Posted on Monday, March 10th, 2014 by Ken Munro.
A mate of mine sent me this picture from the window of a bookshop recently. I thought it was a joke at first, until I found the same notebook on Amazon here: http://www.amazon.co.uk/Personal-Internet-Address-Password-Organizer/dp/1441303251/ So I ordered a couple for interest sakes. It really is a logbook for passwords. Nuts! I like their thought process, assuming […] Read More
Posted on Thursday, March 6th, 2014 by David Lodge.
If you read my last post on passwords or you’ve had some previous experience in messing around with cracking passwords, then you can understand how difficult it is to guess them. But why do all of us underpaid security consultants get all excited and happy when we get a SQL injection or get domain admin […] Read More
Posted on Wednesday, March 5th, 2014 by Chris Pickering.
We like honeypots on your internal network – they’re an awesome, cheap way of picking up rogue activity. Why would anyone legitimately be port scanning or attempting to exploit your internal network without your knowledge? They’re also a great way of tripping up your pen testers! So, when we’re testing, we need to be a […] Read More
<< Older posts