Security through ...
Follow
Find
7.2K views | +3 today
Security through Obscurity
A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. The basis of STO has always been to run your system on a “need to know” basis. If a person doesn’t know how to do something which could impact system security, then s/he isn’t dangerous. The technique stands in contrast with security by design.
Curated by Yury Chemerkin
Your new post is loading...
Your new post is loading...
Scooped by Yury Chemerkin
Scoop.it!

Cybercrime and Cybersecurity

Cybercrime and Cybersecurity | Security through Obscurity | Scoop.it
-
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog : [SECURITY] [DSA 2636-1] xen ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog: SIP Witch 0.7.4 w/libosip2-4.0.0 ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog: Squid 3.2.5 httpMakeVaryMark() ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog: Google EMEA travel and conference ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin : Cybersecurity Strategy of the ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin : Russian ransomware takes ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin: Remote system freeze thanks ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin : Security of BlackBerry PIN-to-PIN ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin: How mobile spammers verify ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Samsung Galaxy S3 partial screen-lock bypass - Blog - [Security Through Obscurity]

original link

From : ukpentestinfo () mti com
Date : Thu, 21 Feb 2013 18:59:22 GMT


MTI T...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Android-tablet omgetoverd tot mobiele hackeenheid - Security.NL

Android-tablet omgetoverd tot mobiele hackeenheid - Security.NL | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

VMSA-2013-0003

VMware vCenter Server, ESXi and ESX address an NFC Protocol memory corruption and third party library security issues.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Vulnerabilities

Vulnerabilities | Security through Obscurity | Scoop.it
Vulnerability Compilations
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin: @sto_blog http://t.co/9mUJZbZu2c

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Using Cuckoobox & Volatility to analyze APT1 malware

Analyzing a packed MiniAsp3 binary that was delivered in a phishing attack. Show in Hopper Disassembler that it's packed, run dynamic analysis in Cuckoobox, ...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog: Apache Subversion mod_dav_svn ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin : FINLAND´S CYBER SECURITY ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin: Cyber Security Strictly Regulated ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin: The Notorious Nine Cloud ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin: Offer to be a writer in PenTest ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / YuryChemerkin: Ottawa warns federal workers ...

more...
No comment yet.
Rescooped by Yury Chemerkin from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Second iPhone passcode hack vulnerability discovered

Second iPhone passcode hack vulnerability discovered | Security through Obscurity | Scoop.it
You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.

 

But as Macworld noted, this isn't the first time Apple has had to grapple with an iPhone password security flaw.

 


Via Gust MEES
more...
Gust MEES's curator insight, February 27, 2013 2:25 PM

Nobody is perfect!!!

 

Gust MEES's curator insight, February 27, 2013 2:29 PM

Nobody is perfect!!!


Philippe Trebaul's curator insight, February 27, 2013 4:19 PM
Second iPhone passcode hack vulnerability discovered.

You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.

 

But as Macworld noted, this isn't the first time Apple has had to grapple with an iPhone password security flaw.


Second iPhone passcode hack vulnerability discovered via @knolinfos http://sco.lt/...


Scooped by Yury Chemerkin
Scoop.it!

Microsoft added to hacker hit list

Microsoft added to hacker hit list | Security through Obscurity | Scoop.it
SAN FRANCISCO: Microsoft joined Facebook and Apple on Friday on the list of US technology titans targeted in recent cyberattacks.

"As reported by F
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

China Lashes Back at Hacking Claims

China Lashes Back at Hacking Claims - Free download as PDF File (.pdf), Text File (.txt) or read online for free.
more...
No comment yet.