Jeremiah Grossman

Type: Person
Name: Jeremiah Grossman
First reported Oct 17 2014 - Updated Oct 18 2014 - 1 reports

#HackerKast 5: POODLE Attack, HackerKombat and Drupal SQLi Flaw

This week Jeremiah Grossman, Robert Hansen and Gabe Gumbs host HackerKast at Levi’s Stadium – the home of the SF 49ers – to discuss the recently announced POODLE Attack on SSL 3.0 and a critical SQLi flaw affecting Drupal making headlines. WhiteHat’s ... [Published Security Bloggers Network - Oct 17 2014]
First reported Oct 01 2014 - Updated Oct 01 2014 - 1 reports

Researcher details nasty XSS flaw in popular web editor

Providing a secure and efficient HelpdeskA tool that's popular with Microsoft's in-house developers, the RadEditor HTML editor, contains a dangerous cross-site scripting (XSS) vulnerability, researcher GS McNamara says.The editor was developed by Telerik ... [Published The Register - Oct 01 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

Will `Bendgate' Cost Apple?: Bloomberg West (09/25)

Sept. 25 (Bloomberg) -- Full episode of "Bloomberg West." Guests: IFixit CEO Kyle Wiens, WhiteHat Security CEO Jeremiah Grossman, Hootsuite CEO Ryan Holmes, PayNearMe CEO Danny Shader and Liquid Robotics CEO Gary Gysin. (Source: Bloomberg) ... [Published BusinessWeek - Sep 26 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 2 reports

What `Shell Shock' Flaw Means for the Internet of Things

Sept. 25 (Bloomberg) -- WhiteHat Security CEO Jeremiah Grossman discusses the threat from the "Shell Shock" computer security flaw. He speaks with Cory Johnson and Emily Chang on "Bloomberg West." (Source: Bloomberg)Be uncovered.Jeremiah glassman joins ... [Published Bloomberg - Sep 26 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

Bash computer bug could be ‘a much bigger problem than Heartbleed’

The U.S. government has joined an array of researchers warning of a security flaw that could allow hackers to access devices ranging from computers to video cameras and steal data.A vulnerability in some Unix-based systems, such as Linux and Mac OS X, ... [Published Toronto Star Online - Sep 25 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

US government joins in warnings of security flaw that could be used by hackers

The US government has joined an array of researchers warning of a security flaw that could allow hackers to access devices ranging from computers to video cameras and steal data.A vulnerability in some Unix-based systems, such as Linux and Apple’s Mac ... [Published Irish Times - Sep 25 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

Shell Shocked: Researchers discover a bug worse than Heartbleed, but will anyone care?

Researchers have discovered a major bug in Unix-based operating systems said to have worse implications than Heartbleed — the OpenSSL bug that left two-thirds of the Internet insecure  by allowing attackers “complete access” to a device.Reuters reports ... [Published PandoDaily - Sep 25 2014]
First reported Sep 09 2014 - Updated Sep 09 2014 - 1 reports

Clickjacking, Strokejacking or UI Redress

Introduction Clickjacking was first publicized by Jeremiah Grossman and Robert “Rsnake” Hansen in 2008. Clickjacking is an attack that is possible only by the use of iframes. Iframes are...Go on to the site to read the full article ... [Published Security Bloggers Network - Sep 09 2014]
First reported Jun 18 2014 - Updated Jun 18 2014 - 2 reports

Open Source Development Analysis: Application Security

Continuing our analysis on the 2014 Open Source Development and Application Security Survey , – we can now discuss the results as the final version has just been released. Today’s post focuses on analysis of the application security related facets ... [Published Security Bloggers Network - Jun 18 2014]
First reported May 07 2014 - Updated May 07 2014 - 2 reports

Incite 4/7/2014 — Accomplishments

Yesterday I was in Winnipeg. By choice. I was invited to speak at the Western Canada Information Security Conference, and there isn’t much I like better than doing a talk in Canada. Folks are nice. They appreciate that you come up to their town and talk. ... [Published Security Bloggers Network - May 07 2014]
First reported May 02 2014 - Updated May 03 2014 - 5 reports

Oauth and OpenID Flaw Affecting Google, Hotmail, Facebook

Security Advisor Another major Web software flaw has been disclosed, one that could redirect your personal information into the wrong hands.By Chris Paoli 05/02/2014Following on the heels of last month's Heartbleed bug disclosure , anther flaw in a ... [Published Redmond Magazine - May 02 2014]
Entities: OAuth, OpenID, MSN Hotmail
First reported Apr 30 2014 - Updated Apr 30 2014 - 1 reports

