April, 2016

article thumbnail

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Tech Republic Security

Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.

article thumbnail

Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots

Elie

As an experiment we dropped nearly 300 USB sticks on the UIUC campus to assess if USB drop attacks work and see if concerns about USB security were justified. We found out that at least 48% of the drive were plugged. This blog post summarizes how we ran the study, highlights the key findings, looks at what motivates people to plug in USB sticks, and discusses possible mitigations to improve USB security.

48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improving Business Outcomes With VRM

NopSec

Time and again, we hear from information security leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. In our opinion, they can and they must, but that requires aligning your business needs with the right technology.

InfoSec 40
article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to add more VPN setup options on your Ubuntu Touch device

Tech Republic Security

If you find the default VPN options on Ubuntu Touch lacking, here's how to expand the available options with the help of a third-party click package.

VPN 92
article thumbnail

How to use Signal for encrypted SMS messages

Tech Republic Security

Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.

More Trending

article thumbnail

How to connect your Android device to a VPN with VyprVPN

Tech Republic Security

If you aren't a fan of using unsecured wireless networks while on the go, a VPN client is what you want. Jack Wallen introduces you to one of the best on the Android platform.

VPN 63
article thumbnail

How to use secure shell from a Ubuntu Phone with the Terminal app

Tech Republic Security

If secure shell is your admin jam and you use a Ubuntu Phone, check out how easy it is to ssh to your Linux servers via the Terminal app.

67
article thumbnail

In-depth analysis of the lessons we learned while protecting gmail users

Elie

This post provides an in-depth analysis of the lessons we learned while protecting Gmail users and their inboxes. We felt it was about time to share the key lessons we learned the hard way while protecting Gmail for over a decade, so everyone involved in building an online product can benefit from them. To that effect, with the help of various Gmail safety leaders and long-time engineers, I distilled these lessons into a 25-minute talk for Enigma called “Lessons learned while protecting Gmail”.

article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

THE MOTIVATION AND DESIGN BEHIND AUTOGENERATED CHALLENGES

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

Know Thy[self] Environment

NopSec

Securing an environment is a constant game of cat-and-mouse. Safety measures of all kinds can (and should) be put in place to protect against malicious actors, downtime, and other business impacting variables. A production stack can be an extremely complex system with dozens of applications, databases, networking security groups, user permissions, etc., so what are some of these safety measures and practices that can be used, and whose responsibility is it to make sure the stack is safe?