General

E8a348a30367b70eb2fa4da3214583c0

Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Oscar Marquez

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls

November 04, 2014 Added by:Electronic Frontier Foundation

In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Cracking Wifi Passwords With Kali Linux

October 29, 2014 Added by:Javvad Malik

In under a dozen commands you can potentially grab a wifi password, which is script kiddie territory. The real question goes a lot deeper what can be done with this information?

Comments  (1)

F45df53d99605d46f5ae32b7bed9fe22

The True Cost of a Data Breach

October 20, 2014 Added by:Thu Pham

iThemes, a WordPress (WP) security provider, was recently breached and approximately 60,000 clients in their membership database had a slew of information stolen, including usernames, passwords, IP addresses and more. But, what is of particular concern is the fact that the company was storing their members’ passwords in plain text, which they admitted was in error in a 

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Spying Flashlight Apps Reveal User Inattentiveness to Cyber Security

October 15, 2014 Added by:Tripwire Inc

What we often don’t realize, however, is the amount of personal information our phones actually store and how easily accessible we make this data, not only for ourselves, but for others, too. A recent Android study proves many of us are likely not careful enough.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Industry 4.0: Flexible Production Needs Secure Networking

September 29, 2014 Added by:Patrick Oliver Graf

When IT departments are not consulted, gaps in network security could appear.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Are Rogue Cell Towers Snooping On Your Calls?

September 08, 2014 Added by:Tripwire Inc

There are 17 bogus cellphone towers operating across the US that could be used to snoop on, and even hijack passing calls, texts and other communications, according to an article published in Popular Science last week.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader

August 05, 2014 Added by:Patrick Oliver Graf

Thanks to what some say are restrictive Bring-Your-Own-Device (BYOD) and remote access policies, some mobile devices users in the corporate world are rebelling against BYOD – specifically, they don’t want their personal mobile devices to be controlled by their employer’s IT administrators.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Tesla Cars Hackable – Protected by 6 character Password

April 02, 2014 Added by:Dan Dieterle

Black Hat Asia presenter and security researcher Nitesh Dhanjani explained last week that the car could be locked and unlocked by cracking a short password.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Android Webview Exploit Tutorial

March 06, 2014 Added by:Dan Dieterle

Around 70% of all Android devices in the field are subject to a Javascript exploit that could allow an attacker remote access to your phone by doing nothing more than surfing to a malicious page or scanning in a malicious QR Code.

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Vehicle VPNs, Part One: The ‘Connected Car’

October 28, 2013 Added by:Patrick Oliver Graf

Remember, anything that is connected to the Internet is a potential target for hackers and cyber criminals. If they’ll hack your smartphone, tablet or laptop computer, who is to say they won’t try to do the same to your car?

Comments  (3)

F66c1a87a8db2cb584b4e06e93a84ce3

“SIGINT” on 802.11b/g/n Distributed SDR Station - Deployment Example

August 15, 2013 Added by:Mikko Jakonen

“SIGINT” on 802.11b/g/n distributed SDR station - deployment example is overview of using SDR (Software Defined Radio) receiver system deployment to capture 802.11b/g/n “traffic”, signals on frequency range 2412- 2484 MHz.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »