February, 2015

article thumbnail

Counting Vulnerabilities. Assessing Threats. Frictionless Remediation

NopSec

A couple of days ago I read an interesting article in the Tenable Network Security Blog — here — where the author was arguing that the number of security vulnerabilities detected in a network is not a good indicator of risk that the network itself is facing against motivated attackers and malware. In the above-mentioned blog post, the author states “Telling an organization that they have 10,324 vulnerabilities, whilst shocking, doesn’t convey the actual risks faced”

Risk 52
article thumbnail

Lenovo and Superfish? Don't panic, you may not be affected

We Live Security

Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kali Linux 1.1.0 Release

Kali Linux

After almost two years of public development (and another year behind the scenes), we are proud to announce our first point release of Kali Linux - version 1.1.0. This release brings with it a mix of unprecedented hardware support as well as rock solid stability. For us, this is a real milestone as this release epitomizes the benefits of our move from BackTrack to Kali Linux over two years ago.

article thumbnail

Get 2GB Free Drive Storage for the Safer Internet Day

Spinone

The post Get 2GB Free Drive Storage for the Safer Internet Day first appeared on SpinOne.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

First Data gains approval for its Processor BCRs

Privacy and Cybersecurity Law

Dentons has advised First Data Corporation (“First Data“), a global leader in payment technology and service solutions, in successfully obtaining […].

article thumbnail

Electronic health records and data abuse: it's about more than medical info

We Live Security

After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.

52

LifeWorks

More Trending

article thumbnail

It's Safer Internet Day. So where is our Internet of Secure Things?

We Live Security

It's Safer Internet Day. But millions of devices which have not been designed with security in mind are connecting to the internet. Shouldn't we be able to tell the manufacturers that enough is enough?

article thumbnail

Common eBay scams and how to avoid them

We Live Security

Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.

Scams 52
article thumbnail

What are the alternatives to passwords?

We Live Security

Is it time for big companies - at the very least - to abandon weak password security? If so, what password alternatives are there?

article thumbnail

Facebook turns 11 - what you need to know, and what do your likes say about you?

We Live Security

Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, heres what you need to know about the new settings and how they could affect you.

Media 52
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Europol shuts down Ramnit botnet used to steal bank details

We Live Security

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

Banking 40
article thumbnail

Top 10 breaches of 2014 attacked 'old vulnerabilities', says HP

We Live Security

A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.

40
article thumbnail

Jamie Oliver website serves up a side of malware

We Live Security

Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.

Malware 40
article thumbnail

State of Insecurity: Challenges to Addressing Discovered Vulnerabilities

NopSec

Penetration Testing, Red Team Operations, Exploit Development, Vulnerability Management, Brute Forcing, Advanced Persistent Threats and even BEAST, CRIME, Zeus, Code Red, Sandworm, Heartbleed, WireLurker, ShellShock – all the many buzzwords used in glamorizing the offensive side of security or even to name devastating and complex malware and vulnerabilities in the 21st century.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Facebook exploit allowed attackers to remotely delete photos

We Live Security

A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.

Hacking 40
article thumbnail

Facebook launches ThreatExchange for companies to share security threats

We Live Security

Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.

article thumbnail

Security terms explained: What does Zero Day mean?

We Live Security

One of the terms Im most often asked to explain is what a zero day vulnerability or exploit is; lets look at what that phrase entails.

40
article thumbnail

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

We Live Security

WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.

Hacking 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Internet Explorer exploit could let phishers steal logins

We Live Security

A vulnerability in the latest patched version of Microsoft Internet Explorer that could allow hackers to launch "highly credible phishing attacks" has been uncovered, according to PC World.

article thumbnail

Why Your Google+ Photos Require Insurance?

Spinone

Memories make your life meaningful. When was the last time you were laughing? Or maybe giving a hug to your beloved ones? Enjoyed the smell of a fresh morning coffee? Got dirty eating hot chocolate and remembered your sweet childhood? Ok, ok, if you can’t remember when exactly it was last time so just be so kind to open your old and precious photo albums.

article thumbnail

White House seeks 10% increase in cybersecurity spend

We Live Security

President Obama's budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.

article thumbnail

The New Hacker's List and an Old Debate: Would you Hire a Hacker?

We Live Security

The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?

40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The utterly crazy story of the death threat hacker (involves a cat)

We Live Security

A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.

Malware 52
article thumbnail

Facebook porn scam infects 110k users in 48 hours

We Live Security

A new porn scam is spreading startlingly quickly through Facebook - one that has managed to spread malware to over 110,000 users in 48 hours, reports The Guardian.

Scams 40