Recent Google News
-
Cyber security news round-up - Digital HealthDecember 13, 2019
-
NSW govt told to urgently improve cyber security resilience - iTnewsDecember 13, 2019
-
Cybersecurity Frameworks Around the World - MSSP AlertDecember 13, 2019
-
Pentagon to roll out new cyber-security certifications for industry next month - IHS Jane's 360December 12, 2019
-
12 days of cybersecurity: A mini-series - Putman MediaDecember 12, 2019
Latest Episode 6/23/2019
Brian Krebs
-
The Great $50M African IP Address HeistA top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secr ...
Newsletter
ThreatPost.com
-
Critical Remote Code-Execution Bugs Threaten Global Power PlantsSeventeen bugs could be exploited to stop electrical generation and cause malfunctions at power plants.
Andrew Hay
-
Tornados, Necessity, and the Evolution of Mitigating ControlsAccording to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the en ...
Adam Shostck
-
Encryption & Privacy Policy and TechnologyThe Open Technology Institute has an Open Letter to Law Enforcement in the U.S., UK, and Australia: Weak Encryption Puts Billions of Internet Users at Risk. (press release, letter.) I am pleased to be one of the signers. In closely related news, nominations for the 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing…
Dan Kaminsky
-
Hacking the Universe with Quantum EncraptionLadies and Gentlemen of the Quantum Physics Community: I want you to make a Pseudorandom Number Generator! And why not! I’m just a crypto nerd working on computers, I only get a few discrete bits and a handful of mathematical operations. You have such an enormous bag of tricks to work with! You’ve got […]
Elie Bursztein
-
Protecting accounts from credential stuffing with password breach alertingProtecting accounts from credential stuffing attacks remains burdensome due to an asymmetry of know ...
Graham Cluley
-
Waco water bill attack just the latest in a wave of Click2Gov breaches
The City of Waco has warned residents that their online payments for water services may have been intercepted by hackers who stole credit card details.
Read more in my article on the Tripwire State of Security blog.
Hacking Articles
-
Multiple Ways to Install Kali
In this article, we will learn how to open the magic box of ethical hacking. Can you guess the name of that box? Ok, I tell you the name is KALI the magic box of ethical hacking. Through this article, you will learn the installation of Kali Linux on different platforms along with the features.... Continue reading →
The post Multiple Ways to Install Kali appeared first on Hacking Articles.
Holistic InfoSec
-
Moving blog to HolisticInfoSec.iotoolsmith and HolisticInfoSec have moved.I've decided to consolidate all content on one platform, namely an R markdown blogdown site running with Hugo for static HTML creation. My frustration with Blo ...
Blogroll
- Akamai
- Andrew Hay
- Ars Technica
- Asher Security
- BH Consulting IT Security Watch
- Bleeping Computer
- Brian Krebs
- Check Point Software
- CIO
- CSO Online
- Dark Reading
- Dr. Eric Cole
- Errata Security
- FocusPoint Technologies
- Forbes
- Fox IT Security Blog
- Google Online Security Blog
- Graham Cluley
- Help Net Security
- Hot For Security
- InfoSecurity Magazine
- IT Pro Portal
- IT Security
- Kaspersky Labs
- Kevin Townsend’s IT Security
- Liquidmatrix Security Digest
- Malwarebytes Labs
- Mashable
- McGrew Security
- Motherboard Vice
- Naked Security Blog
- Network Computing
- Palo Alto Networks
- Paul’s Security Weekly
- PCMag’s Security Watch
- Peerlyst
- Privacy Paradox from Lawfare
- SANS Institute AppSec Blog
- SC Magazine
- Schneier on Security
- Security Affairs
- Security Bloggers Network
- Security Ledger
- Securosis
- Softpedia
- Tao Security
- Techcrunch
- TechRepublic
- Techworld Security
- The Guardian Information Security Hub
- The Hacker News
- The Register
- ThreatTrack Security
- Troy Hunt
- Wired
- Wombat Security Blog
- Zero Day
Tripwire.com
-
Three Men Arrested in Connection to $722M Cryptomining SchemeLaw enforcement arrested three men for their participation in a cryptomining scheme that defrauded investors of $722 million. On December 10, 2019, the U.S. Attorney’s Office for the District of New ...
Jeff Soh
-
What About Automation?Better analysts or better automation? Which way is the path forward? Have we really reached a point where human analysis is no longer viable or scalab ...
Liquidmatrix
-
Exploring Legacy Unix Security Issues
Sometimes after looking at web application security, IoT botnets, and various malware I long for the pre-2000 hacking days. Where, instead of looking for XSS or SQL injection vulnerabilities, you would be hunting for server-side vulnerabilities. This summer, I was gifted an SGI Indy R5000. I’d mentioned on Twitter a while back that I’d love […]
The post Exploring Legacy Unix Security Issues appeared first on Liquidmatrix Security Digest.
Marco Ramilli
- Nothing to display ...
Matt Flynn
-
Improve Security by Thinking Beyond the Security RealmIt used to be that dairy farmers relied on whatever was growing in the area to feed their cattle. They filled the trough with vegetation grown right on the farm. They probably relied heavily on whatev ...
Notice Bored
-
NBlog Dec 10 - a brutal lesson in risk managementYesterday's volcanic eruption on White Island is headline news around the globe, a tragedy that sadly resulted in several deaths, currently estimated at 13. Also, yesterday in NZ there were ...
Robert Penz Blog
-
Proxmox Container with Debian 10 does not work after upgradeI just did an apt update / upgrade of a Debian 10 container and restarted it afterwards and got following: # pct start 105 Job for pve-container@105.service failed because the control process exited with error code. See "systemctl status pve-container@105.service" and "journalctl -xe" for details. command 'systemctl start pve-container@105' failed: exit code 1 with a […]
Digital Guardian
-
Why Behavioral Analysis Should Play a Role in Data Protection Programs
Ignoring the value in behavioral analytics could leave your data vulnerable to attack. We asked 18 security experts why behavioral analysis should factor into your data protection program.
Roger McClinton
-
Beginner’s Mind
Shoshin is a word from Zen Buddhism meaning “beginner’s mind.” It refers to having an attitude of openness, eagerness, and a lack of preconceptions when studying a subject, even when studying at an advanced level. As IT people we aren’t always known for our attitude of openness, eagerness and lack of preconceptions. Its an easy ...
Continue reading ‘Beginner’s Mind’ »
The post Beginner’s Mind appeared first on Roger's Information Security Blog.
Bruce Schneier’s blog
-
Scaring People into Supporting BackdoorsBack in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly differently. This is me from 2005: Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public into allowing the government to...
Security Through Education
-
Ep. 124 – Cognitive Energy and Critical Thinking with Dr. Christopher DwyerWelcome to another episode of The Social-Engineer Podcast! Host, Christopher Hadnagy, interviews Dr. Christopher Dwyer, a psychologist who has been researching critical thinking and cognitive energy t ...
TaoSecurity
-
Seven Security Strategies, SummarizedThis is the sort of story that starts as a comment on Twitter, then becomes a blog post when I realize I can't fit all the ideas into one or two Tweets. (You know how much I hate Tweet threads, and ho ...
Tech Wreck InfoSec Blog
Naked Security
-
Facebook refuses to break end-to-end encryptionCongress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or it'll be forced to. ...
Troy Hunt
-
Generated Passwords, UX and Security Absolutism
Last month, Disney launched their new streaming service Disney+; "The best stories in the world, all in one place", apparently. The service was obviously rather popular because within days the tech (and mainstream) headlines were proclaiming that thousands of hacked Disney+ accounts were already for sale on hacking forums. This
Uncommon Sense Security
-
Blog-ified TweetstormI dumped this on Twitter as a tweetstorm, but it is worth sharing here in one place. Those who have followed me for a while have probably noticed that I rarely get technical here anymore. My world, a ...
FocusPoint Blog Posts
-
Increase ROI on User Awareness TrainingHow much risk reduction has your user awareness training provided to your organization? Tough question for most people to answer. The solution - take a baseline metric before providing the user awaren ...
-
IoT Evolution, Revolution or Confusion?The IoT (Internet of Things) evolution is occurring in business and personal lives, the revolution is amazing as it transforms the way we think and act, and the confusion around how to secure IoT is r ...
-
Is Identity the New Perimeter in Security?I’ve recently heard the phrase, “identity is the new perimeter” as it relates to information security. That said, I’ve also heard the same about endpoints, artificial intelligence, email, you ...
- Podcast 3_2_2019
[Music] welcome to the cyber Chronicles my name’s Brian Stevenson and I am your host this week is a pretty incredible episode we’re going to talk about something that impact worldwide cybersecurity we’re going to talk about latest vlog wind var we’re going to talk about turbo tax has some issues recently and new tax […]
Most Important Cyber Stories Per Month
Dark Reading
- Android App Analysis Uncovers Seasonal Shopping Risk
- Cyberattacks on Retailers Could Increase 20% this Holiday Season
- The Most, Least Insecure US Cities for SMBs
- Gallium: The Newest Threat Group on Microsoft's Radar
- Get Organized Like a Villain
- Thanks, Larry!
- Smart Building Security Awareness Grows
- Lessons from the NSA: Know Your Assets
- Waking Up to Third-Party Security Risk
- Trickbot Operators Now Selling Attack Tools to APT Actors
Newsletter
Recent Posts
- Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil September 16, 2019
- Russian hackers are infiltrating companies via the office printer August 5, 2019
- Increase ROI on User Awareness Training June 26, 2019
- Two years after WannaCry, a million computers remain at risk May 13, 2019
- Fort Bragg cut power for thousands to test ‘real-world reactions’ to a cyber-attack April 30, 2019
Thank you!
— briankrebs (@briankrebs) July 30, 2018