Quantcast
Channel: The Vulnerability Management Blog » Oscar Carlsson
Browsing all 4 articles
Browse latest View live

To Accept, or Not to Accept: Things to consider when building a Risk...

Two Minute Takeaway: Risk acceptance is a good and necessary part of all risk management. It is preferable to accept risks temporarily once it is clear they cannot be resolved for a period of time. It...

View Article



The “Cobra Effect” – Are you part of the password problem?

Passwords are used everywhere and for everything. It’s hard to go even one day without using at least one password whereas it’s for email, social media, to access bank accounts, etc. However, when it...

View Article

New vulnerability: CVE-2014-6271 remote code execution through bash

A new security vulnerability was disclosed yesterday in Bash, a shell for UNIX systems and the default shell in many distributions of UNIX including Linux and Mac OSX. This extremely damaging...

View Article

The exploitation of public information – A short OSINT primer

In the beginning of the Internet there was war-dialing. The practice of calling every phone number in an area, in sequence, waiting for a modem to pick up.  The name originates from the 1983 film...

View Article
Browsing all 4 articles
Browse latest View live




Latest Images