The new Apple’s iPhone 5S comes with a fingerprint scanner and this new feature has some hackers drooling.
There is a hacking bounty for anyone who is able to hack the fingerprint locking feature. A group of security researchers has offered more than $13,000 in cash along with bottles of booze, Bitcoin currency, books and other goodies to the first hacker who breaks the device in a contest promoted on the website. Other companies such as IO Capital, which donated $10,000, are adding to the bounty to encourage hackers to help research the security of the fingerprint biometric scanner.
How secure is the new Windows 8 anti virus known as Windows Defender?
Does it have a protection against malware which uses UAC bypass/process injection/rootkits/process persistence/running the binary directly in the memory`? How much can I trust windows defender? Is it better than regular AVs like Kaspersky/AntiVir?
How secure is the encryption offered by ubuntu (using the disk utility)? What algorithm is used underneath it?
If someone could at least provide a link to some documentation or article regarding that I would be very grateful.
A client has asked me to help them out with their WAF processes. Currently they have a few critical web applications being protected by a couple of WAFs. I have managed to get the WAFs tuned and ready for production. The company is fairly large and is expanding. Thus, I want to tackle the manageability of their web applications’ security by creating a process which will integrate the IT department of the company with the Business side. At the same time, I am wanting to put together what so far appears to be three different processes I am about to create into just one.
A researcher recently reported an issue in a site about using script on a 3rd party site to discover if a user is an admin.
Here’s the scenario: