(ISC)2's Newest Cash Cow: The CSSLP Certification

CEng's picture
By Chris Eng September 29, 2008  | Research 23

Last week, during the OWASP AppSec 2008 Conference, the people behind the ubiquitous CISSP certification announced their latest creation -- the Certified Software Security Lifecycle Professional (CSSLP). In front of a captive audience waiting for a 42" plasma TV to be raffled, the  Executive Director of (ISC)2  outlined this new certification designed to appeal to... READ MORE

Learning From Sarah Palin's Yahoo Mail Compromise

cwysopal's picture
By Chris Wysopal September 18, 2008

The password reset functionality of any online service is a major source of risk. They are especially problematic when they use only a "secret question" concerning personal information only and don't tie back to another email account or a text message. Another account or cell phone number is something "out of band" from a direct transaction with the online service. It becomes 2-factor... READ MORE

Speculation on Palin E-mail Hack

CEng's picture
By Chris Eng September 17, 2008  | 8

Assuming the mailbox hack is not an elaborate ruse, how did they do it? Almost as bad as the Sprint PCS password reset fiasco that made the news in April, here is the Yahoo Mail password reset screen: As you can see, you need to know the user's birthday, country of residence, and postal code. Not difficult information to dig up in Palin's case. After you enter this information correctly, you are... READ MORE

Sarah Palin's Yahoo Mailbox Compromised

cwysopal's picture
By Chris Wysopal September 17, 2008

A group of individuals has compromised VP candidate Sarah Palin's personal email and sent the information to Wikileaks which has posted the information publicly. http://wikileaks.org/wiki/Sarah_Palin_Yahoo_email_hack_2008 Circa midnight Tuesday the 16th of September (EST) Wikileaks' sources loosely affiliated with the activist group 'anonymous' gained access to U.S. Republican Party Vice-... READ MORE

Distributing Malware Through Trusted Websites

CEng's picture
By Chris Eng September 15, 2008  | 5

Why bother setting up dedicated websites to host malicious content when you can just infect trusted sites like BusinessWeek? This is becoming something of a trend, as evidenced by the mass SQL Injection attacks from a few months ago. The idea is simple -- find SQL Injection vulnerabilities in high-traffic, trusted websites where the site's content is dynamically fetched from a database (i.e. just... READ MORE

VP Nominee Sarah Palin, Hacker?

cwysopal's picture
By Chris Wysopal August 30, 2008  | 5

John McCain's pick for VP, Sarah Palin, knows a thing or two about retrieving evidence from a computer. The mainstream reporting calls her a "hacker" because she is able to retrieve files from the Windows recycle bin. The Anchorage Daily News reports back in September 2004: Sarah Palin never thought of herself as an investigator. Yet there she was, hacking uncomfortably into Randy Ruedrich's... READ MORE

MBTA Hack Shows Security Hasn't Improved in 10 Years

cwysopal's picture
By Chris Wysopal August 25, 2008

One of my old L0pht collegues, Peiter "Mudge" Zatko, is featured in Mass High Tech today in an article titled Bay State hackers find security holes in defibrillators, RFID. Hackers getting a free T pass may be the least of our worries — local hackers-turned-security experts suggest RFID keycards, wireless networks and medical devices implanted in the body are also vulnerable to hacks. At last... READ MORE

MBTA Hacking Injunction Lifted

CEng's picture
By Chris Eng August 20, 2008

Earlier today, the US District Court dealt a victory to the MBTA hackers and the EFF, lifting the injunction issued on August 9th to prevent the three MIT students from presenting their findings at DEFCON 16. In summary: The lawsuit claimed that the students' planned presentation would violate the Computer Fraud and Abuse Act (CFAA) by enabling others to defraud the MBTA of transit fares. A... READ MORE

MBTA Hack: Is It Really This Easy?

cwysopal's picture
By Chris Wysopal August 15, 2008

A lot of the focus of the MBTA vs MIT case has been discussion of the CharlieCards. These are MiFare classic cards which have been known to be broken earlier this year. There is also a paper disposable card called the CharlieTicket that uses a magnetic stripe. The MIT students presentation states that these are cloneable and forgeable using a $150 magnetic stripe reader/writer. From the... READ MORE

MBTA vs MIT Students Case Continues

cwysopal's picture
By Chris Wysopal August 13, 2008

A hearing will be held in Boston tomorrow to decide whether or not the restraining order gagging the MIT students from talking about the vulnerabilities they have found should be lifted. Even though the Defcon presentation is widely available and the MBTA disclosed the "Confidential" memo from the MIT students in their court filings, they are seeking a permanent speech injunction. An august group... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu