Blockchain bug hunters feature prominently at this year’s Pwnie Awards
Researchers have been diligently prodding cryptocurrency and blockchain companies for kinks in their security and it seems some of them are finally getting recognition for their work. Three researchers...
View ArticleOutgoing Facebook CSO Alex Stamos will join Disrupt SF to talk cybersecurity
AtDisrupt SF 2018, Facebook’s soon-to-be-former chief security officer Alex Stamos will join us to chat about his tenure in the top security role for the world’s biggest social network, how it feels...
View ArticleThreatlist: Manufacturing, a Top Target for Espionage
When it comes to cyberattack-related reconnaissance and lateral movement activity, the manufacturing industry exhibits higher than normal rates. That’s according to Vectra’s 2018 Spotlight Report on...
View ArticleNetflix Cloud Security: Detecting Credential Compromise in AWS
Will Bengtson, Netflix Security Tools and Operations Credential compromise is an important concern for anyone operating in the cloud. The problem becomes more obvious over time, as organizations...
View ArticleTransforming Security in a Cloud and Mobile World Security Showcase Session
Over the last several years, VMware has been heavily investing in technology and solutions to transform security. Our goal has been simple; leverage the virtual and mobile infrastructure to build...
View ArticleMitre Att&ck Matrix
The Mitre Att&ck Matrix is a model used to describe the various tactics and techniques used by hackers, malware authors, and other potentially malicious actors. To do this, the model breaks the...
View ArticleSecurity Features missing from Office 365
Office 365 is a great platform of choice for any collaboration and sharing that you may need as an organization. Over the years Microsoft has added great Security features to help in protecting Office...
View ArticlePlayback: A TLS 1.3 Story
Introduction Secure communications are one of the most important topics in information security, and the Transport Layer Security (TLS) protocol is currently the most used protocol to provide secure...
View ArticleBest Practices for the Protection of Information Assets, Part 2
In Part 1 of this article series , we discussed Information Security Management, or ISM. This second installment will cover the implementation and monitoring of security controls, including logical...
View ArticleFacial recognition is Tokyo’s secret weapon to beat the heat at the 2020...
The 2020 Tokyo Olympics plans to introduce facial recognition software at security checkpoints ― both to cut down on unauthorized people getting in and, probably more importantly, getting athletes out...
View Article5 Key Components of a Successful Enterprise Mobility Management Strategy
Some sort of mobility management solution has become a necessity in today’s workplace, but what makes a good Enterprise Mobility Management (EMM) solution, exactly? The mobile landscape is becoming...
View ArticleOnline Stock Trading Has Serious Security Holes
It’s never been easier to trade stocks; just a few taps or clicks will do the trick. But most of the platforms that millions of market participants rely on to move their money suffer from...
View ArticleFortnite decision to bypass the Google Play store sparks security concerns...
V iral videogameFortniteis set to be released on Android in the coming weeks, giving hundreds of millions of phone and tablet users the chance to play the game on the move for the first time. But a...
View ArticleBlack Hat 2018: Google’s Tabriz Talks Complex Security Landscapes
LAS VEGAS The complexity of the cybersecurity landscape is at an all-time high, with security researchers, vendors, third-party ecosystems and even governments all trying to come to a consensus for...
View ArticleHack the planet: vulnerabilities unearthed in satellite systems used around...
So this is bad. Black Hat, the king of enterprise security conventions, kicked off today, and most noticeable amid the fusillade of security research was some impressive work from Ruben Santamarta of...
View Article我为什么要做一款“黑客机器人”|访墨云科技刘兵
2017 年初,35 岁的刘兵决定结束14年的打工生涯,他在当年 5 月成立了一家名为“墨云科技”的安全公司,正式创业。 此前,刘兵曾在神州数码安全事业部历任研发总监、项目经理、产品经理、销售总监、总经理,程序员出身的他,在离职前已经把事业部的业务年销售额做到了 5 亿,如果单纯从收入和职位这个角度看,他其实已经能算这个群体里面很成功的一拨人。...
View Article梭子鱼预警:网络罪犯正想方设法入侵邮件账户
通常情况下,您会不设防的打开朋友、同事或者你认识的人的邮件,对陌生人邮件还是有警惕性的。 网络 攻击者对这点也是心知肚明。因此,他们会利用您的电子邮件帐户向您的朋友和同事发送攻击。 在梭子鱼最新的威胁监测下, 我们正在关注一些被梭子鱼Sentinel团队剖析过的真实账户所受到的攻击。以下是我们发现的: 威胁的特征:网络攻击者入侵用户的邮件帐户并向用户的同事和联系人发送电子邮件。其中有一条虚假链接,...
View Article日本安全软件制造商称:比特币ATM恶意软件在网上贩卖
据cointelegraph消息,日本东京安全软件制造商 Trend Micro在 8 月 7 日发表的博客文章中称,该公司发现在网上可以购买 比特币ATM恶意软件。 Trend Micro称,犯罪分子用 25000 美元就可购买比特币ATM恶意软件,并附有NFC和EMV 功能的现成卡。 据称,该恶意软件利用比特币ATM恶意软件可以,可以让犯罪分子通过该比特币设备获取金额高达6750...
View Article通信行业深度分析:网络可视化厂商的蜕变 剑指网络安全和千亿大数据市场
当前,网络空间已经成为现代国家的新疆域、全球治理的新领域,网络安全全面渗透到政治、经济和社会发展的方方面面,并逐渐对国家安全产生颠覆性影响。党的十九大指出,要坚持总体国家安全观,加强国家安全能力建设,坚决维护国家主权、安全、发展利益。加快推动网络安全产业创新发展,打造捍卫我国网络主权的基础力量,已经成为我国网络空间实力建设的关键问题。 一、紧抓机遇,我国网络安全产业迈入创新发展新阶段...
View Article依法治网,为构建网络清朗空间保驾护航
没有网络安全就没有国家安全。2017年6月1日,《中华人民共和国网络安全法》(以下简称“网络安全法”)正式实施,我国网络安全管理的综合法律体系建设正式启航。在推动网络安全法落地方面,配套法律法规和规范性文件相继出台,我国网络空间法治体系建设加速开展,网络空间法治进程迈入新时代。 系列法律法规筑起网络安全“防火墙”...
View Article