February, 2015

article thumbnail

Counting Vulnerabilities. Assessing Threats. Frictionless Remediation

NopSec

A couple of days ago I read an interesting article in the Tenable Network Security Blog — here — where the author was arguing that the number of security vulnerabilities detected in a network is not a good indicator of risk that the network itself is facing against motivated attackers and malware. In the above-mentioned blog post, the author states “Telling an organization that they have 10,324 vulnerabilities, whilst shocking, doesn’t convey the actual risks faced”

Risk 52
article thumbnail

Kali Linux 1.1.0 Release

Kali Linux

After almost two years of public development (and another year behind the scenes), we are proud to announce our first point release of Kali Linux - version 1.1.0. This release brings with it a mix of unprecedented hardware support as well as rock solid stability. For us, this is a real milestone as this release epitomizes the benefits of our move from BackTrack to Kali Linux over two years ago.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Your Google+ Photos Require Insurance?

Spinone

Memories make your life meaningful. When was the last time you were laughing? Or maybe giving a hug to your beloved ones? Enjoyed the smell of a fresh morning coffee? Got dirty eating hot chocolate and remembered your sweet childhood? Ok, ok, if you can’t remember when exactly it was last time so just be so kind to open your old and precious photo albums.

article thumbnail

First Data gains approval for its Processor BCRs

Privacy and Cybersecurity Law

Dentons has advised First Data Corporation (“First Data“), a global leader in payment technology and service solutions, in successfully obtaining […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

State of Insecurity: Challenges to Addressing Discovered Vulnerabilities

NopSec

Penetration Testing, Red Team Operations, Exploit Development, Vulnerability Management, Brute Forcing, Advanced Persistent Threats and even BEAST, CRIME, Zeus, Code Red, Sandworm, Heartbleed, WireLurker, ShellShock – all the many buzzwords used in glamorizing the offensive side of security or even to name devastating and complex malware and vulnerabilities in the 21st century.

article thumbnail

Get 2GB Free Drive Storage for the Safer Internet Day

Spinone

The post Get 2GB Free Drive Storage for the Safer Internet Day first appeared on SpinOne.