Security Mindset, Indeed

Image Source: Wikimedia

via The Grugq, come’s an enlightening view focusing on the security mindset of the original architects of the now ubiquitous internet.
If you can tear your sequestered, hunkered-down or quarantined eyeballs away from doomscrol… Continue reading Security Mindset, Indeed

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful… Continue reading Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

If an attacker can inject any code into an email client on a users computer, how can he compromise confidentiality, integrity and availability?

I have an upcoming exam for a Security course. The following question has come up a couple times in past exams and I could use some help formulating an answer.

Suppose a user downloads an unsigned application software (say an
email client… Continue reading If an attacker can inject any code into an email client on a users computer, how can he compromise confidentiality, integrity and availability?

How do you securely give access to a Java App interactive console (Linux/GNU)?

I have a Java App running, which prints out messages into STDOUT and also has an active interactive console (also accepts STDIN), when the server has started up.

How do I securely give access to an external person (outside the network) to… Continue reading How do you securely give access to a Java App interactive console (Linux/GNU)?