This Week in Security: Dan Kaminsky, Banned from Kernel Development, Ransomware, And The Pentagon’s IPv4 Addresses

This week we’re starting off with a somber note, as Dan Kaminsky passed at only 42, of diabetic ketoacidosis. Dan made a name for himself by noticing a weakness in …read more Continue reading This Week in Security: Dan Kaminsky, Banned from Kernel Development, Ransomware, And The Pentagon’s IPv4 Addresses

U.S. DoD has World’s Largest Honeypot: 6% of Internet Space

175 million IP addresses owned by the U.S. Defense Department have “appeared” on the public internet.
The post U.S. DoD has World’s Largest Honeypot: 6% of Internet Space appeared first on Security Boulevard.
Continue reading U.S. DoD has World’s Largest Honeypot: 6% of Internet Space

That’s It, No More European IPV4 Addresses

When did you first hear concern expressed about the prospect of explosive growth of the internet resulting in exhaustion of the stock of available IP addresses? About twenty years ago perhaps? All computers directly connected to the internet must have an individual unique address, and the IPv4 scheme used since …read more

Continue reading That’s It, No More European IPV4 Addresses

pktrecon, Kory Findley – Paul’s Security Weekly #589

    Kory Findley talks about his Github project pktrecon. Internal network segment reconnaissance using packets captured from broadcast and service discovery protocol traffic. pktrecon is a tool for internal network segment reconnaissance using broadca… Continue reading pktrecon, Kory Findley – Paul’s Security Weekly #589

BSidesLV Preview: Who Watches the Watchers?: Understanding the Internet’s Background Noise

The instant a device is connected to the internet, it gets scanned and interrogated for open ports, software versions, and default passwords. Who conducts these scans and why? When you connect to the internet, what kind of attacks will you immediately … Continue reading BSidesLV Preview: Who Watches the Watchers?: Understanding the Internet’s Background Noise

BSidesLV Preview: Who Watches the Watchers?: Understanding the Internet’s Background Noise

The instant a device is connected to the internet, it gets scanned and interrogated for open ports, software versions, and default passwords. Who conducts these scans and why? When you connect to the internet, what kind of attacks will you immediately … Continue reading BSidesLV Preview: Who Watches the Watchers?: Understanding the Internet’s Background Noise