Hacking THAT: Resources for PenTesting
This year marks the 6th year (out of 7) that I attended ThatConference , and it’s also the 5th year I’ve been blessed to have been selected as a speaker. This year my session is titled HACKING THAT:...
View ArticleThe Era of Software Exposure
Software is at the backbone of the digital transformation We live in a world of massive digital transformation. The technical backbone of this transformation is software. Software can be found...
View ArticleDrive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection
By the end of the last year, we saw a drastic rise in drive-by cryptocurrency mining activities and it is quite alarming to note that cyber-criminals are getting smarter and smarter day-by-day at...
View ArticleIs Your Conveyancing Practice Secure From Hacking?
The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely...
View ArticleMonthly Blog Round-Up July 2018
Here is my next monthly “Security Warrior” blog round-up of top 5 popular posts based on last month’s visitor data (excluding other monthly or annual round-ups): “New SIEM Whitepaper on Use Cases...
View ArticleReddit says hackers stole user data from 2007 and earlier in security breach
Reddit informed its users today that a hacker broke into some of its systems and accessed user data, including current email addresses and a 2007 database that contained usernames and passwords that...
View ArticlePasswords vs. Private Keys
It is widely believed that public/private keys or certificates are “more secure” than passwords.E.g., an SSH login via key rather than using a password. Or a site-to-site VPN with certificate...
View ArticleTelegram Tech Promised In ICO Vulnerable to Attack, Researchers Say
With $1.7 billion in the bank following its initial coin offering (ICO), Telegram has released its first crypto-friendly feature but security researchers are skeptical. As detailed in a blog post...
View ArticleIDG Contributor Network: The new definition for threat prediction
In “ Redefining threat prediction ,” I discussed the various ways “prediction” is often misunderstood when discussed as a part of security tools, and three ways security analysts can address these...
View ArticleAXIS 1034-W security camera setup
A couple years back I bought a wireless security camera, an AXIS 1034-W, and dida halfass setup using the ancient linux program “motion” to do the heavy work of recording video. I just revisited all...
View ArticleEverything you need to know about Reddit’s recent security ‘incident’
Reddit recently learned that a hacker managed to access multiple employee accounts and walk away with “some” current email addresses and a 2007 database backup. It’s undergoing a “painstaking...
View ArticleReddit discloses ‘serious’ security breach it discovered on June 19th
Reddit has disclosed a security incident it’sdescribed as a “serious attack,” which it has been investigating for more than a month which the company says entailed a hacker breaking into some of its...
View ArticleSecuring Industrial IoT sensors, part 1: The TPM for network security
At a Sensors Expo 2018 workshop in San Jose, CA, with Embedded Computing Design, Trusted Computing Group (TCG) work group members presented information about TCG’s TPM for network security, the DICE...
View ArticleReddit's August 2018 security incident: What you need to know
Reddit, one of the world's most popular websites, announced on August 1, 2018 , that it experienced a security breach in which some user data was compromised. The breach mostly affects Redditors that...
View ArticleSafe Harbor for Security Bug Bounty Participants
Mozillaestablished one of the first modern security bug bounty programs back in 2004. Since that time, much of the technology industry has followed our lead and bounty programs have become a critical...
View ArticleFacebook's security boss is leaving, a day after the social network revealed...
Facebook Chief Security Officer Alex Stamos is leaving the social network to take an adjunct professorship role at Stanford University, reports the New York Times . News of Stamos' departure comes a...
View ArticleReddit Says Some User Data Accessed in Security Incident
Reddit said that a digital attacker infiltrated some of its systems and accessed user data during a recent security incident. On 1 August, the social news aggregation website revealed that an attacker...
View ArticleFacebook’s Security Chief to Depart for Stanford University
Advertisement Supported by Facebook’s Security Chief to Depart for Stanford University Image Alex Stamos is leaving Facebook at a time when the social network is grappling with potential threats...
View ArticleFacebook loses its chief security officer Alex Stamos
chief security officer since 2015, announced that he is leaving the company to take a position at Stanford University. The company has been shedding leadership over the last half a year largely owing...
View Article'Unhackable' Bitfi crypto-currency wallet maker will be shocked to find...
PicsA crypto-currency wallet heavily promoted as "unhackable" complete with endorsements from the security industry's loopy old uncle John McAfee and a $350,000 bounty challenge has, inevitably, been...
View Article