The Question : 135 people think this question is useful In “Some thoughts on the iPhone contact list controversy and app security”, cdixon blog Chris Dixon makes a statement about web security Many commentators have suggested that a primary security risk is the fact that the data is transmitted in plain text. Encrypting over the
The Question : 135 people think this question is useful I’m wondering where I can find good collections of dictionaries which can be used for dictionary attacks? I’ve found some through Google, but I’m interested in hearing about where you get your dictionaries from. The Question Comments : Note that “dictionary attack” is not exactly
The Question : 153 people think this question is useful Where can I find one? Is there a pot of gold at the end? How do I protect against them? From the Area51 proposal This question was IT Security Question of the Week. Read the Sep 09, 2011 blog entry for more details or submit
The Question : 168 people think this question is useful I’ve made a series of penetration tests in my network and one of the things I’ve tried was to record webcam and microphone. Recording an end-user’s microphone seems to be a stealth thing, but what about the webcam? In my tests, the indicator is turned
The Question : 244 people think this question is useful Canonical question regarding the recently disclosed padding oracle vulnerability in SSL v3. Other identical or significantly similar questions should be closed as a duplicate of this one. What is the POODLE vulnerability? I use [product/browser]. Am I affected? Is [product] vulnerable to the POODLE attack?