Sat.Aug 06, 2016 - Fri.Aug 12, 2016

article thumbnail

Is US Cyber Command preparing to become the 6th branch of the military?

Tech Republic Security

The Obama administration is considering elevating the status of US Cyber Command and separating it from the NSA, as cyberattacks and defense become a more integral part of modern warfare.

113
113
article thumbnail

Mayhem Wins DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Impact of the European General Data Protection Regulation (GDPR) on Adequacy and 5 Tips to Weather the Changes

Privacy and Cybersecurity Law

Recent media coverage has brought to light the internal deliberations of the Government of Canada regarding the possible impact of […].

Media 40
article thumbnail

The Hacking Teams: who they are, what they want, and how they hack

Tech Republic Security

Using remote malware, keyloggers, and DDoS attacks, hacking is a collaborative enterprise, and the sinister six can knock you offline and swipe your data.

Hacking 113
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Rio Olympics 2016: How to keep your employees safe from the biggest scams at the summer games

Tech Republic Security

As hackers target Olympic fans with phishing, ransomware, and other attacks, companies must ensure employees know cybersecurity best practices to avoid becoming a victim.

Scams 101
article thumbnail

Google makes Gmail safer with new security warnings to fight phishing

Tech Republic Security

On Wednesday, Google announced security warnings that display if an email sender is authenticated, in its latest initiative to welcome business users to the app platform.

More Trending

article thumbnail

Why haven't we seen the smartphone security apocalypse in iPhone and Android yet?

Tech Republic Security

Mobile phones present a ripe attack vector for hackers, but so far we've avoided the nightmares of Windows 95. Is it just a matter of time?

Mobile 98
article thumbnail

Safety first: The best use of the public cloud for analytics apps and data

Tech Republic Security

If concerns about data breaches have kept your organization from using the public cloud, read about use cases in which these worries should be a thing of the past.

article thumbnail

Bitcoin & Blockchain, Attorneys at Law: One firm's big switch

Tech Republic Security

International law firm Steptoe & Johnson expanded its blockchain practice to help clients in all industries manage Bitcoin in their businesses.

93
article thumbnail

Why Tor and privacy may no longer be synonymous

Tech Republic Security

Two academic researchers at Northeastern University have found weaknesses in Tor that indicates the potential for exploits of the platform.

78
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.

40
article thumbnail

Mayhem Wins DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

article thumbnail

MAYHEM WINS DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

article thumbnail

Mayhem Wins DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CASE STUDY: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.

40
article thumbnail

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.

52
article thumbnail

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.

40