Showing 15 results for: September 2014 ×

Identify Crimeware Strains with Edit Distance

When trying to identify crimeware/malware, it's a good idea to design a multi-part system that deploys a variety of detection techniques to increase your chances of detection. You can start with one technique and then layer on additional techniques as...

Cracking IKE Mission:Improbable (Part3)

Introduction As discussed in parts 1 and 2 of this series, the most common VPN endpoints (responders) found supporting Aggressive Mode negotiation are Cisco devices. However, they are also almost always supported by a second factor authentication mechanism known as...

SpiderLabs Radio: September 18, 2014

In this episode: Apple's new security features in iOS8 XSS bug reintroduced in Kindle Bleep, a new secure messaging app Android Browser Privacy Bug Updates for Adobe Reader/Acrobat We'd love to hear what you think or what you'd like to...

SpiderLabs Radio: September 11, 2014

In this episode I talk about the non-existent massive leak of 5 million Google email credentials and discuss the security aspects of Apple's newly announced Apple Pay payment system. We'd love to hear what you think or what you'd like...

Indicators of Compromise: A Discussion with Karl Sigler

Head over to the Trustwave blog for a video discussion about indicators of compromise with Karl Sigler, host of SpiderLabs Radio and Trustwave SpiderLabs Threat Intelligence Manager. Topics include why initial detection of a breach is so hard for businesses,...

Microsoft Patch Tuesday, September 2014

Today is Microsoft Patch Tuesday and it’s one of the lightest of the year. This release includes four bulletins, one rated Critical and three rated Important. Despite the short list of bulletins, Internet Explorer clocks in with another 37 CVEs...

SpiderLabs Radio: September 4, 2014

In this episode: All things iCloud and Naked Celebrity Leaks Plus tracking Criminals with VirusTotal Links mentioned in this podcast: VirusTotal tracking and analysis We'd love to hear what you think or what you'd like to hear in future episodes....

Stupid Spammer Tricks – Reversing Characters

Spammers engaged in phishing attacks constantly try to get their emails past spam filters. They try many different tactics, and these can include taking advantage of HTML coding characteristics. These HTML tricks can make the email look normal when rendered...

Microsoft Advance Notification for September 2014

On Tuesday, September 9th, Microsoft will publish their next security update release. This is the lightest patch Tuesday since January. This release will only have four bulletins with one rated "Critical" and the rest "Important." These bulletins will affect Internet...