December, 2015

article thumbnail

OS X El Capitan: The smart person's guide

Tech Republic Security

This comprehensive guide includes everything you need to know about Apple's OS X El Capitan, including features, requirements, upgrade options, software updates, and more.

Software 102
article thumbnail

Docker-based OpenVAS Scanning Cluster to Improve Scope Scalability

NopSec

OpenVAS (Open Vulnerability Assessment Scanner) – is an open source security vulnerability scanner and manager. It is an open source fork of the commercial vulnerability scanner Nessus and it provides several options to manage distributed, remote, local scans and add several other specialized vulnerability scanners to the mix. Since OpenVAS 8 was released with improved Master-Slave support for better distributed and load-balanced scanning, NopSec decided to build a proof of concept securit

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding how tls downgrade attacks prevent email encryption

Elie

Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.

article thumbnail

Criminal Services – Crypting

Digital Shadows

In the world of cybercrime, malicious software (malware) plays an important role. But if you’re a cybercriminal, how do you. The post Criminal Services – Crypting first appeared on Digital Shadows.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Canada’s role in international botnet takedown

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has served its first warrant under Canada’s Anti-Spam Law (CASL) to take down […].

article thumbnail

‘Hacker Buba’: Failed extortion, what next?

Digital Shadows

An actor identifying itself as “Hacker Buba” recently claimed to have breached Invest Bank and posted purported customer and client. The post ‘Hacker Buba’: Failed extortion, what next? first appeared on Digital Shadows.

Banking 40

More Trending

article thumbnail

How to Speak Information Security to Executives: A CSO Perspective

NopSec

According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the information security risk and threats their organizations face. In commenting on the results, I stated this lack of awareness is “astounding.” In an age where data breaches crowd the daily headlines, lack of awareness is no longer an excuse for executives.

article thumbnail

Communicating Intelligence: Getting the message out

Digital Shadows

In my previous blog I discussed some of the challenges associated with communicating intelligence. In this follow up piece, I’ll. The post Communicating Intelligence: Getting the message out first appeared on Digital Shadows.

40
article thumbnail

TalkTalk Information Likely to be Discoverable on The Dark Web

Digital Shadows

Last month, TalkTalk disclosed that they been the victim of a cyber attack on its website. Initial disclosures indicated that. The post TalkTalk Information Likely to be Discoverable on The Dark Web first appeared on Digital Shadows.

article thumbnail

Communicating Intelligence: A Battle of Three Sides

Digital Shadows

Good intelligence depends in large measure on clear, concise writing. -Fran Moore, Director for Analysis, Central Intelligence Agency (2011) I’m. The post Communicating Intelligence: A Battle of Three Sides first appeared on Digital Shadows.

40
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The TPP Agreement and Privacy

Privacy and Cybersecurity Law

The Trans-Pacific Partnership Agreement (the “TPP Agreement”) is a regional trade and investment agreement negotiated by 12 Pacific Rim countries […].

article thumbnail

EU Data Protection Reform: LIBE agrees!

Privacy and Cybersecurity Law

The EU Parliament LIBE Committee has approved the Data Protection Reform package as reported by Privacy Laws and Business today. For […].

40
article thumbnail

New guidance from the Polish DPA: a warning for all Safe Habor (ex)participants

Privacy and Cybersecurity Law

The Polish DPA has recently issued a statement to the effect that all companies which previously relied on Safe Harbor […].

40
article thumbnail

Safe Harbor fallout: where are we now?

Privacy and Cybersecurity Law

As we all know, the EU decided to invalidate Safe Harbor on 6 October 2015. Please see our Insight article […].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The Importance of Technology Integration to the Value of an InfoSec product

NopSec

According to FireEye, a U.S. based provider of next generation threat protection, it takes companies, on average, more than 200 days to detect they are being hacked. Couple that result with the 2015 Verizon Data Breach Investigations Report that found 99.9 percent of vulnerabilities were exploited over a year since they were disclosed, and you can see that protecting data from hackers is in a sublime state of disrepair.

InfoSec 52