sent from a source to a destination and only the destination host can “see” the packet. To be able to receive all the packets sent into a