Insiders Continue to be Data Theft’s Best Friend
The enemy within the enterprise is often employees who are either malicious or unwittingly allowing attackers inside a protected network. Some of the most damaging attacks to hit organizations over the...
View ArticleComputer scientist working to test security of IoT systems, blockchains
Jeff Lei. Credit: UT Arlington Computer data breaches cost companies millions of dollars each year. When combined with the damage leaks of private information do to consumers, the total cost of...
View ArticleEmployees engage in unsafe online behavior despite understanding risks
A survey of more than 400 full-time employees in the US shows that, despite having a general understanding of security risks, people still tend towards unsafe behavior. The study by Spanning Cloud Apps...
View Article卿昱:网络安全开启全民密码时代
9月17日,“2018国家网络安全宣传周――网络安全技术高峰论坛”在成都世纪城国际会议中心举行。中国电子科技网络信息安全公司副总经理、中国电子科技集团公司第三十研究所所长卿昱在会上发表了演讲,用一次微信支付的历程为例,将大家带入了“无处不密、处处需密”的全民密码时代,跟大家分享了全民密码时代的特征、机遇挑战、趋势研判并提出了四点倡议。...
View ArticleExpress Logic’s X-Ware IoT Platform Brings Industrial-Grade IoT Device...
X-Ware IoT Platform Leverages ARM TrustZone Technology for ARMv8-M to Bring New Levels of Security to Constrained IoT Devices SAN DIEGO (BUSINESS WIRE) #ARM Express Logic, the worldwide leader in...
View ArticleManageEngine Improves Security with Browser Security Plus
IT management company, ManageEngine, has announced the release of Browser Security Plus. This browser management solution assists businesses in securing their corporate data located in the cloud and...
View ArticleNine Major Phishing Attacks of 2018 (and How to Spot Them)
Phishing attacks are the most common type of cyberattack for good reason: because they work. If an attacker can convince you to click on a link in a phishing email and enter your credentials, it saves...
View ArticleSymantec Offers Free Website Security Service for Midterm Elections
Security vendor offers US election jurisdictions its Project Dolphin phishing/website spoofing-detection service and security resources, for free. Symantec is the latest security vendor to offer pro...
View ArticlePartner Implements Untangle at Client Sites for Cost-effective Network...
Background ProStratus has been providing IT services and solutions for small businesses throughout the Springfield, Ohio area since 1992. With a combined 60 years of IT and data center experience,...
View ArticleIntroduction to Wireless Security with Aircrack-ng
Introduction to Wireless Security with Aircrack-ng Today we’re going to walk through a few WiFi testing examples using Aircrack-ng, which is a suite of wireless network security tools. It allows us to...
View ArticleSmart Security Week Sessions: Marseille, France
Starting on Monday, September 24th, I am so excited to kick off my international tour at several events during Smart Security Week in Marseille, France . Register today to meet at Connect Security...
View ArticleAlbeck Financial Selects IronClad Encryption’s ICEMicro for Global Cyber...
HOUSTON (BUSINESS WIRE) IronClad Encryption Corporation (the “company” or “IronClad”) (OTCQB: IRNC), a next-generation cyber defense company that secures digital assets and communications across a wide...
View ArticleFlash 0day漏洞(CVE-2018-4878)复现
本文作者:i春秋作家――F0rmat 前言 这几天很忙,已经有两天没有更新文章了,最近 CVE-2018-4878 挺火的,还有群里的人也问这个怎么复现。今天就献丑复现一下,大表哥别喷,虽然我还没研究到这方面的漏洞分析,我会努力的,相信不久我也能写出二进制漏洞分析的文章。...
View Article网站漏洞真的防不胜防么?
创宇君近日看到CodeSec上一篇文章,作者称发现了某金融企业网站留有后门,而且是个0day。 在这里我们不去讨论这个后门的真假和性质,创宇君看到MallBuilder这个系统的瞬间,突然打开了记忆的大门…… 2017年,创宇君作为404积极防御实验室的一员,通过知道创宇安全大数据平台发现了某商场的两个系统漏洞,该商场使用的正是MallBuilder(v5.8.1.1)。 存在的漏洞文件...
View Article四两拨千斤 ―― Ubuntu kernel eBPF 0day分析
中国武术博大精深,其中太极作为不以拙力胜人的功夫备受推崇。同样如果从攻击的角度窥视漏洞领域,也不难看出攻防之间的博弈不乏“太极”的身影,轻巧稳定易利用的漏洞与工具往往更吸引黑客,今天笔者要着墨分析的就是这样一个擅长“四两拨千斤”的0day漏洞。 0day漏洞的攻击威力想必大家都听说过,内核0day更因为其影响范围广,修复周期长而备受攻击者的青睐。近期,国外安全研究者Vitaly...
View ArticleAWS News KW 37
Shell Zugang per AWS System Managers Session Manager AWS System Manager ist ein Service der Administratoren die Verwaltung von EC2 Instanzen, S3 Buckets und RDS Instanzen vereinfacht. Oft kann die...
View ArticleiOS 12完美越狱来了!漫谈iOS 12缓解机制
0×00 序 每年iOS系统大版本升级,对于安全研究人员都是一次新的挑战。在大版本中,除了修补一些未经公开的漏洞外,苹果还会增加新的缓解机制,大大提高了整个越狱的难度。这不仅要求安全研究人员能够挖掘出可以独立提权的漏洞,还要能够攻破签名绕过和根目录读写这两道关卡。在iOS 12中,业界公开的解决方案都已经被苹果封堵。 0×01 签名绕过(CodeSign Bypass)...
View ArticleGnuPG can now be used to perform notarial acts in the State of Washington
Washington State Electronic Notary Public endorsements C.J. Collier cjac at colliertech.org Mon Sep 17 20:53:02 CEST 2018 Previous message (by thread): Cannot decrypt file encrypted with enQsig Next...
View ArticleBUF早餐铺 | 浙江三大运营商签署《个人信息保护倡议书》;谷歌团队在霍尼韦尔安卓设备 ...
各位Buffer早上好,今天是2018年9月19日星期三,农历八月初十。今天的早餐铺内容有:浙江三大运营商签署《个人信息保护倡议书》;视频监控出现新漏洞:黑客可以让监控摄像头失灵;谷歌团队在霍尼韦尔安卓设备中发现高危漏洞;黑客利用Xbash恶意软件进行挖矿、勒索;美国国土安全部门向五家机构捐款1160万美元寻找防止网络中断新方法。 视频监控出现新漏洞:黑客可以让监控摄像头失灵...
View Article