February, 2013

article thumbnail

Exploiting 64-bit Linux like a boss

Scary Beasts Security

Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit.

article thumbnail

NopSec announces Executive Dashboard and new capabilities for Unified VRM software-as-a-service

NopSec

NopSec is pleased to announce the immediate availability of a new Executive Dashboard for Unified VRM. NopSec continues the rapid pace of innovation with new capabilities that provide customers with a graphical view of prioritized vulnerabilities and at-a glance progress toward fixes. Michelangelo Sidagni, Chief Technology Officer at NopSec, had this to say about the Executive Dashboard, “Our customers requested the ability to confidently gauge the vulnerabilities and risk at the present moment

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How pre-answered caller authentication helps prevent telephone bank fraud

Dark Reading

Prevention vs. clean up. It’s a security question all financial institutions should ask themselves. When it comes to providing a trusted customer environment, banks are typically better at resolving problems stemming from non-predictive authentication and fraud than preventing them. That’s because they continue to allow criminals to get their foot in the door.

Banking 40
article thumbnail

New EU rules on security

Privacy and Cybersecurity Law

If you Google “EU law on security”, you’ll find the EU Data Protection Directive near the top of the search […].

40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Credit Union Times: APT Will Get You

NopSec

In a recent article posted by Robert McGarvey in the Credit Union Times, Threat of the Week: APT Will Get You , he talks about advanced persistent threats, referencing the high-profile hacks at large news and media companies. NopSec’s Chief Technology Officer, Michelangelo Sidagni, contributed as an expert source for the article. “These are very sophisticated attackers,” said Michelangelo Sidagni, chief technology officer at NopSec, a New York security firm.

article thumbnail

Mistakes Companies Make When it Comes to Vulnerability Management

NopSec

We observe a common misconception that companies believe they are doing “vulnerability management” when, more often than not, they are simply performing “vulnerability identification”. I came across an insightful article written by Mark Hatton in SecurityWeek titled, “ Three Mistakes Companies Make When it Come to Vulnerability Management ”. Below are my own observations and comments on the topic.

More Trending

article thumbnail

Executive Order on Cybersecurity

NopSec

It looks like the Federal Government is getting serious about IT security. “Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems,” Mr. Obama said in his State of the Union address. See “ Obama Order Gives Firms Cyberthreat Information ” by the New York Times. My understanding is that the order targets improvements in information sharing and developing a risk framework and best practices, called the Cybersecurity

article thumbnail

As big banks and media wise up to cyber threat, New York’s security firms get noticed

NopSec

Crain’s New York Business, there is an article written by Matthew Flamm that discusses the pervasiveness of cyber attacks and the implications for New York companies. He makes an assertion that, “New York may become more hospitable to entrepreneurs as the number of engineers and investors attracted to the local tech scene grows.” The article then goes on to spotlight NopSec, “getting attention from large, well-reputed VCs” according to Steve Berg of RTP Ventures.

article thumbnail

Reduce your odds of needing incident response

NopSec

It has been hard to keep up with my news alert due to all the IT security headlines. “ Hackers in China Attacked The Times for Last 4 Months ” in the New York Times, and “ Chinese Hackers Hit U.S. Media ” in The Wall Street Journal. Cyber-attacks on the rise Although unfortunate and painful for the companies involved, high-profile security attacks and breaches are positive for the industry overall from the perspective of increasing the awareness and education of the need to employ an ongoi

article thumbnail

The EU Data Protection Regulation: timing

Privacy and Cybersecurity Law

As we’re all aware the new Data Protection Regulation (the Regulation) was announced to much bombast a little over a […].

40
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cookies: the UK ICO perspective

Privacy and Cybersecurity Law

We’re now well past the UK grace period for cookie compliance. But what are companies actually doing about this? Are […].