-
0 +1Advanced Malware Detection
Cyber-crime is projected to exceed $2 trillion by 2019 and malware is the primary culprit in many of these security breaches. Today’s…
-
0 +1Successful DRaaS Partnership
Disaster Recovery-as-a-Service (DRaaS) can be a compelling answer for battle downtime and accomplish IT accessibility. On the off chance, if approached in
-
+23 +1For two years, criminals stole sensitive information using malware hidden in individual pixels of ad banners
The criminals were able to send banner ads and javascript to their targets' computers by pushing both into ad networks. These networks aggressively scan advertisers' javascript for suspicious code, so the criminals needed to sneak their bad code past these checks.
-
+25 +1NTP: the rebirth of ailing, failing core network infrastructure
Network Time Protocol is how the computers you depend on know what time it is (this is critical to network operations, cryptography, and many other critical functions); NTP software was, until recently, stored in a proprietary format on a computer that no one had the password for (and which had not been updated in a decade), and maintained almost entirely by one person.
-
+27 +1Lawmakers Ponder Regulatory Remedy for IoT Security
The recent DDoS attacks by the Mirai botnet against various targets, including DNS provider Dyn, have drawn the attention of congressional leaders, who say there may be a need for regulation of IoT…
-
+12 +1Lust for public Wi-Fi trumps security concerns
Given a choice between security and free Wi-Fi, almost all of us will use the free internet connection.
-
+4 +1Security Design: Stop Trying to Fix the User - Schneier on Security
we've designed our computer systems' security so badly that we demand the user do all of these counterintuitive things. Why can't users choose easy-to-remember passwords? Why can't they click on links in emails with wild abandon? Why can't they plug a USB stick into a computer without facing a myriad of viruses? Why are we trying to fix the user instead of solving the underlying security problem?
-
+20 +1We Need to Save the Internet from the Internet of Things
Long term, we need to build an internet that is resilient against IoT-based attacks. But that's a long time coming.
-
+4 +1The Internet Of Poorly Secured Things Is Fueling Unprecedented, Massive New DDoS Attacks
Last week, an absolutely mammoth distributed denial of service (DDoS) attack brought down the website of security researcher Brian Krebs. His website, hosted by Akamai pro bono, was pulled offline after it was inundated with 620Gbps of malicious...
-
+16 +1Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net
“Free speech in the age of the Internet is not really free,” journalist warns.
-
+1 +1Cybrary - Free Online Cyber Security Training, Forever | Learn and Find Jobs
Cybrary is a completely FREE, forever, online Cyber Security training platform. Learn Information Security, for free and find jobs in the field!
-
+17 +1A Beginner's Guide To Password Management | Hacked
Online Password Management is a booming industry. Maybe you’re “one of the millions of Americans using the most popular passwords, such as ‘password,’ ‘trustno1,’ ‘abc123,’ ‘monkey’ or ‘letmein.’” If so, you’re at risk, as Morgan Slain, CEO of SplashData, a provider of password management applications, warns. He explains, “Hackers can easily break into accounts just by repeatedly trying common passwords.” 1Password By AgileBits (https://agilebits.com/) With 1Password, passwords are stored on locals devices and backed up to the cloud. The password file itself is password protected and encrypted, and one...
-
+3 +1What is a Hacker? An Overview of Hacking History and the Evolution of the Term Hacker | Hacked
A hacker is someone who looks for and exploits soft spots and weaknesses in a computer network or system. One can differentiate between White, Black and Gray Hat Hackers.
-
+14 +1iPhone hack attack shows why we need to rein in the trade in spyware
Rich rewards are on offer to people who can help private companies develop software to exploit vulnerabilities in technology such as smartphones. It might be legal but is it ethical?
-
+4 +1Keybase.io makes Encyption Easy!
Keybase maps your identity to your public keys, and vice versa. Do you use Keybase already? What do you use it for? Are you interested in joining Keybase? I've got a couple of invites available, please let me know if you are interested in joining.
-
+5 +1Kali Linux 2016.2 Released as the Most Advanced Penetration Testing Distribution
It's been quite some time since the last update to the official Kali Linux Live ISOs, and new software releases are announced each day, which means that the packages included in the previous Kali Linux images are very old, and bugs and improvements are always implemented in the most recent versions of the respective security tools.
-
+24 +1If You're Learning About It From Slate, Running Your Own Email Server Is A Horrendously Bad Idea
Nat Meysenburg on Slate insists that it's a myth that running your own server is a security nightmare, but I've yet to see an online security expert who agrees with that even remotely. Even the comments to the Slate piece are filled with IT folks screaming about what a bad idea this is.
-
+41 +1Password strength meters promote piss-poor passwords
You had one job ...
-
+6 +1Malware Infected All Eddie Bauer Stores in U.S., Canada — Krebs on Security
Clothing store chain Eddie Bauer said today it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores in North America, and that credit and debit cards used at those stores during the first six months of 2016 may have been compromised in the breach. The acknowledgement comes nearly six weeks after KrebsOnSecurity first notified the clothier about a possible intrusion at stores nationwide.
-
+38 +1Researchers crack open unusually advanced malware that hid for 5 years
Espionage platform with more than 50 modules was almost certainly state sponsored.
Submit a link
Start a discussion




















