masatokinugawa.l0.cm
Masato Kinugawa Security Blog: 3月 2014
http://masatokinugawa.l0.cm/2014_03_01_archive.html
Masato Kinugawa Security Blog. 2014年3月1-2日に行われたSECCON 2013 全国大会のカンファレンスで、 cybozu.com Security Challenge. Cybozu.com Security Challengeは、サイボウズが2013年11月に実施した、同社が提供するアプリケーション「kintone」の実際の脆弱性を発見する賞金付きコンテストです。 優勝賞金は、1,03 8,960円を頂きました。 一部で話題になりましたが、このパネルにおかしいところが4件あるそうなので、まだ間違い探しをトライしていない方は探してみてください。 見つけた脆弱性について(cybozu.com Security Challenge). コンテスト参加者の皆さま、お疲れ様でした。修正された問題はぜひ共有してください。 Posted by Masato Kinugawa. OWASP AppSec APAC 2014で発表しました. OWASP AppSec APAC 2014. 以下、発表では伝えきれなかったこと、確実に伝えたいことを Q. レスポンスヘッダによる指定の...
janpaulposma.nl
Curriculum Vitae: Jan Paul Posma
http://janpaulposma.nl/cv
Dutch (native), English ( IELTS. San Francisco, California, 94103. United States of America. Navigate this document by clicking headers, or print. It as PDF ( short version. Please find an interactive version of this document online at janpaulposma.nl/cv. This is a shortened version. Find the full interactive document online at janpaulposma.nl/cv. Curriculum Vitae: Jan Paul Posma. I’ve written production code in 15 languages. Taught programming and engineering for 8 years. Made 3 legacy code bases. The p...
blog.codinghorror.com
Given Enough Money, All Bugs Are Shallow
https://blog.codinghorror.com/given-enough-money-all-bugs-are-shallow
Programming and human factors. Given Enough Money, All Bugs Are Shallow. Eric Raymond, in The Cathedral and the Bazaar. Given enough eyeballs, all bugs are shallow. The idea is that open source software, by virtue of allowing anyone and everyone to view the source code, is inherently less buggy than closed source software. He dubbed this "Linus's Law". However, the Heartbleed SSL vulnerability. Was a turning point for Linus's Law, a catastrophic exploit based on a severe bug in open source software.
wwws.nightwatchcybersecurity.com
Opinion | Nightwatch Cybersecurity
https://wwws.nightwatchcybersecurity.com/category/opinion
Cybersecurity services and research. Opinion: Security Bounty Hunting for Fun and Profit. October 18, 2015. June 19, 2016. Why would a vendor pay bounties? Bounty programs that are run by vendors are positioned as a safer alternative to the black market with bounty payouts often as high as what the open market commands without the risk or hassle of dealing with the underground economy. How does the bounty process work? Once accepted, the vendor will usually begin an investigation. During this process...
bateman-group.com
Hacking Vint Cerf’s Wine Cellar, or Why We Need to Secure the Internet of Things
http://www.bateman-group.com/banter/hacking-vint-cerfs-wine-cellar-or-why-we-need-to-secure-the-internet-of-things
May 4, 2015. Hacking Vint Cerf’s Wine Cellar, or Why We Need to Secure the Internet of Things. If you haven’t seen Vint Cerf speak, you’re missing out. He’s smart, funny and humble. He’s also a legend; commonly introduced as the father of the Internet, he co-designed TCP/IP. The protocol for sending data packets over the Internet, and helped bring Internet-based email to the masses. Cerf is a big proponent of the Internet of Things. And he thinks it needs to be secure. We’re only in the early stages of t...
balaphp.com
Programing | Balaphp
http://www.balaphp.com/category/programing
Bala Powerful Human Processor. This is Balaphp, Gladiator of the scripts, Sailor of the code team, Loyal servant to my lord PHP, Dynamic coder to a App, Designer to a Database and I will have my complete knowledge, in this life and the next. Nodejs module.exports and exports. January 28, 2015. Nodejs offering modular system with. Is nothing its just a helper or assistant for. It will transmit the data it contains to. When the module.export is not declared with some assigning operator. Okay now you will h...
appworks.nl
Nieuws | AppWorks
http://appworks.nl/category/nieuws
Nieuwe toolkit vereenvoudigt de ontwikkeling van UWP apps. Stelt een nieuwe open source toolkit beschikbaar die ontwikkelaars helpt aan de slag te gaan met de nieuwe SDK voor Windows 10. De toolkit bevat verschillende functionaliteiten die het ontwikkelen van Universal Windows Platform (UWP) apps vereenvoudigen of demonstreren. Zorg dat waarschuwingsmeldingen gebruikers niet storen’. Bunq, GDI Foundation en XtraEye maken kans op Digital Impact Award 2016. Strijden om de Digital Impact Award 2016. Lancere...
mecha-security.com
脆弱性を報告すると報奨金がもらえるプログラムを探してみた | メチャセキュリティ・ドットコム
http://www.mecha-security.com/archives/2015/08/bugboundary.html
On 8月 10, 2015 in セキュリティHACKS. 今は hackerone や Bugcrowd といったクラウドサービス上でBug Bounプログラムを提供しているベンダーが多いみたいです。 HackerOne: Vulnerability Coordination and Bug Bounty Platform. Bugcrowd Your Elastic Security Team, better security testing through bug bounties and managed security programs. Bugcrowd List Of Bug Bounty Programs. ここ1年間で Macに影響するマルウェア 脆弱性まとめ 2015年8月時点. ここ1年間で Macに影響するマルウェア 脆弱性まとめ 2015年8月時点. Designed by Elegant Themes.
SOCIAL ENGAGEMENT