This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Podcast 2"
From OWASP
m |
m (→OWASP News) |
||
Line 14: | Line 14: | ||
<li>December 16, 2008 - [http://securesoftware.blogspot.com/2008/12/owasp-security-testing-guide-vs-3.html OWASP testing guide version 3 has been officially released]</li> | <li>December 16, 2008 - [http://securesoftware.blogspot.com/2008/12/owasp-security-testing-guide-vs-3.html OWASP testing guide version 3 has been officially released]</li> | ||
<li>December 15, 2008 - [http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html Breaking Google Gears' Cross-Origin Communication Model] </li> | <li>December 15, 2008 - [http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html Breaking Google Gears' Cross-Origin Communication Model] </li> | ||
− | |||
<li>December 10, 2008 - [http://www.microsoft.com/technet/security/advisory/961051.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution] and how the heck did this vuln [http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx slip through Microsoft's SDL?]</li> | <li>December 10, 2008 - [http://www.microsoft.com/technet/security/advisory/961051.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution] and how the heck did this vuln [http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx slip through Microsoft's SDL?]</li> | ||
<li>December 10, 2008 - Michael Zalewski, Googler, dumped core on his [http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html browser security knowledge.]</li> | <li>December 10, 2008 - Michael Zalewski, Googler, dumped core on his [http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html browser security knowledge.]</li> | ||
+ | <li>December 9-11, 2008 - [The first OWASP ESAPI Summit was held http://www.owasp.org/index.php/ESAPI_Summit ]</li> | ||
<li>December 8, 2008 - [http://blogs.zdnet.com/security/?p=2308 4 XSS flaws hit Facebook]</li> | <li>December 8, 2008 - [http://blogs.zdnet.com/security/?p=2308 4 XSS flaws hit Facebook]</li> | ||
<li>December 8, 2008 - Safe ActiveX? [http://googleonlinesecurity.blogspot.com/2008/12/native-client-technology-for-running.html Google wants to run native code over the web.]</li> | <li>December 8, 2008 - Safe ActiveX? [http://googleonlinesecurity.blogspot.com/2008/12/native-client-technology-for-running.html Google wants to run native code over the web.]</li> |
Revision as of 11:17, 21 December 2008
Recorded December 20, 2008
"For PCI Compliance, its doesn't say that .. that your site has to be secure. It says you need to put in processes, and that you know, you have to act like your trying..." - Stephen Craig Evans
Participants
- Stephen Craig Evans is an independent software security consultant based in southeast Asia. - Jim Manico is a Web Application Architect and Security Engineer for Aspect Security.
OWASP News
- December 16, 2008 - OWASP testing guide version 3 has been officially released
- December 15, 2008 - Breaking Google Gears' Cross-Origin Communication Model
- December 10, 2008 - Vulnerability in Internet Explorer Could Allow Remote Code Execution and how the heck did this vuln slip through Microsoft's SDL?
- December 10, 2008 - Michael Zalewski, Googler, dumped core on his browser security knowledge.
- December 9-11, 2008 - [The first OWASP ESAPI Summit was held http://www.owasp.org/index.php/ESAPI_Summit ]
- December 8, 2008 - 4 XSS flaws hit Facebook
- December 8, 2008 - Safe ActiveX? Google wants to run native code over the web.
Interview with Stephen Craig Evans
- OWASP Summer of Code project, "Securing WebGoat using ModSecurity" - OWASP Orizon Project