Off the Wire

Off The Wire Archive

News items for June 2009

Whitepaper - Protecting your network against Web attacks
Learn about web-based threats, the impact to your business, and the most effective solution to implement. [more]
Monday, 29 June 2009, 7:12 AM CET

Whitepaper - How to defend against new botnet attacks
According to Symantec's MessageLabs Intelligence, botnets were responsible for 90% of spam in 2008. More importantly, these compromised "robot" computer networks do not seem to be going away anytime soon. [more]
Thursday, 25 June 2009, 1:54 PM CET

E-mail surveillance renews concerns in congress
The National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged, current and former officials said. [more]
Wednesday, 17 June 2009, 1:26 PM CET

HTTP client fingerprinting using SSL handshake analysis
A cipher suite, in SSL, is a collection of cryptographic techniques that defines a secure communication channel. [more]
Wednesday, 17 June 2009, 12:02 PM CET

50 ways to inject your SQL
Here’s the pseudocode of a routine called “ValidateQuery()”. Its role is to take user input from a .Net application and validate it to remove potential injection. [more]
Wednesday, 17 June 2009, 5:58 AM CET

Whitepaper - The next generation of Web security
Learn how Web Security SaaS can increase overall security effectiveness and identify critical elements that make for lower-cost and easier-to-manage Web security solutions. [more]
Wednesday, 17 June 2009, 5:57 AM CET

Protecting scanning credentials from malicious insiders
This blog entry describes how you can securely audit your Unix and Windows hosts to limit exposing these credentials to an insider and also how to use Metasploit to test any vulnerability scanner to see if it is vulnerable to this type of attack. [more]
Tuesday, 16 June 2009, 10:33 AM CET

Guide - Avoiding 7 common mistakes of IT security compliance
This guide covers seven typical IT security compliance errors and outlines the best practices you can immediately apply to your environment to help your company achieve compliance. [more]
Monday, 15 June 2009, 3:54 PM CET

Apache and SSL: Generating a CSR and self-signed certificate
For this week’s tutorial, I decided to set up a secure web server using Apache on my Windows system. This time, I will be covering generation of the certificate signing request (CSR) and a temporary self-signed certificate. If you would like to try this yourself, make sure that when you download Apache, OpenSSL is included. [more]
Wednesday, 3 June 2009, 1:39 PM CET

Whitepaper - Understanding and using RFID
Read this in depth overview of RFID technology and capabilities, major standards and ways to improve convenience, accuracy, safety and security. [more]
Tuesday, 2 June 2009, 2:12 AM CET

Setting up a load-balanced Oracle Weblogic cluster in Amazon EC2
This article will explain how to set up a basic two-node Weblogic cluster using the 32-bit Weblogic image provided by Oracle with an Amazon Elastic Load Balancer (ELB). [more]
Tuesday, 2 June 2009, 2:07 AM CET


Breaking the security of physical devices

Posted on 18 August 2014.  |  In this podcast recorded at Black Hat USA 2014, Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices and things.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Wed, Aug 20th