Disclaimer: The information reported below has been translated from French to English with the approval of a friend who also released the information on his blog. His server was hit by a DoS attack. Feel free to relay the information! When you try to access big websites like Facebook, Google
Category: Privacy
Be the Conductor of Your Security!
I’m visiting organizations and companies for miscellaneous projects and I’m often scared by the lack of “visibility” they have on their infrastructure. For years now, new components have been deployed by pure requirements or (honestly) by the business “pressure”: Firewalls, IDS/IPS, (reverse)proxies, WiFi, SSL VPNs, etc. All those solutions, hardware
Searching for Sensitive Data Using URL Shorteners
URL Shorteners are online services which reduce the length of URL’s. Web applications are more and more complex and their URL’s can have multiple parameters like pages, sessionsID’s and much more. At the same time, we use services which limit the messages size (like Twitter) or devices (like SmartPhones) which
Wall Of Shame: Pros & Cons
A “Wall of Shame” or “Wall of Sheep” is a real-time demonstration application which searches for non secured (read: sent in clear text) login/passwords sent through a network. One of the well-know wall of sheep is the one operated every year during the Defcon conference in Las Vegas. A few
Protect Yourself or Be Protected ?
A news coming from Australia became a hot topic in lot of security forums and mailing lists today. The Australian authorities brainstormed about new ways to fight the cyber crime. One of the submitted project is forcing people to install (and activate!) an anti-virus software to be able to access
Welcome to Maltego v3!
It was discussed during the last edition of BlackHat Europe: Maltego v3 was almost ready to be released. Today is the D-day: The latest version is out! A quick reminder for those who still not know the product: “Maltego is an open source intelligence and forensics application. It will offer
Increase your Surf Privacy with IPFuck
The debate is ongoing for a while and has partisans on both sides: Can an IP address be considered as private data? Europe said yes and the “fight” between privacy protectors and authorities is still present. Having your IP address considered as private from a legal point of view or
Identification is not Authentication
I received a notification from my bank about the availability of my new credit card. This morning, I went to my local agency to pick it up. Because I don’t receive a new credit card every six months, I always discover the new procedure implemented by my bank. This time,
Bad Example of Data Management
There is an ongoing communication campaign for a big interim company on the Belgian radio stations. The message they are broadcasting is: “Do not rely on your company physical assets but more on people“. And they are right! People are the most important value of a company. Even if you,
Strong Passwords for Dummies?
User authentication… If there is a long and never ending story, it is definitively this one! All of us have plenty of passwords to write on post-its keep in mind. They are several ways to increase the user authentication safety. By forcing very difficult passwords and learn them, by using