Recent Changes - Search:

PmWiki

pmwiki.org

edit SideBar

Security

Main.Security History

Hide minor edits - Show changes to markup

March 17, 2016, at 07:49 PM by 108.171.133.178 -
Added lines 61-62:

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” | Ars Technica

October 22, 2014, at 05:14 PM by 204.101.2.194 -
Added lines 59-60:

Avoiding the Top 10 Software Security Design Flaws - CybersecurityInitiative-online.pdf

October 22, 2014, at 02:38 PM by 204.101.2.194 -
Added lines 57-58:

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users

August 25, 2014, at 05:01 PM by 204.101.2.194 -
Added lines 55-56:

Schneier on Security: The Psychology of Security (Part 1)

May 30, 2014, at 07:05 PM by 204.101.2.194 -
Added lines 9-10:

Schneier on Security: In Praise of Security Theater (Making things seem as secure as they really are)

May 30, 2014, at 06:25 PM by 204.101.2.194 -
Added lines 7-8:

SRP: What Is It?

May 30, 2014, at 06:24 PM by 204.101.2.194 -
Added lines 5-6:

zxcvbn tests (test xkcd-like passwords)

May 08, 2014, at 09:01 PM by 204.101.2.194 -
Added lines 47-48:

Schneier on Security: Changing Passwords

March 01, 2014, at 01:59 PM by 99.249.238.99 -
Added lines 45-46:

The Safe Mac » Mac Malware Guide

February 25, 2014, at 08:06 PM by 204.101.2.194 -
Changed lines 1-2 from:
to:
February 25, 2014, at 08:06 PM by 204.101.2.194 -
Added lines 1-2:
Deleted lines 42-43:
February 25, 2014, at 08:06 PM by 204.101.2.194 -
Changed lines 42-55 from:

Malvertising and Other Web Threats

Malvertising - Wikipedia, the free encyclopedia

Drive-by download attack on Facebook used malicious ads - Computerworld

What a fake antivirus attack on a trusted website looks like | Ars Technica

Blue Coat Study Shows Malware Now Targets 'Trusted Sites' - Network

Infosecurity - Malware Used Against NYT Evolves and Returns

Infosecurity - DeputyDog Gang Exploits a New IE Zero-Day Vulnerability with an AVT

to:
February 25, 2014, at 08:05 PM by 204.101.2.194 -
Changed lines 42-43 from:

!!Malvertising and Other Web Threats

to:

Malvertising and Other Web Threats

February 25, 2014, at 08:05 PM by 204.101.2.194 -
Changed lines 42-43 from:

!!Malvertising and Other Web Threats

to:

!!Malvertising and Other Web Threats

February 25, 2014, at 08:05 PM by 204.101.2.194 -
Changed lines 42-43 from:

PageName? !!Malvertising and Other Web Threats

to:

!!Malvertising and Other Web Threats

February 25, 2014, at 08:03 PM by 204.101.2.194 -
Changed lines 42-43 from:

[1]?!!Malvertising and Other Web Threats

to:

PageName? !!Malvertising and Other Web Threats

February 25, 2014, at 08:03 PM by 204.101.2.194 -
Changed lines 42-45 from:

Malvertising and Other Web Threats

Malvertising - Wikipedia, the free encyclopedia

to:

[1]?!!Malvertising and Other Web Threats

Malvertising - Wikipedia, the free encyclopedia

February 25, 2014, at 08:01 PM by 204.101.2.194 -
Changed lines 44-45 from:
to:
February 25, 2014, at 08:00 PM by 204.101.2.194 -
Changed lines 44-45 from:

Malvertising - Wikipedia, the free encyclopedia

to:
February 25, 2014, at 07:59 PM by 204.101.2.194 -
Added lines 41-54:

Malvertising and Other Web Threats

Malvertising - Wikipedia, the free encyclopedia

Drive-by download attack on Facebook used malicious ads - Computerworld

What a fake antivirus attack on a trusted website looks like | Ars Technica

Blue Coat Study Shows Malware Now Targets 'Trusted Sites' - Network

Infosecurity - Malware Used Against NYT Evolves and Returns

Infosecurity - DeputyDog Gang Exploits a New IE Zero-Day Vulnerability with an AVT

October 28, 2013, at 01:46 PM by 204.101.2.194 -
Added lines 39-40:

SSL Labs: Deploying Forward Secrecy | Security Labs | Qualys Community

August 15, 2013, at 06:08 PM by 204.101.2.194 -
Added lines 37-38:

The Scrap Value of a Hacked PC, Revisited — Krebs on Security

August 13, 2013, at 08:11 PM by 204.101.2.194 -
Added lines 34-36:

The Invisible Things Lab's blog: Evil Maid goes after TrueCrypt!
The Invisible Things Lab's blog: Anti Evil Maid

August 06, 2013, at 01:38 PM by 204.101.2.194 -
Added lines 32-33:

… Green For The Anti-Pineapple | Pentura Labs's Blog

July 24, 2013, at 06:27 PM by 204.101.2.194 -
Added lines 30-31:

Static Detection of Malicious JavaScript-Bearing PDF Documents

April 19, 2013, at 04:19 PM by 204.101.2.194 -
Added lines 28-29:

It’s Me, and Here’s My Proof: Why Identity and Authentication Must Remain Distinct

March 26, 2013, at 06:56 PM by 204.101.2.194 -
Added lines 26-27:

Penetration Testing: Kali Linux

January 20, 2013, at 05:39 PM by 99.255.166.3 -
Added lines 24-25:

How Apple and Amazon Security Flaws Led to My Epic Hacking

November 27, 2012, at 05:38 PM by 207.236.74.43 -
Added lines 15-16:

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | Wired.com

November 15, 2012, at 04:00 PM by 207.236.74.43 -
Added lines 20-21:

The Case for Elliptic Curve Cryptography - NSA/CSS (contains key size recommendations for three different types of encryption)

June 13, 2012, at 08:52 PM by 207.236.74.43 -
Added lines 18-19:

GRC's | Password Haystacks: How Well Hidden is Your Needle?

September 22, 2011, at 06:43 PM by 207.236.74.43 -
Added lines 16-17:

A Few Thoughts on Cryptographic Engineering: A diversion: BEAST Attack on TLS/SSL Encryption

August 03, 2011, at 08:35 PM by 207.236.74.43 -
Added lines 14-15:

CWE - 2011 CWE/SANS Top 25 Most Dangerous Software Errors

July 19, 2011, at 08:35 PM by 207.236.74.43 -
Added lines 12-13:
April 21, 2011, at 12:12 AM by 207.236.74.43 -
Added lines 10-11:

Dropbox authentication: insecure by design

January 21, 2011, at 10:37 PM by 207.236.74.43 -
Changed lines 7-9 from:

The Diceware Passphrase Home Page

to:

The Diceware Passphrase Home Page

SecLists.Org Security Mailing List Archive

January 21, 2010, at 10:57 PM by 192.28.0.20 -
Added lines 6-7:

The Diceware Passphrase Home Page

February 11, 2009, at 04:43 PM by 136.229.5.51 -
Added lines 4-5:

The OWASP Top 10 Website Vulnerability List

February 11, 2009, at 04:43 PM by 136.229.5.51 -
Changed lines 1-3 from:

The Six Dumbest Ideas in Computer Security

to:

The Six Dumbest Ideas in Computer Security

mod_evasive for Apache

May 06, 2008, at 07:57 PM by 192.28.2.48 -
Added line 1:

The Six Dumbest Ideas in Computer Security

Edit - History - Print - Recent Changes - Search
Page last modified on March 17, 2016, at 07:49 PM