<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Shell&#8217;s Data Breach: A Security Spill?</title>
	<atom:link href="http://www.gfi.com/blog/shells-data-breach-security-spill/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/shells-data-breach-security-spill/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=shells-data-breach-security-spill</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/shells-data-breach-security-spill/comment-page-1/#comment-3737</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 02 Mar 2010 15:42:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1920#comment-3737</guid>
		<description><![CDATA[Yes I do agree it looks ugly for the NSA to suffer such an attack; however, one must understand that the NSA, just like any other organization is made up of people, lots of them I suspect, and even provided that the NSA does everything exactly as it preaches you still cannot control that one employee who, to cut corners because of tight deadlines or simply because he was still not very experienced, missed some sanitation code in the web application that he was developing and subsequently was unlucky enough that testing missed it as well.  

Don&#039;t get me wrong, you&#039;re right, an SQL injection is like one of the most basic things you can ever face! It shouldn&#039;t have slipped the developer and testing should have tried it out and found the flaw. 

Let&#039;s hope that events such as these help to educate people and help them grow. Security is a never ending process and a battle with the defender at a disadvantage. The defender needs to think about everything while the attacker needs only find one weakness.]]></description>
		<content:encoded><![CDATA[<p>Yes I do agree it looks ugly for the NSA to suffer such an attack; however, one must understand that the NSA, just like any other organization is made up of people, lots of them I suspect, and even provided that the NSA does everything exactly as it preaches you still cannot control that one employee who, to cut corners because of tight deadlines or simply because he was still not very experienced, missed some sanitation code in the web application that he was developing and subsequently was unlucky enough that testing missed it as well.  </p>
<p>Don&#8217;t get me wrong, you&#8217;re right, an SQL injection is like one of the most basic things you can ever face! It shouldn&#8217;t have slipped the developer and testing should have tried it out and found the flaw. </p>
<p>Let&#8217;s hope that events such as these help to educate people and help them grow. Security is a never ending process and a battle with the defender at a disadvantage. The defender needs to think about everything while the attacker needs only find one weakness.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: IT Ninja</title>
		<link>http://www.gfi.com/blog/shells-data-breach-security-spill/comment-page-1/#comment-3598</link>
		<dc:creator>IT Ninja</dc:creator>
		<pubDate>Fri, 26 Feb 2010 02:38:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1920#comment-3598</guid>
		<description><![CDATA[Hi Emmanuel, as an ethical hacker (white hat) myself, I do agree that no system is perfectly safe specially on the internet but what simply stunned me the most was the facts behind the NSA attack. The NSA has been on top of security campaigns with its countless press releases but it cannot defend itself against a 8-year old technique that even a techie high-school kid can conduct? And now here&#039;s more, NASA servers &quot;live&quot; vulnerabilities are listed on pinoysecurity too.]]></description>
		<content:encoded><![CDATA[<p>Hi Emmanuel, as an ethical hacker (white hat) myself, I do agree that no system is perfectly safe specially on the internet but what simply stunned me the most was the facts behind the NSA attack. The NSA has been on top of security campaigns with its countless press releases but it cannot defend itself against a 8-year old technique that even a techie high-school kid can conduct? And now here&#8217;s more, NASA servers &#8220;live&#8221; vulnerabilities are listed on pinoysecurity too.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/shells-data-breach-security-spill/comment-page-1/#comment-3403</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 19 Feb 2010 13:12:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1920#comment-3403</guid>
		<description><![CDATA[Hi IT Ninja, thank you for sharing this with us. I personally haven&#039;t had heard of this event; however, after looking it up it was in fact reported sporadically here and there. Seems like they fell victim to SQL injection. 

The thing is that no one is perfectly safe, everybody can get hacked. But I agree with you, downplaying the incident will serve no good purpose. Obviously you don&#039;t need to make a fuss over it either but if you&#039;re a victim of SQL injection then wouldn&#039;t it be better to say that the issue was identified and fixed, rather than it&#039;s no big deal that no data was stolen for example? (Of course you must make sure that you fix the issue before claiming that it is fixed) No one expects you to be perfect but I would worry if I think that a company that I do business with doesn&#039;t see the danger for what it is, and by downplaying these types of incidents that&#039;s what will happen.]]></description>
		<content:encoded><![CDATA[<p>Hi IT Ninja, thank you for sharing this with us. I personally haven&#8217;t had heard of this event; however, after looking it up it was in fact reported sporadically here and there. Seems like they fell victim to SQL injection. </p>
<p>The thing is that no one is perfectly safe, everybody can get hacked. But I agree with you, downplaying the incident will serve no good purpose. Obviously you don&#8217;t need to make a fuss over it either but if you&#8217;re a victim of SQL injection then wouldn&#8217;t it be better to say that the issue was identified and fixed, rather than it&#8217;s no big deal that no data was stolen for example? (Of course you must make sure that you fix the issue before claiming that it is fixed) No one expects you to be perfect but I would worry if I think that a company that I do business with doesn&#8217;t see the danger for what it is, and by downplaying these types of incidents that&#8217;s what will happen.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: IT Ninja</title>
		<link>http://www.gfi.com/blog/shells-data-breach-security-spill/comment-page-1/#comment-3402</link>
		<dc:creator>IT Ninja</dc:creator>
		<pubDate>Fri, 19 Feb 2010 10:47:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1920#comment-3402</guid>
		<description><![CDATA[btw, the National Security Agency was recently hacked. Yes hacked! But it was downplayed to the media for obvious shameful reasons. Here’s the link :

http://pinoysecurity.blogspot.com/2010/02/wwwnsagov-hacked.html]]></description>
		<content:encoded><![CDATA[<p>btw, the National Security Agency was recently hacked. Yes hacked! But it was downplayed to the media for obvious shameful reasons. Here’s the link :</p>
<p><a href="http://pinoysecurity.blogspot.com/2010/02/wwwnsagov-hacked.html" rel="nofollow">http://pinoysecurity.blogspot.com/2010/02/wwwnsagov-hacked.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:45:02 by W3 Total Cache --