Daily Stand-ups, the Bane of Agile Software Development – Part 2

See Part 1 of this series here. You might even be an agile pastor and in that case you’re probably thinking… “what an outrageous idea!”. May it is, but I still remember Rebecca. She is a wicked smart software engineer I once worked with. As I attended multiple meetings with different software teams as the designated “Security Expert”, I gained a different perspective on Agile development. Rebecca always seemed tense. Actually, everyone on the team was smart, but they always seemed very

Continue Reading

Africa’s First Supercomputer in Numbers

The African continent is popular for it’s diverse wildlife – after all who doesn’t fancy a Safari holiday? Africans love and revere their animals too, with most national sport teams bear names honoring the continent’s wildlife heritage. For instance, the Nigerian Super Eagles or the Indomitable Lions of Cameroon. In recent decades, it hasn’t been the wildlife catching the eye of the world, but the rapid growth in tech know-how and entrepreneurship, as well as the expanding economy in many

Continue Reading

Securing IoT Apps and The OWASP IoT Project

Everything comes alive. It’s the long heralded tech future and the future is now. Many things around us – from bulbs to thermostats and sprinklers – are getting smarter, which simply means that they’re getting easier to administer or personalize. That feat is achieved by designing previously mechanical devices to be  digital, enabling them to run complex software that process digital input commands, and even hooking them up to the internet in many cases. Et Voilà! The Internet of things (IoT)

Continue Reading

Comparing Single Sign-on Protocols: OAuth vs OpenID vs SAML vs WS-Federation

From Single-Sign-On for consumers to the integration of partners into corporate systems and applications, in a super connected world, simplifying authentication for your users and your partners is more than a good-to-have. Near-seamless authentication allows you to provide the security for user resources that you must, while keeping your customers happy. How can we achieve this?

Continue Reading

Infosec Podcasts: Stay informed about Information Security… On The Go

Things happen fast in Cybersecurity. Information technology has always been a rapidly evolving discipline, but in cybersecurity I get the feeling this seem to change even faster. This probably has a lot to do with the nature of ‘immediate urgency’ in this field. Cyber criminals rush to detect and exploit security holes while defenders watch in paranoia lest they get pwned! As such, we experience almost weekly releases of technical discoveries, vulnerabilities,  tools, and new (often controversial) laws.

Continue Reading

Learning to Analyze Malware

Cybercriminals churn out thousands of Malware variants each day, using automated means to modify sections of code to evade Antivirus detection. White Hat malware researchers analyse malicious software by dissecting its different components and studying its behavior on the host computer’s operating system. It’s a pretty interesting and intricate field. What skills are required, though?

Continue Reading

Open Netware’s Pre-installed ‘Privacy on Top’ Routers Arrive

A few posts back, I described how Open Netware had developed router software for private and secure web surfing, leveraging TOR, OpenDNS, and DNSCrypt. At the time, installation of their software on supported routers required an Android app. A simple process, but still requiring enough tech savvy to scare off some potential users.  It also voided the router’s warranty. Open Netware has gone a step further by providing pre-installed routers that are basically plug and play.

Continue Reading

Hacking Websites Stealthily with Free Tools

Wouldn’t it be cool if you could easily run vulnerability scans on any website from your local machine without compromising or revealing your identity? A few weeks ago I ran an approved website vulnerability scan using ZAP. For some reason the scan caused/coincided with some performance issues on the target server and sysadmins traced some of the ‘interesting’ traffic to my machine. So I thought, what if I had run that scan through TOR?

Continue Reading

Ransomeware comes to the Web: Time to Go Plugin Paranoid

Ransomware is a variety of malware that encrypts the files on an infected machine until a ransom is paid, usually via Bitcoin. Over the past year ransomeware has increased on PCs and has spread to mobile devices. Most recently, ransomeware is also being deployed on web servers, effectively taking websites offline till the owners pay up. Vulnerabilities in different web application plugins are often used as entry points. The average website uses lots of plugins from different third-party developers. As

Continue Reading