General

Facebook enables https per default to all users

Finally, after two years from the first release of the feature and hoping that the users will switch to https, Facebook enforces now https to all users by default. This feature means that your browser is told to communicate with Facebook using a secure connection, as indicated by the “https” rather than “http” in https://www.facebook.com.   This uses Transport […]

Security

The sad state of Java security

I wrote many times about Java, their vulnerabilities, how to disable it… Just search in this blog for the term Java.         I’ve been asked many times why do I think that we are seeing these zero day vulnerabilities. The problem The problem of Oracle is that they bought a technology that was […]

CSSLP

Mentioned in the (ISC)2 Newsletter for Europa

  After publishing the article in Security Insider under the shield of (ISC)2, I was surprized to see in the monthly newsletter a reference to the article. Source: Security Insider (HTML,  PDF) Originally published in English: (ISC)2 Blog Republished in this blog: http://sorin-mustaca.com/2013/05/29/security-for-free/   “News and Events in your region”                 Zahlt kostenlose Sicherheit […]

Security

The three most common web based attacks and how to protect against them

Cybercriminals increasingly are attacking enterprises at their weakest point: the end user device. New forms of malware and social engineering attacks threaten your users every day, and even more so as they expand their use of Web-based applications. 1. Drive-by downloads. Users are visiting known websites that have a good reputation and don’t even think that it […]

General

Patches for Microsoft and Adobe address several security vulnerabilities

Microsoft and Adobe released this week plenty of patches for their software. Microsoft released as planned the MS13-052 to 058 bulletins which resolve six critical  vulnerabilities in Microsoft software. The most severe vulnerability could allow remote code execution if a user views shared content that embeds TrueType font files. An attacker who successfully exploited this vulnerability could […]

General

Upgrade of older consumer products to Version 2013

The malware landscape is evolving on a very rapid pace and these days, the technologies released 2 or 3 years ago are becoming slowly obsolete. That’s why providing security only through engine and signature updates is no longer considered enough. In order to ensure that our customers are using the best protection available, we released […]

(isc)2 Security

Security for Free ? Die Deutsche Edition.

Source: Security Insider (HTML,  PDF) Originally published in English: (ISC)2 Blog Republished in this blog: http://sorin-mustaca.com/2013/05/29/security-for-free/           Wer sein Augenmerk nur auf die Anschaffungskosten einer Sicherheitslösung richtet, zahlt oft an anderer Stelle. (Bild: Archiv) Malware, Hacking-Attacken, Software-Schwachstellen: Ist es angesichts der ausufernden Bedrohungslandschaft überhaupt möglich, sich mit Security-Tools für lau umfassend abzusichern? In diesem Beitrag […]