ICT Security-Sécurité PC et Internet
87.2K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
November 19, 2012 5:19 PM
Scoop.it!

OWASP BeNeLux 2012 - Invitation

OWASP BeNeLux 2012 - Invitation | ICT Security-Sécurité PC et Internet | Scoop.it
Quick Facts


Date : 29-30 Novembre
Location: Leuven (Belgium)
Price : Free
Places : Limited (First registered, First serve)

Agenda
The agenda is a sound mix between Application Security, Forensics, Risk Management and represents the current security landscape at large rather well: Building security into Applications in Enterprises, Managing Application Level Vulnerabilities, Source code review on a large scale. It also has 2 innovative talks on exploit mitigation and sandboxing javascript.

 

- Browser Security - John Wilander


- Sandboxing Javascript - Lieven Desmet


- Body Armor for Binaries - Asia Slowinska


- Forensics - Marc Hullegie and Kees Mastwijk


- Streamlining Application Vulnerability Management: Communication Between Development and Security Teams - Dan Cornell


- Code review for Large Companies - Ruediger Bachmann


- Making Security Invisible by Becoming the Developer’s Best Friends - Dinis Cruz


- OWASP Top 10 vs Drupal - Erwin Geirnaert


- Panel Discussion about the legal aspects of penetration testing

 

Learn more:

http://blog.zoller.lu/2012/11/owasp-benelux-2012-invitation.html

 

No comment yet.
Scooped by Gust MEES
March 23, 2012 12:51 PM
Scoop.it!

Case Study: Securing Web Applications

Case Study: Securing Web Applications | ICT Security-Sécurité PC et Internet | Scoop.it
In this “Case Study” column, Alan shares some takeaways based on involvement in remediation engagements as a basis for understanding the reasons behind the continued trend in vulnerable web applications.
No comment yet.
Scooped by Gust MEES
November 12, 2011 7:51 PM
Scoop.it!

BeNeLux OWASP Day 2011 - OWASP

BeNeLux OWASP Day 2011 - OWASP | ICT Security-Sécurité PC et Internet | Scoop.it

BeNeLux OWASP Day 2011

 

Venue is the University of Luxembourg (Grand Duchy of Luxembourg)
Training and conference location, together with hotel information, can be found here.
Training and first list of conference speakers are announced!

No comment yet.
Scooped by Gust MEES
July 3, 2012 3:05 AM
Scoop.it!

Dangers of Jailbreaking and Rooting Mobile Devices

Dangers of Jailbreaking and Rooting Mobile Devices | ICT Security-Sécurité PC et Internet | Scoop.it

What is "jailbreaking" and "rooting"?

iOS: Jailbreaking is the process of modifying iOS system kernels to allow file system read and write access. Most jailbreaking tools (and exploits) remove the limitations and security features built by the manufacturer Apple (the "jail") through the use of custom kernels, which make unauthorized modifications to the operating system. Almost all jailbreaking tools allow users to run code not approved and signed by Apple. This allows users to install additional applications, extensions and patches without the control of Apple’s App Store.

 

Android: Rooting is the process of gaining administrative or privileged access for the Android OS. As the Android OS is based on the Linux Kernel, rooting a device is analogous to gaining access to administrative, root user-equivalent, permissions on Linux. Unlike iOS, rooting is (usually) not required to run applications outside from the Android Market. Some carriers control this through operating system settings or device firmware. Rooting also enables the user to completely remove and replace the device's operating system.

 

Read more:

http://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Dangers_of_Jailbreaking_and_Rooting_Mobile_Devices

 

No comment yet.
Scooped by Gust MEES
November 16, 2011 7:03 PM
Scoop.it!

Securing Mobile Data Communications | Blog Central

Securing Mobile Data Communications | Blog Central | ICT Security-Sécurité PC et Internet | Scoop.it

Wireless communication is inherently insecure. My consulting experience has confirmed that some organizations understand this fact when connecting to wireless networks with their laptops. However, their awareness falters when connecting their mobile devices to the same networks.

 

According to a Echoworx study, 44% of the surveyed audience at London’s Infosecurity Europe 2011 conference transmitted sensitive information unencrypted to the Internet via their mobile devices.

No comment yet.
Scooped by Gust MEES
October 10, 2011 6:28 PM
Scoop.it!

OWASP Top 10 Mobile Risks

Appsec USAMinneapolis, MNSeptember 23, 2011OWASP Top 10 Mobile RisksJack Mannino, nVisium SecurityMike Zusman, Carve Systems...
No comment yet.