January, 2014

article thumbnail

Passing the Hash with Remote Desktop

Kali Linux

Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in Kali Linux. An example of easy command line access using pth-winexe is shown below. We constantly strive to include new, useful tools to our repositories.

article thumbnail

Phone screen size: bigger isn't always better

Elie

Marketers agree: screen size is a top priority for anyone shopping for their next cell phone but my new consumer survey challenges this conventional wisdom.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerability Remediation Process & Management: Why is Remediation so Difficult?

NopSec

Note: This article was updated in June 2022. Risk Based Vulnerability management is the ongoing practice of detecting, classifying, prioritizing, and remediating security vulnerabilities in IT infrastructure and applications. For many companies, the remediation stage is where disappointment and frustration can set in. Prioritizing vulnerability remediation is the only surefire way to significantly reduce the risk of a cyber-attack.

article thumbnail

How Canada’s Anti-Spam Enforcers will Cooperate, Coordinate, Share Information

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) brings with it new legal violations and penalties, some of which become effective as of July 1, 2014. […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to Nuke your Encrypted Kali Installation

Kali Linux

There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added to the cryptsetup package in Kali Linux. We wanted to take this opportunity to better explain this feature, as well as demonstrate some useful approaches which are worthwhile getting to know. LUKS Nuke in a Nutshell As explained well By Michael Lee in his ZDNet article , when creating an encrypted LUKS container, a master key is generated at random.

article thumbnail

Kali Linux 1.0.6 Release

Kali Linux

Kernel 3.12, LUKS nuke, Amazon AMI / Google Compute images and more! It’s been a while since our last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature , new Kali ARM build scripts , and Kali AMAZON AMI and Google Compute image generation scripts , not to mention numerous tool additions and updates - this release is really heavily laden with goodness.

More Trending

article thumbnail

4 Things to Consider When Outsourcing Vulnerability Management

NopSec

Security risks to information systems and sensitive data are expanding at a rate that can outpace an organization’s technical resources and expertise. Small to mid-sized companies without sufficient in-house resources to maintain an effective security program may consider outsourcing cyber-security to a managed security service provider (MSSP). Knowing exactly what security functions to outsource is a key decision.

article thumbnail

The Year Ahead for Vulnerability Management

NopSec

This is the time of year when companies gaze into their crystal ball and try to discern what lies ahead. And nobody is better at predictions than an industry analyst. Javvad Malik is a Senior Analyst for the Enterprise Security Practice at 451 Research. He recently posted a tongue-in-cheek video “2014 Information Security Predictions” on his blog , which warned of the imminent ‘Advanced Advance Persistent Threats’.

Risk 40
article thumbnail

Vulnerability Scanning Best Practices: Where and When to Run Vulnerability Scans

NopSec

As penetration testers know, spending nights awake to probe networks, servers and applications is common practice. For companies completing vulnerability scanning for the first time, or even for seasoned IT security veterans, deciding where and when to run a vulnerability scan is not a straight-forward decision. Most of the time the penetration testing or vulnerability assessment is performed on production applications that need to be hit off-business hours for performance reasons.

article thumbnail

Total Cost of Ownership for Vulnerability Management

NopSec

With any technology investment, budget is a core part of the decision criteria. IT security departments are expected to do more with less and still maintain a secure IT environment. However with IT security solutions, more so than with other IT purchases, cost considerations can have significant impact on a business’ overall risk of a serious security breach.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Obama’s European Privacy Headache

Privacy and Cybersecurity Law

Since the revelations of Edward Snowden, there has been a wave of data privacy repercussions in Europe. Snowden, the former […].

article thumbnail

Data privacy: a look ahead at 2014

Privacy and Cybersecurity Law

So as the latest Snowdon revelations (oh … and the New Year Holiday fun has subsided) how about we look […].

article thumbnail

Kali Linux Amazon EC2 AMI

Kali Linux

Kali Linux in the Amazon EC2 Marketplace EDIT : For updated Kali Rolling images in the Amazon AWS, check this post. After several weeks of “back and forth” with the Amazon EC2 team, Kali Linux has finally been approved into the Amazon EC2 marketplace. This means that our users can now activate and access Kali Linux instances in the Amazon cloud quickly and easily.

article thumbnail

The Single Most Important Thing You Can do to Improve Cyber-Security in 2014

NopSec

According to a reports released by the Information Security Forum and ISACA , cyber-security will continue to be a critical issue for businesses in 2014. Key threats include bring your own device (BYOD) trends, data proliferation, as well as privacy and regulation. Security implications of BYOD Unsecured personal devices can introduce a lot of potential security challenges.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.