Home > Uncategorized > Security News #0x16

Security News #0x16

  • If you are interested in CAPCTHA systems, you may be interested in the ongoing cat-and-mouse game between Google’s audio reCAPTCHA system and the folks making the Stiltwalker tool. They have been able to break Google’s system, only to watch Google modify it, which they then break again.
         You may also be interested in the audtion CAPTCHA system that some of my Towson colleagues are developing.
  • I came across a fantastic introduction to password hashing and salting, written by defuse.ca and available at crackstation.net.
  • The demand for experts with skill in assembly language and reverse engineering is white hot right now; I can’t tell you how many companies or government agencies have recently told me that they very much want to hire these kinds of experts. If you want to start down that road, you may be interested in a beautiful article by Patrick Horgan that shows how a C program in Linux gets started.
  • You also might want to come down to Unallocated Space on July 13 at 6:30 for the talk by Munin on x86 and ARM Assembly.
  • Are you looking for advice on how to get into the security field? Take a look at the advice of Bruce Schneier. And if you don’t know who Bruce Schneier is, go forth and read his blog!
  • Did you know there are folks out there who take pictures of their debit cards and post them to the Internet?
  • Did you know that you can use Splunk to log DNS requests made of your DNS server?
Advertisements
Categories: Uncategorized
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: