Data Visualization and Reporting Are Key to Cyber Security Readiness
At the 2016 Black Hat conference in Las Vegas this week, attendees can get an early look at our updated Threat Intelligence Dashboard , a module that our customers have long relied on to serve as...
View ArticleThis security threat has hit almost half of UK businesses and it will get worse
A new piece of research has found that approaching half of all businesses have been hit by aransomware attack over the last year. The study from Malwarebytes questioned over 500 IT leaders from...
View ArticleArtificial Intelligence Is Key to Autonomous Cyber Security Future
Artificial Intelligence is Key to Autonomous Cyber Security Future -- Artificial Intelligence is a Foundational Technology Being Deployed Today to Immediately and Accurately Identify Threats SAN...
View ArticleRuckus Routers Put Organizations at Risk, says Researcher
Back in 2014 Tripwire research discovered that almost three-quarters (74%) of the top 50 selling consumer Ruckus routers on Amazon came with security vulnerabilities, including exploitable firmware on...
View ArticleIDG Contributor Network: The most critical gap in cybersecurity today: Talent
You only have to look at recent headlines to confirm that cybersecurity is a critical concern thattouches every industry and every individual, and threats are only continuing to increase. Yet in...
View ArticleHere's how much hackers are selling your Social Security number, Netflix...
Daniel Daza/Netflix/"Narcos" Hackers could be selling access to your Netflix and email, plus your Social Security Number, for $3 dollars total. A recent report from account-monitoring company Logdog ,...
View Article5 ways hackers market their products and services
Hackers all over the internet today are slowly adapting to the changes in the attack marketplace. Many notorious DDoS groups like Lizard Squad, New World Hackers and others have already entered the...
View ArticleBackdoor CTF 2013: 电子取证 150
0x00 题目 H4x0r决定给他的城堡添加一个额外的先进安全身份检验层。他的访问密钥是一个二维码且是唯一的,并一直放在他的钱包里。然而不幸,当他离开他的城堡护城河时一不小心把二维码弄到了河里,二维码被弄湿损毁了。现在他不能回到自己的城堡,迫切需要一个黑客帮助,他在 craigslist 网站发布了求助,描述了情况,这是你露一手的绝佳机会。 这是损毁的二维码:...
View ArticleHackers Steal $65 Million From Bitcoin Exchange
The price of bitcoin has dropped dramatically after hackers managed to steal more than $65 million-worth of the digital currency from a Hong Kong exchange. BitFinex, one of the largest bitcoin...
View Article2/3英国企业遭受网络攻击后的启示
根据最新公布的安全报告显示,在过去一年里,英国有三分之二的大型企业曾遭受到网络攻击,这让多数的英国企业高管相当头痛。一些高管甚至表示,鉴于面临的网络安全威胁,当前的企业迫切需要进行根本性上的转变。 英国有三分之二的大型企业曾遭受到网络攻击...
View ArticleWhat is the Minimum Acceptable Risk Standards for Exchanges (MAR-E)?
Under the Affordable Care Act (ACA) of 2010, there are now online marketplaces to buy health insurance. These are essentially websites that allow consumers to shop around for an insurance policy by...
View ArticleSnitches get stitches: Little Snitch bugs were a blessing for malware
DEF CONVulnerabilities in popular OS X security tool Little Snitch potentially granted malicious applications extra powers, undermining the protection offered by the software. Little Snitch reports in...
View ArticleGitHub Enterprise 2.7 is now available with enhanced security and more...
A new release of GitHub Enterprise is now available with improvements for developers and administrators alike. With GitHub Enterprise 2.7, we’re introducing GPG signature verification ― a new way for...
View ArticleA Plugin’s Expired Domain Poses a Security Threat to Websites
Do you keep all your website software (including all third-party themes, plugins and components) up-to-date? You should! We always recommend this to our clients and our readers. Applying updates...
View ArticleHere’s How Much Your Social Security Number Is Worth on the Dark Web
If you’ve ever wondered how much your Social Security number is worth, here’s a hint: About as much as your password to a pornographic site. Account-monitoring company LogDog on Wednesday published its...
View ArticleNotebook 4.2.2: Security fix
TL;DR: upgrade to notebook 4.2.2 We just released notebook 4.2.2 with a few bugfixes and one important security fix. We (specifically Steve Sylvester ) have found a longstanding security issue in the...
View ArticleUser Profile Store: Advanced Data Modeling Part 1
Virtually all organizations have a need to record and recall user data. Frequently, this user data is permanent, such as user accounts with defined settings, histories and preferences. Equally...
View ArticleUnderstanding Security by Country: SSL
With Shodan it's easy to get an overview of the security for a country. Real-world borders don't necessarily translate to the Internet but it can still reveal useful information as shown by OECD . I...
View ArticleForget security training, it's never going to solve Layer 8 (aka people)
Black HatResearch by German academics has shown there's very little that can be done to prevent people spreading malware by clicking on dodgy links in messages, particularly where Facebook is...
View ArticleExploit can attack secure websites through ads
Some web-based exploits aremore dangerous than others... and unfortunately, this is one of the nasty ones. Security researchers at KU Leuven have discovered an attack technique, HEIST (HTTP Encrypted...
View Article