You Need to Care About Open Source Risk in HIPAA and HITECH Compliance
Chester Liu | Director of Sales Enablement | Oct 11, 2016 Black Duck offers solutions that cut across a range of industries - lately I've seen growing interest from a new sector. These are healthcare...
View ArticleDDOS攻击类型和解决办法
DDOS攻击类型和解决办法 一点号江湖佰晓生3天前 DDOS攻击类型和解决办法 php?url=0EcmhIe6iY" alt="DDOS攻击类型和解决办法" />DDOS攻击是黑客最常用的攻击手段,下面列出了对付它的一些常规方法: (1)定期扫描...
View Article黑客Gottesfeld宣布绝食抗议审判 曾攻击对波士顿儿童医院网站
在通过DDoS手段攻击波士顿一家医院网络2年半之后,“匿名者”又发起了一项绝食抗议滥用少年行为矫正设施的倡议。到今日,Martin Gottesfeld已经绝食7天,“匿名者”要求对该设施重新进行调查。Gottesfeld被指控与2014年4月对波士顿儿童医院发起的DDoS攻击有关,一个由他控制的YouTube账户,上传了一则采用“匿名者”风格、号召于当天发动攻击的#Opjustina的视频。...
View ArticleIDG Contributor Network: New duties of security executives
I'm a fan of this week's theme for National Cyber Security Awareness Month, Cyber from the Break Room to the Board Room. What I love about it is the blatant recognition that executives have a duty to...
View ArticleBusyBox Botnet Mirai the warning we’ve all been waiting for?
On Tuesday, September 20 th around 8:00PM, KrebsOnSecurity.com was the target of a record-breaking 620Gbps volumetric DDoS attack designed to take the site offline. A few days later, the same type of...
View ArticleVMware Horizon Security Updates: Common Criteria Certification & Client...
At VMware, we continually strive to provide secure software to our customers. In that spirit, we are pleased to share that VMware Horizon attained Common Criteria certification. This is an...
View ArticleCyber Hunters, Incident Response & The Changing Nature Of Network Defense...
Or how I learned that network defense needs to evolve from a game of "stumbled upon" to "search and discover." Security is a human problem. Computers don't hack computers. Computers don't steal each...
View ArticleLack of visibility leads to cloud storage security issues
A lack of visibility into an organization's use of cloud providers can lead to unauthorized access to data, improper handling and storage of data and unauthorized data removal. As a result,...
View Article12 hardware and software vulnerabilities you should address now
It's not a stretch to say that most organizations have at least some old hardware and software still in use. An old computer that's still chugging along, running an old operating system and perhaps an...
View ArticleThe internet of insecure things: Thousands of internet-connected devices are...
See larger image Image courtesy Thinkstock Set and forget We talked to a host of tech experts about the state of security in the internet of things world, and found out the good, the bad, and the very...
View Article俄大使否认“黑”美大选
俄罗斯驻美国大使基斯利亚克11日在华盛顿说,美国对俄罗斯支持“黑客”攻击美国选举相关机构的指认完全子虚乌有。“关于那份所谓俄罗斯涉嫌从事黑客活动的声明,我已经告诉过大家,在此再重复一遍:这是错误的,”基斯利亚克在约翰斯霍普金斯大学演讲时说,“我们的美国朋友从未向我们出示任何证据。”美国国土安全部和国家情报总监办公室发表联合声明,点名指认俄罗斯政府与美国民主党全国委员会网站和选举机构被攻击、一些政治人...
View ArticleCisco NX-OS Software AAA安全限制绕过漏洞(CVE-2015-0721)
Cisco NX-OS Software AAA安全限制绕过漏洞(CVE-2015-0721) 发布日期:2016-10-05 更新日期:2016-10-12 受影响系统: Cisco NX-OS 描述: CVE(CAN) ID: CVE-2015-0721 Cisco NX-OS是一个数据中心级的操作系统。 Cisco...
View ArticleAustralian government blind to true cyberthreat on industry
The Australian Cyber Security Centre (ACSC) lacks a clear view of the cyber security incidents suffered by Australian businesses because they’re not sufficiently reported, the government body said...
View ArticleAsimov Created Three Laws of Robotics, So How About Cyber Security?
Someone asked me why cyber security seems so vaguely defined. Surely there must be some standard set of laws like in Asimov’s fiction. No, not that I know of, but maybe Icould help. In “I, Robot”, a...
View Article三星发放防火回收箱和手套协助消费者安全退还手机
据英国《每日邮报》报道,在韩国三星公司宣布全面停产Galaxy Note 7并退还购机费用后,三星公司开始寄发专用防火“回收箱”和手套,协助消费者安全退还手机。 科技网站xdadevelopers是首批收到“回收箱”的机构,该网站已经发布“拆箱”视频。 三星在“回收箱”中还附有特别警告,强调手机必须通过陆运退还,以防其在空中发生爆炸。此前航班上曾发生过三星手机冒烟的事件,导致乘客紧急撤离。...
View ArticleDown the Rabbit Hole: Extracting Maliciousness from MSG Files Without Outlook
Email As Infection Vector Recently, we noticed a spam email with a Message (.MSG) file attached with it. As you may know, MSG file is a file format for storing Microsoft Outlook and Exchange message...
View ArticleEnterprises outsmarting themselves with security, while attackers easily use...
Bad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker's Playbook , based on an analysis of nearly 4 million...
View ArticleDigital Offers: Lifetime Sticky Password Premium subscription is just $30!
Your passwords protect your whole online life, and they should be strong and secure. Unfortunately, those aren't always the easiest to remember and manage because of how many accounts most of us have,...
View ArticleAdobe Releases Critical Security Update for Flash Player on Mac
Adobe has released security updates for Flash Player that address critical vulnerabilities that could put Mac users at risk. Flash Player version 23.0.0.162 and earlier, Flash Player Extended Support...
View Article