Information Security
240 views | +0 today
Follow
Information Security
Infosec, cryptography and related subjects.
Curated by zeroXten
Your new post is loading...
Your new post is loading...
Scooped by zeroXten
Scoop.it!

fMBT | 01.org

fMBT | 01.org | Information Security | Scoop.it
fMBT generates and executes tests automatically. It very quickly finds and tests paths that would never be tested by human test designers. This increases test coverage and cuts down test maintenance efforts, when compared to traditional test automation.
more...
No comment yet.
Scooped by zeroXten
Scoop.it!

Using OpenSSL to create a test Qualified Subordination PKI hierarchy | UNMITIGATED RISK

more...
No comment yet.
Scooped by zeroXten
Scoop.it!

Secure Secure Shell

Secure Secure Shell | Information Security | Scoop.it
You attempted to reach stribika.github.io, but instead you actually reached a server identifying itself as a shape shifter humanoid reptile alien. This may be caused by a misconfiguration on the server or something more serious. An attacker on your network could be trying to get you to visit a fake (and definitely harmful) version of stribika.github.io. You should not proceed.
more...
No comment yet.
Scooped by zeroXten
Scoop.it!

Authz for Cloud - You Can't Control What You Can't See

Authz for Cloud - You Can't Control What You Can't See | Information Security | Scoop.it
Conjur is the world's leading authz for cloud solution, used by DevOps to monitor, manage, secure, and audit their entire cloud infrastructure.
more...
No comment yet.
Scooped by zeroXten
Scoop.it!

Stealing unencrypted SSH-agent keys from memory

Stealing unencrypted SSH-agent keys from memory | Information Security | Scoop.it
It is possible to use gdb to dump the memory of a running SSH-agent and then use that memory to reconstruct a SSH key. This provides the attacker with a way of getting access to a SSH key without knowing the key’s passphrase.
more...
No comment yet.
Scooped by zeroXten
Scoop.it!

Privacy groups look to 'reset Net' to blunt NSA spying

Privacy groups look to 'reset Net' to blunt NSA spying | Information Security | Scoop.it
Web users and developers should take new steps to avoid surveillance by the U.S. National Security Agency and other spy organizations, a group of privacy and digital rights advocates said Monday.
more...
No comment yet.
Scooped by zeroXten
Scoop.it!

PKI.js

PKI.js | Information Security | Scoop.it
PKIjs is a pure JavaScript library implementing the formats that are used in PKI applications (signing, encryption, certificate requests, OCSP and TSP requests/responses). It is built on WebCrypto (Web Cryptography API) and requires no plug-ins.
more...
No comment yet.
Scooped by zeroXten
Scoop.it!

Lynis - Security auditing and hardening tool for Linux/Unix

Lynis - Security auditing and hardening tool for Linux/Unix | Information Security | Scoop.it
Lynis is an open source security auditing tool. Part of Lynis Enterprise Suite, its main goal is to audit and harden Unix and Linux based systems.
more...
No comment yet.
Scooped by zeroXten
Scoop.it!

Asshat of the Year Award: Dave Dewalt, CEO of $FEYE | Trading Algorithms with The Fly

Asshat of the Year Award: Dave Dewalt, CEO of $FEYE | Trading Algorithms with The Fly | Information Security | Scoop.it
Stock picks, stock discussion, market news, stock analysis, investing blogs
more...
No comment yet.