Software Reliability

It seems I have to deal with a question of who to trust – our new product or an established software package – way too often. Answers make me question what is the level of testing in open-source software and what is the reliability of software in general. Continue reading Software Reliability

Life at Enigma Bridge

We had another Enigma Bridge workshop / away days. We organise it every four to six weeks and it always surprises me how it energises everyone. True, we usually need a couple of days to recover so it’s good to finish on Friday. Continue reading Life at Enigma Bridge

A Long Dark Tea-Time of The Soul

You may know the mood when all seems to be done but new tiny issues keep cropping up every day … until they eventually disappear without you realizing it. The title has kind of sprung to my mind.

A lot has happened since my previous post and I indeed lived and breathed Enigma Bridge.  While we kept focussing on a particular market segment we decided to make our products easier to test by smaller companies – a new test/staging instance of Enigma Bridge service will be launched within days. We did a good progress business-wise as well. But one thing I want to mention in particular is an ASIRTA tool – a baseline profiler for data governance. Continue reading A Long Dark Tea-Time of The Soul

Too Small To Be Attacked? Think Again!

Computers today are attacked and get hacked in not because of WHO we are but WHAT software and systems we are using. There is little difference whether you run a small company with 1 computer or a multinational enterprise.

Continue reading Too Small To Be Attacked? Think Again!

Password Attacks – A Small Server Experiment

This short post looks at passwords attacks that were launched during 5 months’ period against a small web server of ours in 2013.

There are a lot of statistics about what is the most prolific passwords we use to login to our online accounts. What we were interested in was what passwords are being used to guess logons to online systems. We setup a WordPress website and started logging passwords tried against that website. Here are some results after about 5 months of monitoring and over 11,000 of logged attacks.

Continue reading Password Attacks – A Small Server Experiment

Password Attack Taxonomy

This attack taxonomy includes most common attacks on passwords. The table below shows attack categories split into online and offline attacks. Offline attacks require access to a database of scrambled or encrypted passwords, while online attacks would use normal user interface to test or obtain user passwords.

Screen-Shot-2013-11-28-at-21.33.02 Continue reading Password Attack Taxonomy

Looking for Adversary

Experts like to say that we are responsible for our security on internet. I disagree as we are not born as security experts. Neither does common sense always makes sense as users can’t see what is going on behind flashy images on their monitors. Who is the real bad boy? Continue reading Looking for Adversary

Why Storing Plaintext Passwords Is Bad

No matter what bad news we hear about passwords – leaks, security breaches, compromised security – passwords provide a very good protection when used properly. The real weak link here is the user. If users could remember long and random passwords, the “problem of passwords” would be much, much smaller. The hype would disappear and the real issue – how internet companies store passwords – would become much move visible.

Continue reading Why Storing Plaintext Passwords Is Bad

Online and Mobile Banking Fusion

Banks simplify access to our bank accounts. They keep relaxing security while hoping to replicate the boiling frog story. The trouble is that no-one dies and someone will figure out – sooner rather than later.

Debit-cards

I touch on a few things: using online banking to find valid card numbers, and date of birth, increasing chances for unauthorised access, lowering security of login credentials and changing role of debit cards.

Continue reading Online and Mobile Banking Fusion