Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
General Apps
Passwords and passkeys
Password Managers Auto-filled Credentials on Untrusted sites
Message
<blockquote data-quote="Andrezj" data-source="post: 1022319" data-attributes="member: 97580"><p>audits are rarely thorough in the area of product functionality security risks</p><p>some audits are merely code reviews which will not find structural flaws</p><p>more or less the most effective and revealing method with software is ad-hoc testing where a pentester just happens to discover a functional problem by being methodical and thorough</p><p>hackers put in a lot of keyboard time always probing for ways to defeat stuff</p><p>audits never put forth that kind of effort, not unless somebody is willing to pay the auditor a whole lot of money</p><p>i mean it is good that software publishers submit their product for review by a third party, but one has to really take a close inspection of what and how things were audited and what the audit actually confirms</p></blockquote><p></p>
[QUOTE="Andrezj, post: 1022319, member: 97580"] audits are rarely thorough in the area of product functionality security risks some audits are merely code reviews which will not find structural flaws more or less the most effective and revealing method with software is ad-hoc testing where a pentester just happens to discover a functional problem by being methodical and thorough hackers put in a lot of keyboard time always probing for ways to defeat stuff audits never put forth that kind of effort, not unless somebody is willing to pay the auditor a whole lot of money i mean it is good that software publishers submit their product for review by a third party, but one has to really take a close inspection of what and how things were audited and what the audit actually confirms [/QUOTE]
Insert quotes…
Verification
Post reply
Top