Sat.Feb 03, 2018 - Fri.Feb 09, 2018

article thumbnail

How Long is Long Enough? Minimum Password Lengths by the World's Top Sites

Troy Hunt

I've been giving a bunch of thought to passwords lately. Here we have this absolute cornerstone of security - a paradigm that every single person with an online account understands - yet we see fundamentally different approaches to how services handle them. Some have strict complexity rules. Some have low max lengths. Some won't let you paste a password.

Passwords 242
article thumbnail

Living in a Smart Home

Schneier on Security

In " The House that Spied on Me ," Kashmir Hill outfits her home to be as "smart" as possible and writes about the results.

Spyware 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Polisis AI Reads Privacy Policies So You Don't Have To

WIRED Threat Level

Polisis, a machine-learning-trained tool, automatically produces readable charts of where your data ends up for any online service.

111
111
article thumbnail

AI's Future in Cybersecurity

eSecurity Planet

Industry experts from Coalfire, IEEE and more discuss how AI is shaping the future of IT security.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Weekly Update 73

Troy Hunt

I'm not entirely sure how I've gotten to the end of the week feeling completely wrung out whilst having only written the one thing, but here we are. In fairness though, I've put a heap of work into Pwned Passwords version 2 and finally completed the data set. There's some coding work and other logistics to complete before it goes live, but the plan for now is week after next so I'm looking forward to that.

Passwords 128
article thumbnail

Sensitive Super-Bowl Security Documents Left on an Airplane

Schneier on Security

A CNN reporter found.

180
180

LifeWorks

More Trending

article thumbnail

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Cloud Protection & Licensing

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Whether it’s varying protection levels, differing operational techniques and policies, or juggling multiple keys, managing more than one encryption system can quickly turn into a complex web that demands time, expertise and money to manage effectively.

article thumbnail

What is Cryptojacking and Why Is It a Cybersecurity Risk?

eSecurity Planet

Learn about this emerging attack method and how it's impacting organizations around the world in this eSecurityPlanet series.

Risk 87
article thumbnail

Water Utility Infected by Cryptocurrency Mining Software

Schneier on Security

A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack : hackers compromise computers and force them to mine cryptocurrency for them. This is the first time I've seen it infect SCADA systems, though. It seems that this mining software is benign, and doesn't affect the performance of the hacked computer.

article thumbnail

Scammers Are Stealing Bitcoin on Twitter With a Classic Scheme

WIRED Threat Level

A new twist on the classic Nigerian Prince scheme has jumped from gaming communities to Twitter. And now it's spreading.

111
111
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. But they rightly have concerns. As the report notes: The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.

article thumbnail

8 Nation-State Hacking Groups to Watch in 2018

Dark Reading

The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.

Hacking 82
article thumbnail

Cabinet of Secret Documents from Australia

Schneier on Security

This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is sold off cheaply. The deals can be even cheaper when the items in question are two heavy filing cabinets to which no-one can find the keys. They were purchased for small change and sat unopened for some months until the locks were attacked with a drill.

article thumbnail

Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

WIRED Threat Level

Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.

109
109
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce.

article thumbnail

Mastering Security in the Zettabyte Era

Dark Reading

Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.

article thumbnail

Poor Security at the UK National Health Service

Schneier on Security

The Guardian is reporting that "every NHS trust assessed for cyber security vulnerabilities has failed to meet the standard required.". This is the same NHS that was debilitated by WannaCry.

151
151
article thumbnail

Autosploit, Strava Heat Maps, and More Top Security News This Week

WIRED Threat Level

The memo release, Olympics hacking, and more of the week's top security news.

Hacking 108
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

IBM QRadar vs Splunk: Top SIEM Solutions Compared

eSecurity Planet

While both SIEM solutions are popular industry leaders, each has its strengths and weaknesses. We take a close look at both.

69
article thumbnail

Back to Basics: AI Isn't the Answer to What Ails Us in Cyber

Dark Reading

The irony behind just about every headline-grabbing data breach we've seen in recent years is that they all could have been prevented with simple cyber hygiene.

article thumbnail

Calling Squid "Calamari" Makes It More Appetizing

Schneier on Security

Research shows that what a food is called affects how we think about it. Research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

150
150
article thumbnail

Feds Take Down Infraud, a $530M Cybercrime Forum That Lasted 7 Years

WIRED Threat Level

Infraud may not have been as famous as dark web markets like the Silk Road and Alphabay, but it far outlasted both.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Lenovo Warns Critical WiFi Vulnerability Impacts Dozens of ThinkPad Models

Threatpost

Lenovo issued a security bulletin Friday warning customers of two previously disclosed critical Broadcom vulnerabilities impacts 25 models of its popular ThinkPad laptops.

article thumbnail

New Zero-Day Ransomware Evades Microsoft, Google Cloud Malware Detection

Dark Reading

Shurl0ckr, a form of Gojdue ransomware, was not detected on SharePoint or Google Drive.

article thumbnail

IANS 2018 New York Information Security Forum

NopSec

On Monday, March 19th, NopSec’s Co-founder & CTO, Michelangelo Sidagni will be speaking at this year’s IANS New York Information Security Forum. The Information Security Forum delivers an immersive curriculum with over 30+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the two-day Forum to gain actionable technical solutions and leadership insights focused on current and emerging challenges facing enterprise secur

article thumbnail

Time's Just About Up to Secure the 2018 Midterm Elections

WIRED Threat Level

The first primary for the 2018 midterm elections takes place March 6—and many states are still woefully underprepared.

104
104
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cisco Confirms Critical Firewall Software Bug Is Under Attack

Threatpost

Cisco has issued patches for the vulnerability, which could be up to seven years old.

article thumbnail

North Korean APT Group Employed Rare Zero-Day Attack

Dark Reading

Recent Adobe Flash exploit discovered against South Korean targets likely purchased, not developed by the hacking group.

Hacking 62
article thumbnail

In the DCShadow: How to Become a Domain Controller

NopSec

I have always been fascinated by lateral movement attacks possible within Windows Active Directory environments. Hosts are compromised; credentials extracted; lateral movement achieved until the final price for Windows Domain domination is captured: the credentials of one of the members of the Domain Admin Group. All these are techniques used most commonly by Red Teamers in large enterprises.

article thumbnail

Kali Linux 2018.1 Release

Kali Linux

Welcome to our first release of 2018, Kali Linux 2018.1. This fine release contains all updated packages and bug fixes since our 2017.3 release last November. This release wasn’t without its challenges–from the Meltdown and Spectre excitement (patches will be in the 4.15 kernel) to a couple of other nasty bugs , we had our work cut out for us but we prevailed in time to deliver this latest and greatest version for your installation pleasure.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!