May, 2015

article thumbnail

Official Kali Linux Docker Images Released

Kali Linux

For the latest information, please see our documentation on Docker Last week we received an email from a fellow penetration tester, requesting official Kali Linux Docker images that he could use for his work. We bootstrapped a minimal Kali Linux 1.1.0a base and registered it under our Kali Linux Docker account. A few minutes later, said fellow pentester was up and running with Metasploit and the Top 10 Kali Linux tools on his Macbook Pro.

article thumbnail

Privacy law and anti-spam: Guidance from the Office of the Privacy Commissioner of Canada

Privacy and Cybersecurity Law

Recent enforcement under Canada’s anti-spam legislation (CASL) by the Canadian Radio-Television and Telecommunications Commission (CRTC) is keeping the spotlight on […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Intelligence: one size does not fit all

NopSec

Literally a flood of lines have already been written about Security Threat Intelligence and its uses, so I would not bother the readers with more rhetoric. Just wanted to inform our NopSec interpret and uses threat intelligence as part of the Unified VRM platform. As part of my job I need to read a lot. And usually I don’t miss any article. As part of this reading task, lately I came across a lot of threat intelligence articles and commentaries.

Malware 40
article thumbnail

Consent to Disclose Information in Response to a Consumer Complaint – Guidance from Canada

Privacy and Cybersecurity Law

Not infrequently, customers may resort to consumer affairs columnists and other third parties, such as consumer advocacy groups, in order […].

40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Driver’s Licence Information and Test Drives: Guidance from the Alberta Office of the Information Privacy Commissioner

Privacy and Cybersecurity Law

What personal information is reasonable for a motor vehicle dealer to collect from individuals participating in test drives? It has been […].

40
article thumbnail

Pixiewps, Reaver & Aircrack-ng Wireless Penetration Testing Tool Updates

Kali Linux

A short while ago, we packaged and pushed out a few important wireless penetration testing tool updates for aircrack-ng, pixiewps and reaver into Kali’s repository. These new additions and updates are fairly significant, and may even change your wireless attack workflows. Here’s a short run-down of the updates and the changes they bring.