For quite a while now, we provide the option to use a time-based one-time password as a second factor to authenticate to your ISC account. The implementation we picked was RFC 6238 as it is also implemented by Googles popular Authenticator app. But so far, we havent had a good solution for the lost authenticator problem
Author: Perry Varanoid
ISC StormCast for Friday, October 9th 2015 http://isc.sans.edu/podcastdetail.html?id=4691, (Fri, Oct 9th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Adobe is going to release eight security updates for Adobe Acrobat and Reader for Windows and Macintosh next Tuesday, October 13, 2015. A list of the updates is available here .  https://helpx.adobe.com/security/products/acrobat/apsb15-24.html ———– Guy Bruneau IPSS Inc.
Original release date: October 08, 2015 The Internet Crime Complaint Center (IC3) has issued an alert to consumers and merchants about the security risks involved with EMV Cards. An EMV card is a credit or debit card with a microchip that helps protect cardholder data
There’s a new cryptanalysis result against the hash function SHA-1: Abstract : We present in this article a freestart collision example for SHA-1, i.e., a collision for its internal compression function. This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps, while only 10 days of computation on a 64 GPU cluster were necessary to perform the attack
Can malware be good?