July, 2015

article thumbnail

Kali Linux 2.0 Release Day Scheduled

Kali Linux

We’ve been awfully quiet lately, which usually means something is brewing below the surface. In the past few months we’ve been working feverishly on our next generation of Kali Linux and we’re really happy with how it’s looking so far. There’s a lot of new features and interesting new aspects to this updated version, however we’ll keep our mouths shut until we’re done with the release.

52
article thumbnail

Help, My Car Got Hacked and the Internet of Things

NopSec

The recent recall of 1.4 million vehicles by Fiat Chrysler has raised many questions and concerns after researchers discovered a security vulnerability that could literally allow hackers to take over a driver’s control. Has the Internet of Things become a reality, or is this just another FUD campaign to create mass hysteria among consumers? The answer is: it’s a little of both.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Constant Connectivity Means an Increase in IT Security Needs

CompTIA on Cybersecurity

A security breach in this constantly connected world can mean anything from being inconvenienced to being extorted — and for businesses that don’t properly secure their networks it can mean massive losses in profits and time. At a time when it’s harder than ever to find highly skilled IT security staff, CompTIA’s 11th Annual Information Security Trends study shows data breaches cropping up with growing frequency, and recovery taking longer than ever before.

article thumbnail

Data Loss Disasters in the Cloud

Spinone

Let’s review the most common causes of data loss in the cloud and data loss protection tools. Well, we are not paranoiacs. Sometimes even to the contrary: when we lose important files we would really like if there was a copy of it somewhere. User error Cloud services provide an ability to delete users’ data. Usually, it’s an accidental deletion.

Backups 40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

UK Supreme Court to re-consider compensation rights under Data Protection Act

Privacy and Cybersecurity Law

This week, Google has been granted permission to appeal to the UK Supreme Court as part of the decision in […].

article thumbnail

vsftpd-3.0.3 released. and the horrors of FTP over SSL

Scary Beasts Security

I just released vsftpd-3.0.3, as noted on the vsftpd home page. It's actually been almost three years(!) since vsftpd-3.0.2, so things do seem to be getting very stable and calming down. The exception to things getting very stable and calming down seems to be SSL over FTP, which has been a constant source of, uh, joy, for some time now. Some issues fixed relate to security and warrant describing here because I think they are interesting.