Chris Konrad, the Cyber Security Practice Manager for World Wide Technology wrote an an excellent article around vulnerability scanning versus penetration testing. This is a concept I find many people using interchangeably, or not truly understand what it means. Click here to see the original article. We all know you are only as strong as your weakest link, and how true that is when it comes.
I posted about the OPM breach a few weeks ago HERE and the resignation of the director Katherine Archuleta HERE. Well it looks like the original estimates of lost records from this breach were a few million off. The original post from the washingtonpost can be found HERE. One of the scariest parts of the massive cybersecurity breaches at the Office of Personnel Management just got worse:.
Andy Greenberg at Wired wrote a great article around car hacking. source: http://www.wired.com/wp-content/uploads/2015/09/GettyImages-168859495-582×388.jpg OVER THE LAST summer, the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet connections, intercepted smartphone signals, and even insurance dongles plugged.
WordPress is a free open source content management system. Thousands of Web sites run WordPress, and it is considered the top blogging platform in the world. According to Usage Statistics and Market Share of Content Management Systems for Websites (W3Techs. January 2015. Retrieved January 2015), 23% of the world’s top 10 million Web sites use WordPress. So…let’s hack WordPress! We are.
Written by Keith Rayle and Aamir Lakhani As the Ashly Madison storm continues unabated, although the truly damaging winds (for the time being, at least) seem to have diminished somewhat. Things are quieting down. This might simply be a lull in the storm before the data is digested and presented to the public in a more consumable format. We need humor. Serious humor. At this point is seems.
Tim Pierson, president of DataSentry and Joe McCray, legendary security pro and hacker as well as the current Chief Security Officer for Secure Ninja have been working on a brand new, exciting project. Written by Tim Pierson I’ve been working on a project for a while now and I can finally tell you about it. The Problem Small and medium sized businesses often do not have the knowledge to.
Let me say this before I get started: Skyfall is my favorite James Bond movie to date. The camera shots are beautiful, the backdrops epic in nature, the acting is wonderful, and it has some incredible action sequences. However, it is not exempt from being analyzed in a humorous way due to its insane, over the top, and, at times…ridiculous plot. The biggest issue I see with the movie is.
I know there are tons of articles on the Ashley Madison madness however a new one posted by Gizmodo is just insane regarding the level of scam. Apparently (according to Gizmodo) men accessing the Ashely Madison website to have an affair were actually talking to a artificial program known as Sensuous Kitte designed to manage fake female accounts. New members would feel like desperate women.
There has been a lot of recent news about the recent paper from Mandiant on a backdoor malware named SYNful Knock. Some headlines make it seem like this is a major day zero however here is the real story … its not a product vulnerability. See the Cisco blog post on this HERE and PSIRT announcement HERE regarding what is really vulnerable and how to handle it. The key paragraph to note.
Click here to download the complete white paper Everyone knows it’s not just the newest adversary that makes the headlines. Sometimes it’s an old adversary that finds a new trick, or registers a new domain to find a way around the “bad guy” lists for a day, a week, or even months before getting identified and labeled onto the IP reputation blacklists. Some of the more epic hacks.