brownhatsecurity.com
Brown Hat Security - Moving Targets
https://brownhatsecurity.com/brown-hat-security-moving-targets.html
Brown Hat Security - Moving Targets. Tue 13 January 2015. This does not mean that investments in security are not worthwhile, though. It merely means that you will need to adjust your strategies to handle this different assumption - that you need strategies for losing as well as for winning. Speculating on the things you do not know and cannot know also has its uses - besides reinforcing your knowledge of the boundaries of your knowledge, you also can gain perspective on how to refine your further resear...
brownhatsecurity.com
Brown Hat Security
https://brownhatsecurity.com/index.html
BSides Las Vegas 2016 and More! Tue 26 July 2016. BSides Las Vegas is next week, and I'm very pleased to note that a friend and colleague, Nik LaBelle, and I will be presenting Domains of Greys. A talk introducing DNS greylisting. If you miss that talk, then come up to Skytalks at Defcon on Friday at 11, where . Fri 06 May 2016. Biometric factors are not suitable for authentication. Mitigation for Whitelisting Bypass using regsvr32 - "White Register". Thu 21 April 2016. Please note, the . One of the most...
brownhatsecurity.com
Brown Hat Security - Infosec
https://brownhatsecurity.com/category/infosec.html
Internet of Asymmetric Warfare. Mon 29 February 2016. One of the most significant problems facing the tech industry today is that of securing the so-called 'Internet of Things' - the vast mishmash of network-enabled gizmos and tchotchkes that seem to be the primary focus of development efforts today. When there are APIs available for toothbrushes. The likelihood of other . Fri 26 February 2016. The recent announcement by Google of a service to mitigate DOS attacks. Thu 21 January 2016. Wed 20 January 2016.
brownhatsecurity.com
Brown Hat Security - Weak Links
https://brownhatsecurity.com/category/weak-links.html
Fri 06 May 2016. Biometric factors are not suitable for authentication. This is a bit of a radical claim - after all, biometrics are traditionally considered to be one of the traditional three factors, being "a thing you know", "a thing you have", or "a thing you are" - but biometrics fail on several very important . Brown Hat Security - Password Recovery Procedures. Sun 04 October 2015. Brown Hat Security - Weak Links: URL Shorteners. Wed 07 January 2015. Proudly powered by Pelican.
brownhatsecurity.com
Brown Hat Security - Eric Rand
https://brownhatsecurity.com/author/eric-rand.html
BSides Las Vegas 2016 and More! Tue 26 July 2016. BSides Las Vegas is next week, and I'm very pleased to note that a friend and colleague, Nik LaBelle, and I will be presenting Domains of Greys. A talk introducing DNS greylisting. If you miss that talk, then come up to Skytalks at Defcon on Friday at 11, where . Fri 06 May 2016. Biometric factors are not suitable for authentication. Mitigation for Whitelisting Bypass using regsvr32 - "White Register". Thu 21 April 2016. Please note, the . One of the most...
brownhatsecurity.com
Brown Hat Security - Weak Links: URL Shorteners
https://brownhatsecurity.com/brown-hat-security-weak-links-url-shorteners.html
Brown Hat Security - Weak Links: URL Shorteners. Wed 07 January 2015. URL shortening services are a ubiquitous part of the internet now, with everyone and his brother coming up with a way to contract long addresses into something shorter and more suited for entering into a tablet or mobile phone. Unfortunately, this convenience comes at a cost, and some bad actors have found ways to use URL shorteners to your disadvantage. More troubling, though, are the 'ad supported' URL redirectors that were discussed...
brownhatsecurity.com
Brown Hat Security
https://brownhatsecurity.com/archives.html
Archives for Brown Hat Security. Tue 26 July 2016. BSides Las Vegas 2016 and More! Fri 06 May 2016. Thu 21 April 2016. Mitigation for Whitelisting Bypass using regsvr32 - "White Register". Sat 16 April 2016. The Trouble with Sibyls. Mon 29 February 2016. Internet of Asymmetric Warfare. Fri 26 February 2016. Sat 06 February 2016. Thu 28 January 2016. Thu 21 January 2016. Wed 20 January 2016. Fri 18 December 2015. Brown Hat Security - Business practices in the age of the wire fraud scam. Sun 04 October 2015.
brownhatsecurity.com
Brown Hat Security - Attack Surfaces
https://brownhatsecurity.com/brown-hat-security-attack-surfaces.html
Brown Hat Security - Attack Surfaces. Thu 08 January 2015. To secure a building, you need to lock and alarm windows and doors, and restrict the capability of people to enter and exist to a known, monitored entrance. Information systems require the same kind of care and attention, though they frequently do not receive it. An attacker who knows what they're looking for can, with freely available tools. And a few dollars' investment in the infrastructure to take advantage of them. Look for a given vulnerabi...
brownhatsecurity.com
Brown Hat Security - Information Security
https://brownhatsecurity.com/category/information-security.html
Brown Hat Security - Business practices in the age of the wire fraud scam. Fri 18 December 2015. The CEO/CFO wire fraud scam has grown increasingly common as of late, and has very successfully bilked businesses out of great quantities of money. This is, fundamentally, an information security problem and should be treated as such. The scam goes like this: a CEO is traveling to a foreign . Brown Hat Security - Phishing the Government. Tue 22 September 2015. The CISO of the Department of Homeland Security.
SOCIAL ENGAGEMENT