Businesses Should Get Ethical With Security

Now the Heartbleed panic has finally subsided, it’s time for the post-mortem. From early analysis, one thing has become apparent: organisations need to improve oversight of their coding. Whether they’re organisations of disparate membership, or cohesive ... [Published Eweek Europe - Apr 30 2014]

More Content

All (25) | News (19) | Reports (0) | Blogs (6) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
#HackerKast 5: POODLE Attack, HackerKombat and ... [Published Security Bloggers Network - Oct 17 2014]
Researcher details nasty XSS flaw in popular we... [Published The Register - Oct 01 2014]
Will `Bendgate' Cost Apple?: Bloomberg West (09... [Published BusinessWeek - Sep 26 2014]
What `Shell Shock' Flaw Means for the Internet ... [Published Bloomberg - Sep 26 2014]
What `Shell Shock' Flaw Means for the Internet ... [Published BusinessWeek - Sep 26 2014]
US government joins in warnings of security fla... [Published Irish Times - Sep 25 2014]
Shell Shocked: Researchers discover a bug worse... [Published PandoDaily - Sep 25 2014]
Bash computer bug could be ‘a much bigger probl... [Published Toronto Star Online - Sep 25 2014]
Clickjacking, Strokejacking or UI Redress [Published Security Bloggers Network - Sep 09 2014]
Open Source Development Analysis: Application S... [Published Security Bloggers Network - Jun 18 2014]
Open Source Development Analysis: Application S... [Published Securosis Highlights - Jun 18 2014]
Cybersecurity Expert Richard A. Clarke and LA C... [Published PRWeb - Jun 02 2014]
Incite 4/7/2014 — Accomplishments [Published Security Bloggers Network - May 07 2014]
Incite 4/7/2014 — Accomplishments [Published Securosis Highlights - May 07 2014]
Oauth and OpenID Flaw Affecting Google, Hotmail... [Published Redmond Magazine - May 02 2014]
Security Flaw Found in OAuth and OpenID, Here's... [Published Lifehacker - May 02 2014]
OAuth, OpenID 'covert redirect' flaw discovered... [Published Electronista - May 02 2014]
After Heartbleed, major Covert Redirect flaw th... [Published Tech2 firstpost.com - May 02 2014]
Serious security flaw in OAuth and OpenID disco... [Published CNET News - May 02 2014]
Businesses Should Get Ethical With Security [Published Eweek Europe - Apr 30 2014]
Founder and iCEO of WhiteHat Security Jeremiah ... [Published PRWeb - Apr 18 2014]
Heartbleed hackers steal encryption keys to ill... [Published San Francisco Chronicle - Apr 16 2014]
Heartbleed hackers steal encryption keys in thr... [Published Brisbane Times - Apr 15 2014]
Heartbleed Hackers Steal Encryption Keys in Thr... [Published Bloomberg - Apr 14 2014]
Strategic Secutiry [Published Editor & Publisher - Dec 18 2013]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
#HackerKast 5: POODLE Attack, HackerKombat and ... [Published Security Bloggers Network - Oct 17 2014]
This week Jeremiah Grossman, Robert Hansen and Gabe Gumbs host HackerKast at Levi’s Stadium – the home of the SF 49ers – to discuss the recently announced POODLE Attack on SSL 3.0 and a critical SQLi flaw affecting Drupal making headlines. WhiteHat’s ...
Clickjacking, Strokejacking or UI Redress [Published Security Bloggers Network - Sep 09 2014]
Introduction Clickjacking was first publicized by Jeremiah Grossman and Robert “Rsnake” Hansen in 2008. Clickjacking is an attack that is possible only by the use of iframes. Iframes are...Go on to the site to read the full article ...
Open Source Development Analysis: Application S... [Published Security Bloggers Network - Jun 18 2014]
Continuing our analysis on the 2014 Open Source Development and Application Security Survey , – we can now discuss the results as the final version has just been released. Today’s post focuses on analysis of the application security related facets ...
Open Source Development Analysis: Application S... [Published Securosis Highlights - Jun 18 2014]
Continuing our analysis on the 2014 Open Source Development and Application Security Survey , – we can now discuss the results as the final version has just been released. Today’s post focuses on analysis of the application security related facets ...
Incite 4/7/2014 — Accomplishments [Published Security Bloggers Network - May 07 2014]
Yesterday I was in Winnipeg. By choice. I was invited to speak at the Western Canada Information Security Conference, and there isn’t much I like better than doing a talk in Canada. Folks are nice. They appreciate that you come up to their town and talk. ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.