Possible vulnerability in F5 BIG-IP LTM

Possible vulnerability in F5 BIG-IP LTM
About a year ago, while I was performing a web site penetration test for a customer, I run a manual fuzzing phase, where I like to “question” even the most basic networking and application conventions, and this time it paid off more than the usual… The site was behind a “F5 Networks” BIG-IP device, running ...

How to protect yourself from the Samsung keyboard vulnerability in Android devices

A few weeks ago, on June 2015, the mobile devices security company “NowSecure”, has published a post about a vulnerability they have found, titled “Remote Code Execution as System User on Samsung Phones Summary”, discovered by its researcher, Mr. Ryan Welton. This research was also marked using two official vulnerability identifications of CVE-2015-4640 and CVE-2015-4641. ...

A thought about the essence of vulnerability

  I would like to offer slightly differently way of thinking about the concept of vulnerability. Vulnerability, in the context of information security, refers to one or more weaknesses, and following its exploitation, the probability of damaging data or information systems and/or processes. Vulnerability as a concept, originates from the human life, of human weakness ...