Ashley Madison settles charges over its massive data breach
The settlement demands a "comprehensive" data security program that includes periodic security risk assessments (both internal and third-party) and "reasonable safeguards" against any potential...
View Article2017 Predictions: Three Experts Give Discuss Security Challenges for the...
This week we chatted with three security heavyweights to talk about the top security risks and concerns in the upcoming year. The panel of industry experts includes Jeremiah Grossman, Founder of...
View ArticleA Hacker Turned a Keyboard Into a Game of Doom
GIF Forget processor speed, storage, memory, screen resolution, and even apps. The real test of a gadget’s worth is whether or not it can run Doom , which means that the Optimus Maximus keyboard , with...
View ArticleOn the Economics, Propagation, and Mitigation of Mirai
By Kirk Soluk and Roland Dobbins In late November of 2016, a new Mirai variant emerged that leveraged a propagation mechanism different from the Telnet-based brute forcing mechanism originally provided...
View ArticleGeek Deals: Save Over a Thousand Dollars on StackSocial’s White Hat Hacker...
As concerned citizens of the internet, it’s our job to stay informed about hackers. “Black Hat” refers to both the terrible Michael Mann movie and the type of hacker who uses their tech-savvy tricks to...
View ArticleYahoo says hackers stole information from over 1B accounts
View photos FILE - This Tuesday, July 19, 2016 photo shows a Yahoo sign at the company's headquarters in Sunnyvale, Calif. On Wednesday, Dec. 14, 2016, Yahoo said it believes hackers stole data from...
View ArticleYahoo! says! hackers! stole! ONE! BEELLION! user! accounts!
Yahoo! says hackers have probably stolen details from more than a billion user accounts, including names, addresses, phone numbers, and weakly-hashed passwords in attacks dating back to 2013. Chief...
View ArticleResource: Handling Security Incidents in Office 365
There is no doubt that Microsoft has a very large tech footprint and just by the numbers is more likely to experience a security breach of some kind over time compared to smaller companies. However,...
View ArticleImportant Security Information for Yahoo Users
By Bob Lord, CISO Following a recent investigation, we’ve identified data security issues concerning certain Yahoo user accounts. We’ve taken steps to secure those user accounts and we’re working...
View ArticleWhy AI needs security (and vice versa)
The next stage of evolution forAI is democratization.That means making it available to businesses of all sizes, and not just to companies like Microsoft, Google or Apple. The opportunity in front of...
View ArticleImplementing Security Measures Without Sacrificing Efficiency
In this age of continuous content, creative agencies are faced with improving their production environments to meet increasing client demands while remaining competitive. With both budgets and...
View ArticleTime to Implement Offensive Cybersecurity?
All of them reveal that attackers are far ahead of defenders when it comes to digital security.But with global investment in cybersecurity expected to top $1 trillion over the next five years, why are...
View ArticleWeak sauce from NIST
Last week NIST released a fairly lame whitepaper on Dramatically Reducing Software Vulnerabilities . The paper is a laundry list of “specific technical approaches that have the potential to make a...
View ArticleSQL Server Security Controlling Access
― by Ginger Keys Installing SQL following best practices is an important first step in securing your SQL server. The next step in securing your SQL server is to decide who can access the SQL instance,...
View ArticleFibaro Reveals First HomeKit-Enabled 'Flood Sensor' to Detect Potential Water...
Home automation manufacturer Fibaro today announced a new set of HomeKit-enabled products that offer basic motion detection and home security, as well as a Flood Sensor, which the company calls "the...
View ArticleYahoo breach: why does it take so long to tell people about a hack?
Hours after Yahoo disclosed this latest data breach , people askedwhy it took the company so long to come clean about a compromise datingback to 2013. To the casual observer, three years is a long...
View Article美官员:普京或亲自指导网络攻击干扰美国大选
美官员:普京或亲自指导网络攻击干扰美国大选 一点号网络安全焦点4小时前 三位美国官员表示,俄罗斯总统普京曾指导他的情报机构通过黑客活动干预美国总统选举。那些指责俄罗斯试图通过黑客活动侵入个人和机构,包括民主党的总部邮箱进而影响美国大选结果的说法激怒了新当选的总统特朗普,特朗普表示他是光明正大的赢得了11月8日的大选。俄罗斯官员否认了所有关于干涉美国大选的指控。 php?url=0FE2xbqi2Q"...
View Article【收听】黑客何以当选时代周刊2016年度风云人物?
【收听】黑客何以当选时代周刊2016年度风云人物? 一点号THU数据派4小时前 php?url=0FE0CGZXSQ" alt="【收听】黑客何以当选时代周刊2016年度风云人物?" />Photo-Illustration by Adam Ferriss for TIME 图片由Adam提供给《时代》周刊 戳下方收听【数据也疯狂】,本期主题《黑客何以当选2016年度时代周刊风云人物》...
View ArticleYahoo breach: I’ve closed my account because it uses MD5 to hash my password
This morning I received an email from Yahoo entitled “Important Security Information for Yahoo Users”. Five minutes later I’d closed my account. The email was Yahoo’s admission that I was one of 1bn...
View Article