In association with heise online

09 June 2013, 09:59

Lost+Found: From fake phishing to a Fortinet facepalm

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Lost+Found

Too small for news, but too good to lose, Lost+Found is a compilation of the other stories that have been on The H's radar over the last seven days: Fake phishing, textbook SQL injections, security 101 for app developers, reverse engineering malware, a Fortinet faceplam, a pentester edition of Firefox and further news on the QNAP vulnerabilities.

  • US media firm Atlantic Media caught its staff red-faced and red-handed in a phishing test – 58 per cent clicked on a link to verify their Google Apps accounts included in a fake phishing email. A sad reality.

  • As we are talking about sad realities, a wide range of GitHub projects provide textbook examples of how to construct an SQL injection vulnerability.

  • The iMAS libraries are aimed at helping iOS app developers avoid major security pitfalls. They include data encryption and password protection functions.

  • If you want to report a security vulnerability in Chrome to Google, don't follow the example of the Fortinet security team and post your entire complete browser profile, including stored passwords.

  • QBurst PenQ adds a preconfigured edition of Firefox, which includes all major penetration testing extensions, to security Linux distributions such as Kali.

(djwm)

Print Version | Send by email | Permalink: http://h-online.com/-1885158
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit