Get a Pentest and security assessment of your IT network.

News

A Clueful Interview

Nate Lawson: In software protection, obscurity is everything. Lawson: “You’re ultimately depending on the attacker to not be able to just “see” the key or how the protection works. That sounds weak and against normal security principles but actually works quite well in practice, if you’re good at it. I think that insight echoes what I said in Fight to Your Strengths last year: “Security through obscurity” is bad in all its forms, period. However, integrating security through obscurity with other measures can help force an intruder to fight your fight.”]

Source: https://taosecurity.blogspot.com/2008/06/clueful-interview.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months