Event name: CYBER SECURITY SUMMIT Financial Services, MENA Date: 9th – 10th...
We’ve come up with quite a treat for you for the weekend! Look through our Pre-Premiere Hacking Oracle Issue 10/2012.
What’s in the issue?
ORACLE DATABASE SECURITY
Oracle’s Achilles’ Heel – Attack, Defense and Forensic Response in A Distributed Database Estate
By Paul Wright
This article will highlight one of the main security weaknesses in Oracle Databases, it will then demonstrate a solution to this weakness and finally show how native auditing can be used to forensically identify the presence of this attack in a large distributed estate using a centralized syslog audit trail.
Security in an Oracle Database
By Andreas Chatziantoniou
This article shows how the various security features of the Oracle database work and how you should deal with your data in a secure way. Chatziantoniou discusses how to secure data at rest and how to prevent SQL injections.
R.I.F.E.C.: Digital Security and Risk Analysis – Side channel attack with brain leading to data and ID Theft
By Massimiliano Sembiante
Recent development of computer science integrated with neural engineering, allow detecting and decoding of brain activities via sophisticated interfaces devices. This may expose users to serious threats. This article will provide a review of the latest researches, will summarize the techniques used to interface brain with computer and will analyze potential risk exposures.
Identity Information Theft and Web Applications
By Douglas Berdeaux
This article will discuss the importance of securing web applications and identity information. It will show how the smallest vulnerability in a web application can lead to the largest identity information breach. The author will also give security tips for database administration of CMS users and will show several web attack methods of hackers who target your data.
The Hidden Facts About Online ID Theft
By Delyan Boychev
The author will describe how you can lose your Online ID, and what are the possible risks and consequences of that happening. The author also proposes ways of protecting yourself from such risk.
Identity Theft: Stay Alert, Be Suspicious
By Ran Levi
This article written by Ran Levi will discuss all issues regarding ID theft. The author will present to you the vulnerabilities and threats connected to ID theft and will also show you how to prevent and deal with situations where your identity is at risk.
NETWORK SECURITY APPLIANCES
How to secure your company’s network with the Juniper Netscreen NS Series Security Appliance – Part 1
By Chris Weber
This month the focus is on a comparable unit from another top tier vendor that is also a great purchase in the enterprise resale market and still provides solid, fast efficient enterprise class stateful inspection at the perimeter with some advanced application layer features. The Juniper Netscreen.
Reading Between the Lines – How to quickly obtain what you are looking for when reverse engineering assembly code
By Adam Kujawa
The article will discuss the tips and tricks on how to get what you want from assembly code. Kujawa’s article shows you how to make sure you are looking at real code and not garbage , how to leave breadcrumbs in the code by making comments and lastly how to make your map complete by forcing the code to work for you
ID FRAUD EXPERT SAYS: How to Protect Your Identity in the UK from Fraud
By Julian Evans
Information is being collected about us every second of every day without us ever realizing what happens to it. Most of us don’t really care what happens to our personal data as long as it isn’t misused. Julian Evans gets up close and personal by taking a brief glance at how you can protect your personal data if you are a UK citizen.