I genuinely despise trade shows. Over excitable sales people who understand the product or service they are trying to sell, but not the problem it’s hopeing to solve. The “nobody wins” exchange of you giving your permission to be marketed to and suffering a 2 minute elevator pitch for a product you have no intention… Continue reading A little bullshit-free island in a sea of blinky boxes & tight jeans with brown shoes
In Part 1 and Part 2 of this little series we discussed why passwords are simultaneously both critical and pointless. “Schrodinger’s Password,” if you will. Which is all well and good but, now what do we do? Whatever we come up with the solution is likely to be a password plus [something else] because, realistically,… Continue reading What Is It With You And Passwords Anyway?
Following on from Part One Predicting the future is Hard. Bill Gates once apocryphally stated that “640k should be enough for everyone” (spoiler: he almost certainly never said that). One thing he definitely did say however, at an RSA Security conference in San Francisco way back in 2004, was that passwords “don’t meet the challenge… Continue reading Why Your Password Isn’t Important
Recently, a colleague employed by a software company asked me a question. A client of theirs has requested that they amend their software to allow them to set all their users with a single identical password that the users can’t change. He asked me, “isn’t this a bad idea, and is it even legal?” Let’s… Continue reading Why Your Password Is Important.
I hate almost everything about phishing tests and I think in most cases they are counter productive. This may seem like an odd statement from such a big advocate of “You can’t improve what you don’t measure” especially as I don’t hate the tests themselves, but I do hate why and when most people do… Continue reading You do phishing tests? Why?
This blog post has changed tack a few times in the last two days. It started to document my attempts to replicate a relevant and actively exploited vulnerability in a piece of software I know well and ended up a rant against vendors clamouring for attention without really caring about the impact inaccurate intel can… Continue reading Plex SSDP used in DDoS – Why poor intel in advisories does more than make researchers look bad
On Friday, F5 reported an unauthenticated remote code execution vulnerability (along with a second slightly less serious XSS bug that could also result in RCE) in the Traffic Management User Interface of their flagship Big-IP Load Balancer products (though it seems in-support customers got a heads-up on Wednesday) and they were so bad that US… Continue reading CVE-2020-5902- F5 Big-IP Vulnerability – Why we’re always fixing the symptoms not the cause
It can be really annoying when you reach that point on the security maturity curve when you start to identify vulnerabilities, but management just don’t seem to care. No matter how much red there is in Nessus, you just can’t get the resources to address it, it’s like they just don’t understand. It’s almost like… Continue reading Getting management to listen to you about vulnerabilities
From the outside, people either think InfoSec is all hoody wearing basement dwelling men-children popping shellz and catching cyber criminals or they are corporate cyber-police snooping on your web browsing and preventing people doing their jobs. And whilst there is a little bit of that, there is so so much more and because it’s not… Continue reading We suck at teaching the basics, because they’re dull!
People attending the 2009 BSides Liverpool got what they thought was a one-off chance to hear Jamie Hankins, who worked along side Marcus Hutchins on analysing and then sink-holing WannaCry, tell his side of how things unfolded. Jamie had originally said he didn’t want the video of the event releasing, but thankfully he recently relented… Continue reading Defending the world from WannaCry