5 top links: Security in Windows 8

Wow, Security in Windows 8 is going to move the needle.  Here are 5 of the links I Protecting you from malware Protecting your digital identity Signing in with a picture password Optimizing picture password security (Keep your screen clean if you use this one!) http://code.msdn.microsoft.com/windowsdesktop/Security-Sample-42013a3b Nice.  Looks like a lot of work for all…

4

OS Command Injection

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) See this previous blog for this subject: Software insecurity: Insecure Interaction Between Components So what is an “OS Command Injection”? (From: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not…

0

Software insecurity: Insecure Interaction Between Components

The top 6 software insecurities, with links. CWE-89 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) CWE-78 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) CWE-79 Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) CWE-434 Unrestricted Upload of File with Dangerous Type CWE-352 Cross-Site…

0

Browser security: Chrome has the most security vulnerabilities

Well, I did my occasional checking up on browser security over the past three months with the various browsers.  Graphs and a better post can be seen at Jerry Nixon’s blog, leave nice comments there, bad comments here. 🙂 http://jerrytech.blogspot.com/2011/10/browser-security-vulnerabilities.html?showComment=1319491458139#c836912712036008830      <<< Cheesy graphic which has little to do with the post    …

10