Security researchers say they can hack Medtronic pacemakers
Medtronic emphasizes the safety of its products. Product safety and quality are top priorities for Medtronic, and we have a strong product security program that leverages internal and external security...
View ArticleWhy Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?
Some people enter the technology industry to build newer, more exciting kinds of technology as quickly as possible. My keynote will savage these people and will burn important professional bridges,...
View ArticleVMware Cloud on AWS: Advanced Networking and Security with NSX-T SDDC
Announced in AWS Summit in New York last month and also briefly mentioned on the prior blog, Announcing General Availability of VMware NSX-T Data Center 2.2.0 , NSX-T networking and security is now...
View ArticleVERIS INCIDENT FRAMEWORK
The VERIS methodology was created by Verizon back in 2010. This was an effort to create an environment for the classification of specific information. The VERIS model is applied through the process of...
View Article7 Most Difficult Information Security Certifications
Demand for information security professionals has grown in the last few years, as more companies are upping the ante on protecting the security of their digital assets. The infosec workforce gap is...
View ArticleWhy adding bugs to software can make it safer
When it comes to radar tracking, one of the most effective countermeasure is to release a cloud of aluminum strips or metallized plastic. These strongly reflect radar and create thousands of targets,...
View ArticleCampaign Trail: Old Spice's boardroom agenda; eBay sets up shop; Trojan...
Campaign Trail is our look at some of the best and worst new creative efforts from the marketing world.View past columnsin the archives here. Clever use of interactive livestreaming, a partnership...
View ArticleAUTHSCOPE:自动化挖掘在线服务中的授权漏洞
作者: {LIG}@ArkTeam 原文作者:Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin 原文标题:AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services 原文会议:2017 ACM SIGSAC Conference on...
View ArticleSecurity Flaws Allowed Full Access To Spectrum Customers’ Accounts Without A...
A vulnerability on internet and cable TV provider Spectrum's website made it possible for just about anyone to take over customers’ accounts without a password. Only a Spectrum customer’s IP address...
View ArticleResearchers Find New Fast-Acting Side-Channel Vulnerability
A group of researchers from Georgia Tech have discovered a method for pulling encryption keys from mobile devices without ever touching the phones, themselves. Looks like you've hit your article limit....
View Article浏览器攻击框架BeEF Part 6:攻击用户与攻击浏览器
*本文原创作者:NT00,本文属CodeSec原创奖励计划,未经许可禁止转载 前言 这一章介绍如何使用BeEF来攻击用户和浏览器,攻击用户和浏览器的效果相对于上一章来说比较简单,效果也直接有效。 查看之前的五篇文章: 浏览器攻击框架BeEF Part 1 浏览器攻击框架BeEF Part 2:初始化控制 浏览器攻击框架BeEF Part 3:持续控制 浏览器攻击框架BeEF Part...
View Article海外 | 2018年漏洞披露数量远远超过往年
根据Risk Based Security的最新报告,今年迄今披露的10,644个漏洞中,有近17%的是重大漏洞。 对于那些希望通过补丁修补来避免系统缺陷的组织来说,这并不是个好消息。今天发布的Risk Based Security新报告显示,软件产品中发现的漏洞数量没有减少的迹象。...
View ArticlePHP-Horde-Image Security Update for Debian 9
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4276-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond August 17, 2018...
View Article5 Reasons to Prioritize Security Awareness Training in 2018
Victims of cyberattacks are in the news nearly every day. These organizations are big and small and represent healthcare, finance and utilities to local government and entertainment. In their 2016...
View ArticleTop 4 Best Practices for Protecting Your Business from Third-Party Risks
Enterprises rely heavily on third-party vendors for faster time to market, improved profitability and reduced costs. However, third-party partnerships come with varying risks, including financial,...
View ArticleTrump doubles down on security clearances, former officials slam move
By Jeff Mason and Jonathan Landay WASHINGTON (Reuters) - President Donald Trump faced an unprecedented outcry from former intelligence officials on Friday after stripping the security clearance of...
View ArticleMobile Testing Part IV: An Introduction to Mobile Security Testing
Mobile security testing can be problematic for a software tester, because it combines thechallenges of mobile with the challenges of security testing . Not knowing much about mobile security testing,...
View ArticleUS seeks Messenger data in case that could mirror one in Australia
The US Government is going after Facebook in a bid to get the social media giant to break the encryption on its Messenger client, in order that it can gain access to voice data reportedly needed for a...
View ArticleUse Azure Active Directory with Spring Security 5.0 for OAuth 2.0
We are excited to announce that Spring Starter for Azure Active Directory (AD) is now integrated with Spring Security 5.0. It offers you an easy way to build OAuth2.0 authentication and authorization...
View ArticleSecure coding practices in Java: challenges and vulnerabilities
Secure coding practices in Java: challenges and vulnerabilities Meng et al., ICSE’18 TL;DR : don’t trust everything you read on Stack Overflow. Meng et al. conduct a study of Stack Overflow posts...
View Article