Welcome to Smokey's Security Forums.
Guests have only limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

WannaCry Ransomware Variant with No Kill Switch Discovered

As expected, the WannaCry ransomware is not even close to being done, despite one researcher discovering a convenient kill switch.
Other variants have already been discovered in the wild, some with a different kill switch, some with none at all.

WannaCry Ransomware Variant with No Kill Switch Discovered

Malware Log Analysis & Removal Help * OTL (OldTimer ListIt) Tutorials & Tools * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Best Practices for Securing Open Source Code  (Read 14 times)

0 Members and 1 Guest are viewing this topic.

ScarlettTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Cymru
  • Posts: 22042
Best Practices for Securing Open Source Code
« Reply #1 on: April 21, 2017, 05:16:22 PM »
Best Practices for Securing Open Source Code
21 April 2017, 4:30 pm

Attackers see open source components as an obvious target because there's so much information on how to exploit them. These best practices will help keep you safer.

Source: Dark Reading:

>> To obtain the full Dark Reading article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle