Security Leftovers
-
How To Secure Your Admin Login Page - Invidious
In this video I show you how to secure an admin login page for your wordpress login, cpanel, Django, or any other website framework that has an admin login page.
-
Google Issues ‘High’ Priority Update For Chrome Browser Users
-
Optus Hack just tip of the iceberg. FinTechs harvest bank details and passwords, can sell them too
Australian FinTech companies collect your bank customer registration number and your password to access your bank accounts; and they keep that access even if you no longer use their services. Cyber security expert Manal al-Sharif explores privacy rorts.
Their star may be fading as stock market darlings, but the FinTech companies continue to challenge the big banks, using aggressive data-collecting techniques that not only flouts privacy principles, but seem highly unethical. And the big banks look the other way.
-
New CISA Operational Directive Strengthens Cyber Defenses for Federal Networks | Mandiant
Mandiant recently reported that about 26 percent of the time, actors gain initial access through the exploitation of public-facing applications, which underscores how critical it is for organizations to maintain an up-to-date inventory of assets and vulnerabilities; this is true for both public and private sector entities—as no one is immune—including the federal government.
-
That time the creator of UNIX built a Trojan Horse that let him log in to any UNIX machine.
Back in 1984, the Association for Computing Machinery presented Ken Thompson with a “Turing Award” for his many contributions to the world of computing.
Ken worked on Multics, co-created UNIX, created multiple programming languages (Bon and B — which directly led to C), co-created the Plan 9 operating system, and on and on. The man certainly has earned a few computing awards.
But we’re not here today to talk about those contributions to computing.
No, sir. We’re here to talk… about his acceptance speech. Because it is absolutely amazing… and it revealed an absolutely fascinating computer virus that Thompson had created years earlier… for the C compiler.
[...]
Ken modified cc (the C compiler on UNIX systems) so that — only when it was compiling UNIX’s “login” program — it would inject a small “backdoor” (into “login”) that would allow him to log in as any user on the system if he used a predefined “password”.