All your serial are belong to us!

Today’s press release from an unnamed company (to protect the innocent of course) has driven me to zombify the tired “all you base” internet meme. In our ever growing drive to trade security for ease of use and convenience you can...

Observations from the McAfee “Crossfire” Report

Last week McAfee and CSIS released a report titled In the Crossfire: Critical Infrastructure in the Age of Cyber War. Honestly, I dismissed it at first as marketing hype and even took some shots at it on Twitter because of the lack of real data. But they are actually...

Best Way to Fuzz?

There was an interesting discussion and information on what is the “best way from an ROI measure” to fuzz test at the CERT sponsored Vulnerablity Disclosure Workshop in DC this week. It led to some tweets back and forth between Digital Bond alumni Matt...

747-8/-8F Models and Network Security

Earlier in the week I came across a very interesting article regarding control systems that we normally do not discuss but has a similar issue that we experience in other control system implementations. The FAA recently published a “special conditions”...

Oil Companies and APT

There is an interesting story from the Christian Science Monitor regarding attacks on some US oil companies. According to the article, the attackers used the same techniques described at S4 2010 in the keynote speech on Advanced Persistent Threat (APT), given by Kris...

3 Reasons You Should Be Using Credentialed Scanning

Scanning with credentials has opened a new frontier for security assessment. Here’s an analogy: traditional vulnerability scanning is like a mechanic evaluating a car just by looking at the outside and listening to the motor run. It’s useful but there is...

Juniper Networks Flaw

Late last week a story came out about Juniper Networks routers being susceptible to a remote reboot. Versions of JUNOS and JUNOSe prior to 10.X can be crashed by sending a single packet to an open port on the router. The reboot occurs when a packet with the TCP Header...

Smart Phones as Threat Vectors

The newly appointed “Cyber Security Czar”, Howard Schmidt recently noted that he considers smart phones and such devices one of the largest areas of concern for cyber security. Saying “What they’ve been attacking on the desktop they’ll...

ICS Vendor Security Strategies

A recent ARC Advisory Group analysis of the ABB / Industrial Defender security partnership has me thinking about the different ICS vendor security strategies. I can think of at least four different strategies and will blog on them this week. Let’s start with the...

Google, Adobe, Timely Info for APT Keynote

We selected Kris Harms from Mandiant to give next week’s S4 Keynote on the topic of Advanced Persistent Threat [APT]. This week Google and Adobe announce investigations of some more serious than normal attacks. A couple of key excerpts from the Google blog: In...