2015-04-01から1ヶ月間の記事一覧

Security: Researchers Plan to Demonstrate a Wireless Car Hack This Summer

Researchers Plan to Demonstrate a Wireless Car Hack This Summer | WIREDwww.wired.com

Security: FFRI: Monthly Research 「WordPressの脆弱性を狙ったWeb改ざん攻撃」

Monthly Research 「WordPressの脆弱性を狙ったWeb改ざん攻撃」│セキュリティ・リサーチのFFRI(エフエフアールアイ)www.ffri.jp

IT: Metasploit――大いなる力を手に入れる

Metasploit――大いなる力を手に入れる (1/2)www.atmarkit.co.jp

Java: Java Day Tokyo 2015

http://www.oracle.com/technetwork/jp/ondemand/online2015-javaday-2511676-ja.html

IT: Smart Meters: a government IT disaster waiting to happen

Smart Meters a government IT disaster waiting to happen | IoDwww.iod.com http://www.iod.com/~/media/Documents/PDFs/Influencing/Press/Smart%20meters%20-%20Not%20too%20clever.pdf

IT: IT人材白書 2015

IPAが「IT人材白書」2015年版を発行、IoTやM2Mの時代に求められるスキルとは -INTERNET Watchinternet.watch.impress.co.jp IT人材白書:IPA 独立行政法人 情報処理推進機構www.ipa.go.jp

Security: The DoD Cyber Strategy

http://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf DoD's New 'Transparent' Policy on Cybersecurity Is Still Opaque | WIREDwww.wired.com Pentagon Unveils New Cyber Strategy - eSecurity Pl…

Crypto: CRYPTRECシンポジウム2015 (プレゼンテーション資料公開)

http://www.cryptrec.go.jp/topics/cryptrec_20150424_symposium2015_presentation.html

Security: 全てに不正プログラム 中継サーバー 3社の計5200台

全てに不正プログラム 中継サーバー 3社の計5200台www.tokyo-np.co.jp

Security: HP Security Research; Cyber Risk Report 2015

http://info.hpenterprisesecurity.com/LP_456590_Cross_CyberriskFullReport_0115_gate

Security: IBM X-Force 2015 年第 1 四半期レポート

http://www-01.ibm.com/software/jp/cmp/security_report/

Security: F-Secure Threat Report H2 2014

エフセキュアブログ : 新たな脅威レポートblog.f-secure.jp https://www.f-secure.com/documents/996508/1030743/Threat_Report_H2_2014

APT: CozyDuke

エフセキュアブログ : CozyDuke(TLP: White)blog.f-secure.jp https://www.f-secure.com/documents/996508/1030745/CozyDuke

Security: cloudpack Security White Paper

cloudpack Security White Papercloudpack.jp

Security: ロボット・ドローンと情報セキュリティ

https://in-law.sakura.ne.jp/archive/taikai/2014/bunkakai2-Yamaki.pdf

Tech: Bluetooth SIG(Bluetooth 4.2)

Bluetooth 4.2 Smarter, Faster, Enables IoT | Bluetooth Technology Websitewww.bluetooth.com 最新規格「Bluetooth 4.2」発表、セキュリティと転送速度が向上eetimes.jp Bluetooth 4.2 インターネット接続機能を理解する (1/4)ednjapan.com

Security: 2H 2014 NSFOCUS DDoS THREAT REPORT

http://www.nsfocus.com/SecurityReport/2H%202014%20NSFOCUS%20DDoS%20THREAT%20REPORT.pdf

Security: New Security Guidance for Early Adopters of the IoT

https://downloads.cloudsecurityalliance.org/whitepapers/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf Security of Internet of Things in Spotlight at RSA Conference | SecurityWeek.Comwww.securityweek.com

Security: Identifier based XSSI attacks

http://www.mbsd.jp/Whitepaper/xssi.pdf http://www.securityfocus.com/archive/1/535268

Security: 2015 Data Breach Investigations Report

2015 Data Breach Investigations Report (DBIR)www.verizonenterprise.com

Security: APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION

https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf

Security: FighterPOS

The Anatomy and Operation of a New One-Man PoS Malware Campaign http://sjc1-te-ftp.trendmicro.com/images/tex/pdf/wp-fighterpos.pdf

RFC: Public Key Pinning Extension for HTTP

https://tools.ietf.org/html/rfc7469

Security: XSSYA (XSS Scanner & Vuln Confirmation) v2.0 Released

http://www.digitalmunition.me/2015/04/xssya-xss-scanner-vuln-confirmation-v2-0-released/

Security: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen

GAO: In-Flight Wi-Fi Could Be Used to Hack Airplanes - eSecurity Planetwww.esecurityplanet.com Pilot: US Government Claims Of Plane Wi-Fi Hacking Wrong And Irresponsiblewww.forbes.com http://www.gao.gov/assets/670/669627.pdf

Android: Instrumenting Android Applications with Frida

MDSec Blog: Instrumenting Android Applications with Frida Mobile Application Hacker's Handbookに入れたかったがいれられなかった話題とのこと。Fridaというツールを使う話。

Security: MITRE - Ten Strategies of a World-Class Cybersecurity Operations Center

http://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-strategies-cyber-ops-center.pdf