Uber hires former NSA counsel as new security head
Uber has hired a new chief security officer, the New York Times reports, filling the role that has remained vacant since Joe Sullivan was fired last year. Sullivan was fired for his role in covering...
View ArticleFlaws in Mobile Point of Sale Readers Displayed at Black Hat
While security is high overall for mPOS tools from companies like Square, PayPal, and iZettle, some devices have vulnerabilities that attackers could exploit to gather data and cash. Mobile point of...
View ArticleWading through the alphabet soup of application security testing tools: A...
Every application security testing tool has advantages and disadvantages. No single solution can ensure you find and fix all vulnerabilities . But application security tools can complement one another...
View ArticleWhat You Should Know Before Buying a Wired Security Camera System
Wired security camera systems are nice and far more reliable than Wi-Fi cameras, but there are a handful of things you should be aware of before you go out and buy a wired camera system. RELATED: Wired...
View ArticleThe Value-add of Combining SOAR with Existing Security Technologies
Security teams and Security Operations Centers across industry verticals are facing many of the same challenges: increased workload, budget constraints, competition for skilled analysts and the burden...
View ArticleTLS 1.3 ― what is it, and who cares?
What is the news:publication of the updated security standard for Internet transport layer security: TLS 1.3 Why it matters:TLS provides the basis for pretty much all Internet communication privacy...
View ArticleIDG Contributor Network: Where Chicken Little meets information security
In the famous fable, Chicken Little believed the world was coming to an end and told everyone “the sky is falling." That ubiquitous phrase refers to any hysterical or mistaken belief that disaster is...
View ArticleHere's a fab idea: Get crypto libs to warn devs when they screw up
Building warnings into crypto libraries that alert developers to unsafe coding practices turns out to be an effective way to improve the security of applications. At the USENIX Symposium on Usable...
View ArticleThe National Archives deploys Egress to support FoI requests
When it receives an FoI request, the National Archives undertakes a review of the access status and sensitivity of the record in consultation with the transferring department. The office receives more...
View ArticleIntel reveals more major chip security flaws
Intel is facing a fresh security headache following the news that its hardware is being hit by a major new vulnerability. The Foreshadow flaw had been identified by security researchers who say that...
View ArticleAn important security notice regarding L1 Terminal Fault (L1TF)
Intel released yesterday a statement regarding an important security advisory . This vulnerability has been dubbed L1 Terminal Fault (L1TF). The following relevant CVEs have been created:...
View ArticleIA concerns over privacy, security issues with encryption
Internet Australia (IA) has raised serious privacy and security concerns about the Australian Government’s proposal to introduce a new cyber encryption law, warning the draft law seeks unprecedented...
View ArticleWhat the Reddit Hack Teaches Us About Web Security
A few days ago, Reddit announced that they had been the victim of an elaborate hack attack and data breach. The attackers accessed the email digests from August 2018 and the entire 2007 database...
View ArticleMcAfee Offers Free McAfee Skyhigh Security Cloud to Help Secure State...
Leading cybersecurity company will provide U.S. state election officials access to a free 12-month license of McAfee Skyhigh Security Cloud RESTON, Va. (BUSINESS WIRE) In an effort to help secure U.S....
View Article技术讨论 | 通过SSRF漏洞攻击Docker远程API获取服务器Root权限
*本文原创作者:差池其羽,本文属CodeSec原创奖励计划,未经许可禁止转载 严正声明:本文仅限于技术讨论与分享,严禁用于非法途径。 前言...
View ArticleBrief Analysis on APT Attack through Cryptocurrency Trading Software
APT-C-26 is an APT group that has been active since 2009. According to the research by an overseas security vendor, the group’s earliest attack may be associated with the “Operation Flame” which was a...
View Article99%的人都不知道的秘密:世上竟有如此酷炫的钓鱼系统!
*本文原创作者:flagellantX,本文属CodeSec原创奖励计划,未经许可禁止转载 PS:本文仅用于技术讨论,严禁用于非法用途 钓鱼作为从远古时期出现的手段,到现在的风靡在各种成功的攻击案例中几乎成为一个高级hacker必不可少的技能。...
View ArticleSpeed to Market Often Trumps Concerns Around Mobile Security for Enterprise
When it comes to beating competitors in the marketplace, mobile security for enterprise is less of a priority than business performance. That's just one of the surprising findings of Verizon's...
View ArticleForecasting Time Series ― Part I: Predict Stock, Forex and Cryptocurrency...
Forecasting Time Series ― Part I: Predict Stock, Forex and Cryptocurrency prices using statistical methods Hi! I’m Atilla Yurtseven. I am Founder & CEO of Ates Software. I have developed HandyCafe...
View ArticleTrend Micro Launches Product to Protect Telecom Networks Serving Business and...
New security solution mitigates risks in high volume, dynamic network architecture environments DALLAS (BUSINESS WIRE) Trend ( TYO: ; TSE: ), a global leader in cybersecurity solutions, today announced...
View Article