Sat.Dec 05, 2015 - Fri.Dec 11, 2015

article thumbnail

Understanding how tls downgrade attacks prevent email encryption

Elie

Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.

article thumbnail

‘Hacker Buba’: Failed extortion, what next?

Digital Shadows

An actor identifying itself as “Hacker Buba” recently claimed to have breached Invest Bank and posted purported customer and client. The post ‘Hacker Buba’: Failed extortion, what next? first appeared on Digital Shadows.

Banking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Speak Information Security to Executives: A CSO Perspective

NopSec

According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the information security risk and threats their organizations face. In commenting on the results, I stated this lack of awareness is “astounding.” In an age where data breaches crowd the daily headlines, lack of awareness is no longer an excuse for executives.

article thumbnail

Communicating Intelligence: The Challenge of Consumption

Digital Shadows

In my previous blog in this series I discussed the challenge of effectively communicating intelligence, and provided examples of how. The post Communicating Intelligence: The Challenge of Consumption first appeared on Digital Shadows.

40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Communicating Intelligence: Getting the message out

Digital Shadows

In my previous blog I discussed some of the challenges associated with communicating intelligence. In this follow up piece, I’ll. The post Communicating Intelligence: Getting the message out first appeared on Digital Shadows.

40