If anyone thought that big bugs would end with (a disastrous) 2014, 2015 looks as though it will also cause network admins to fret. The first in the series of BIG bugs for 2015 has just been uncovered. Nicknamed FREAK, this vulnerability breaks SSL, allowing…
Troubleshooting tips for Apache, Part 3 – Apache Server modules
Use the mod_whatkilledus module When things go really bad, and Apache server crashes, The mod_whatkilledus module can be used to log detailed technical information about the crash together with the original client request which caused it. Additionally, if the mod_backtrace module is enabled, a backtrace…
Scanning vs Pen Testing
For those intent on having top notch security measures in place, the question shouldn’t really be ‘automatic or manual pen testing?’ but rather ‘how much of each?’ A web application scanner, used to identify security vulnerabilities in your web applications does not replace an experienced…
Troubleshooting tips for Apache, Part 2 – Apache HTTP Server logs
Apache HTTP Server logs First and foremost, the Apache HTTP Server error log should be analysed as this provides detailed information about any errors that have occurred on your web server. By default errors are logged in the error_log file located in the logs directory…
Troubleshooting tips for Apache, Part 1 – Verifying Apache HTTP Server Configuration and Version
Verify your Apache HTTP Server configuration Apache HTTP Server issues may also be a result of a misconfigured Apache httpd.conf configuration file. Going over the whole configuration file searching for typos may be a cumbersome task, but thankfully Apache provides a way to scan your…
The Internet of Things; Technological Paranoia Brought to Life
An emerging development which is a growing risk to security is the ‘internet of things’ (IoT). This refers to appliances which are connected to the internet and can, therefore, be hacked just as a computer can be. While their functionality might be limited, there have…
Anthem Inc hack; why healthcare insurers need to raise their bar on cyber security
It’s been known for some time that healthcare information is a target for hackers, also that the motivation for these thefts has diversified. Such data is now used not only for identity theft but is believed to be targeted by countries such as China for…
WordPress Security Tips Part 10 – Secure Your Debug Logs
During development of plugins or themes, as well as during deployment of a WordPress site, developers or system administrators may enable debug logs to log any PHP errors that occur. WordPress makes use of the WP_DEBUG constant which is defined in wp-config.php. The constant is…
Don’t Let a GHOST Vulnerability Haunt Your Systems
This week a new Linux vulnerability called GHOST (CVE-2015-0235) has been published and subsequently patched, including an update to Acunetix, which can now detect the vulnerability in both its online and on-premises forms, via network scan or web application scan. While some cited GHOST as…