lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 01 May 2006 21:31:15 -0400
From: "Jon R. Kibler" <Jon.Kibler@...t.com>
To: Securicom - Dries Morris <dries@...uricom.co.za>
Cc: 'H Alsaleh' <haggar12@...mail.com>, phishing@...urityfocus.com,
	binaryanalysis@...urityfocus.com, bugtraq@...urityfocus.com,
	forensics@...urityfocus.com, honeypots@...urityfocus.com,
	incidents@...urityfocus.com, loganalysis@...urityfocus.com,
	pen-test@...urityfocus.com, vuln-dev@...urityfocus.com,
	webappsec@...urityfocus.com, wifisec@...urityfocus.com
Subject: Re: Poll: Emerging Threats


Securicom - Dries Morris wrote:
> Agreed; humor us with your reason/ motivation.
> 
> Dries Morris
>  
>         
> ( + 0861 591 591
> Å¡ + 27 21 591-0184
> È + 27 82 446 9148
> ü www.securicom.co.za
>  
>  
> -----Original Message-----
> From: H Alsaleh [mailto:haggar12@...mail.com] 
> Sent: 28 April 2006 22:58
> To: phishing@...urityfocus.com; binaryanalysis@...urityfocus.com; bugtraq@...urityfocus.com; forensics@...urityfocus.com; honeypots@...urityfocus.com; incidents@...urityfocus.com; loganalysis@...urityfocus.com; pen-test@...urityfocus.com; vuln-dev@...urityfocus.com; webappsec@...urityfocus.com; wifisec@...urityfocus.com
> Subject: RE: Poll: Emerging Threats
> 
> Jon,
> You failed to explain why would we take the time and knowledge to do this for you, especially when you requested the information to be privately sent 
> only to you?
> 
> 
> ----Original Message Follows----
> From: "Jon R. Kibler"
> To: phishing@...urityfocus.com, 
> binaryanalysis@...urityfocus.com,bugtraq@...urityfocus.com, 
> forensics@...urityfocus.com,honeypots@...urityfocus.com, 
> incidents@...urityfocus.com,loganalysis@...urityfocus.com, 
> pen-test@...urityfocus.com,vuln-dev@...urityfocus.com, 
> webappsec@...urityfocus.com,Wireless Security <wifisec@...urityfocus.com>
> Subject: Poll: Emerging Threats
> Date: Fri, 28 Apr 2006 16:08:17 -0400
> 
> Greetings All,
> 
> First, I would like to apologize to those who received multiple copies due to cross posting -- I just wanted to ensure a variety of opinions.
> 
> On to business: I would like to do a little survey among the security 
> professionals on this list.
> 
> Two Questions:
>     1) What do you believe will be the next major new security threat that we will face in the next 12 to 18 months?
>     2) What do you believe will be the top 5 (or 10, if your list is that long) emerging security threats we will face over then next 3 years to 5 years? (Emphasis on 'emerging' -- threats not on most security people's 
> radar today.)
> 

If this is the message that you received, it is NOT the full text of the message that
was posted. In the original message, I indicated that I would post the results of the
survey to each maillist where someone responded to the post. If this is the entire
contents of your message, then someone truncated the original posting.

I am on the road through Wednesday, so I do not have access to my original sent folder,
or I would include the full original message here. The original message also indicated
that you should respond to SURVEY <A T> SURVEY.ASET.COM.

The purpose of the original survey was to see what others were thinking were potential
emerging threats that we needed to consider and share the information so everything
could start discussing where we needed to be a year and more down the road.

Sorry for any confusion from truncated messages. If the moderator didn't cut the message,
then I have no explanation. (And if they did cut the message, I would like to know why!)

Hope tis clears some air!

Jon Kibler
-- 
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
(843) 849-8214



-------------------------------------------------------------------------
Sponsored by: Watchfire

The Twelve Most Common Application-level Hack Attacks
Hackers continue to add billions to the cost of doing business online 
despite security executives' efforts to prevent malicious attacks. This 
whitepaper identifies the most common methods of attacks that we have seen, 
and outlines a guideline for developing secure web applications. 
Download this whitepaper today!

https://www.watchfire.com/securearea/whitepapers.aspx?id=701300000007t9r
--------------------------------------------------------------------------



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