December, 2013

article thumbnail

Ultimate Pentesting PwnBox (2013) - Utilite Pro

Kali Linux

We’re always on the lookout for and interesting ARM hardware for Kali Linux. Whether it’s a Galaxy Note or a USB stick sized SS808 , we want to see Kali run on it. You can therefore imagine our excitement, when we first laid our eyes on the Utilite pro. Utilite Pro is a quad core ARM cortex-A9 machine with up to 4 GB of RAM, up to 512 GB mSATA SSD , HDMI and DVI-D output, dual (2x) 1GB nics , a built in wireless card and 4 USB ports.

article thumbnail

vtable protections: fast and thorough?

Scary Beasts Security

Recently, there's been a reasonable amount of activity in the vtable protection space. Most of it is compiler-based. For example, there's the GCC-based virtual table verification, aka. VTV. There are also multiple experiments based on clang / LLVM and of course MSVC's vtguard. In the non-compiler space, there's Blink's heap partitioning, enabled by PartitionAlloc.

50
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Data Protection Regulation hits a political issue

Privacy and Cybersecurity Law

Under the draft EU Data Protection Regulation, the proposal is to create a “one-stop-shop” for regulation. This means that data […].

40
article thumbnail

Wave of recent Massachusetts ZIP code cases following change in law and California’s lead

Privacy and Cybersecurity Law

As anticipated, in the wake of the Supreme Judicial Court ruling on March 11, 2013, in Tyler v. Michaels Stores, […].

40
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

New South African data privacy law

Privacy and Cybersecurity Law

On the day after Nelson Mandela’s passing, we wanted to highlight the long awaited South African law on data protection which […].

article thumbnail

Cy Pres Settlements – Justice Roberts’ opinion in the Facebook Beacon privacy class-action litigation

Privacy and Cybersecurity Law

The appeal to the US Supreme Court took an interesting turn in the Facebook Beacon litigation (Marek v. Lane). The […].

40

LifeWorks

More Trending

article thumbnail

EU/US Safe Harbor … spotted alive!

Privacy and Cybersecurity Law

The European Commission has announced that it will not kill off Safe Harbor. Instead it has published 13 recommendations to […].

40
article thumbnail

6 Month Countdown to Canada’s Anti-Spam Legislation (CASL)

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) has been a long time coming. The Government of Canada announced today that most of CASL’s provisions […].