I recently began working on a toolset to aid with analyzing binary protocols and I decided to use it as an exercise to get more familiar with the Immunity Debugger. I have been using Windbg for a while now, however, I was constantly reading articles discussing how great Immunity Debugger is for exploit development and I had been meaning to take the time to become more familiar with it.
Actually, I did it on Saturday afternoon, that way I had time to test the patch and roll it back if necessary and still have the car ready for Monday.
So… when do you patch your car? Interesting, albeit fictitious, conversation that will relatively soon become reality. New cars are sophisticated artifacts. They look nice and enable you to travel from point A to point B in great comfort (well, most of them), and they are packed with electronics. Inside the car there are multiple processors and computers executing hundreds of thousands of lines of code to ensure your safe journey. The programmers who wrote that code are as equally adept as the ones writing modern operating systems and applications – which means that there are some errors in the algorithms that monitor and maintain many aspects of your car, and in their implementation.
As Cisco’s Global Threat Analyst, my job is to look for what is changing around the world, and to explain why my colleagues in the Information Communications Technology (ICT) industry should care. Recently, I sat down with brand protection and anti-counterfeiting specialists to hear about what is changing in their line of work. They gave me a lot to think about.
View this video blog to see and hear Cisco CSO John N. Stewart reflect on the recently completed RSA 2012 in which John shares his thoughts and perspective on this year’s edition of the busy security conference:
As I look back on this past week’s RSA 2012 in San Francisco, I’ve had the opportunity to speak to many enterprise and service provider customers, channel partners, analysts, media (including Fox Business News), investors, and even some of our competitors. BYOD, the transition from physical to virtual to cloud, and IPv4 moving to IPv6 networks came up over and over again. Read More »