Thursday, March 15, 2018
Why the local marketing vault is different
Saturday, March 3, 2018
Friday Squid Blogging: Searching for Humboldt Squid with Electronic Bait
Video and short commentary.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
Read my blog posting guidelines here.
from Friday Squid Blogging: Searching for Humboldt Squid with Electronic Bait
Malware from Space
Since you don't have enough to worry about, here's a paper postulating that space aliens could send us malware capable of destroying humanity.
Abstract: A complex message from space may require the use of computers to display, analyze and understand. Such a message cannot be decontaminated with certainty, and technical risks remain which can pose an existential threat. Complex messages would need to be destroyed in the risk averse case.
I think we're more likely to be enslaved by malicious AIs.
from Malware from Space
Friday, March 2, 2018
Explained: SQL injection
SQL injection is one of the most common attacks against businesses, with a high rate of success. So what can you do to prevent them?
Categories: Tags: breachcodedrop tableinjectionphp. aspquerysqlSQL injection |
The post Explained: SQL injection appeared first on Malwarebytes Labs.
The post Explained: SQL injection appeared first on Security Boulevard.
from Explained: SQL injection
More people dying in a fire: petroleum-based skin products to blame
An investigation has started to reveal that the practice of putting a distillate of petroleum (parrafin) on your body can lead to a very painful fiery death. Firefighter Chris Bell, who is a watch commander with West Yorkshire Fire and Rescue Service, says the actual number of deaths linked to the creams is likely to […]
The post More people dying in a fire: petroleum-based skin products to blame appeared first on Security Boulevard.
from More people dying in a fire: petroleum-based skin products to blame
Security Boulevard’s 5 Most-Read Stories for the Week, Feb. 26-Mar. 2
Another week has gone by with our fair share of security stories. This week Flight Simulator Passwords, IoT Security, and PCI Compliance and GDPR dominated the headlines, as well as the Recent Flash Zero-Day attacks. Missed out on any of the news this week? Here are the five most-read stories on Security Boulevard to help..
The post Security Boulevard’s 5 Most-Read Stories for the Week, Feb. 26-Mar. 2 appeared first on Security Boulevard.
from Security Boulevard’s 5 Most-Read Stories for the Week, Feb. 26-Mar. 2
PhishLabs Launches Future of Cybersecurity Scholarship Program
Today, PhishLabs is proud to announce the launch of our new annual scholarship program that is focused on furthering professionals interested in the growing world of cybersecurity. Dubbed the Future of Cybersecurity Scholarship Program, we will be able to help fuel student’s growth into one of the most in-demand industries.
The post PhishLabs Launches Future of Cybersecurity Scholarship Program appeared first on Security Boulevard.
from PhishLabs Launches Future of Cybersecurity Scholarship Program
Phishing Phish, Unicode Style
Graham Cluley, writing at his eponymous blog, educates us in protecting the browser from Unicode Phishing Attacks. Today's MustRead.
The post Phishing Phish, Unicode Style appeared first on Security Boulevard.
from Phishing Phish, Unicode Style
Is Google IdP a Directory Service?
Google has a long history of taking up arms against Microsoft with services like Gmail and G Suite. So, it makes sense that IT admins are wondering if Google’s next...
The post Is Google IdP a Directory Service? appeared first on JumpCloud.
The post Is Google IdP a Directory Service? appeared first on Security Boulevard.
from Is Google IdP a Directory Service?
Global Cost of Cybercrime on the Rise
Introduction Cyber-criminal activities worldwide continue to increase, in many cases, organized crime rings operate worldwide, and their profits are very high. The consolidation of a model of sales...
Go on to the site to read the full article
The post Global Cost of Cybercrime on the Rise appeared first on Security Boulevard.
from Global Cost of Cybercrime on the Rise
6 Tips for Securing Privileged Accounts in the Enterprise
Protecting privileged accounts and actively responding to any potential compromises has become a critical initiative for many CISOs. Stolen credentials are at the heart of most all modern attacks and breaches. Attackers can easily obtain credentials via phishing attacks, brute force, keyloggers, pass-the-hash techniques, or using a database of previously stolen credentials. And once an account is compromised, the attacker can see and do anything that is allowed for that user or account.
The post 6 Tips for Securing Privileged Accounts in the Enterprise appeared first on Security Boulevard.
from 6 Tips for Securing Privileged Accounts in the Enterprise
Top 6 iPhone Hacking Tools for Mobile Penetration Testers
As your career in cybersecurity or computer forensics progresses, you will no doubt come across one of Apple’s most popular devices ever made: the Apple iPhone. In this article, we outline the use...
Go on to the site to read the full article
The post Top 6 iPhone Hacking Tools for Mobile Penetration Testers appeared first on Security Boulevard.
from Top 6 iPhone Hacking Tools for Mobile Penetration Testers
Another Ransomware Variant Strikes Colorado DOT Days after Initial Attack
Colorado’s Department of Transportation (CDOT) has suffered an infection from another variant of the same ransomware family that attacked it just days earlier. On 1 March, a variant of SamSam ransomware targeted employees at CDOT. The attack didn’t hamper the Department’s Traffic Operations Center, the Colorado Governor’s Office of Information Technology (OIT) told KUSA-TV. But […]… Read More
The post Another Ransomware Variant Strikes Colorado DOT Days after Initial Attack appeared first on The State of Security.
The post Another Ransomware Variant Strikes Colorado DOT Days after Initial Attack appeared first on Security Boulevard.
from Another Ransomware Variant Strikes Colorado DOT Days after Initial Attack
Thursday, March 1, 2018
Russians Hacked the Olympics
Two weeks ago, I blogged about the myriad of hacking threats against the Olympics. Last week, the Washington Post reported that Russia hacked the Olympics network and tried to cast the blame on North Korea.
Of course, the evidence is classified, so there's no way to verify this claim. And while the article speculates that the hacks were a retaliation for Russia being banned due to doping, that doesn't ring true to me. If they tried to blame North Korea, it's more likely that they're trying to disrupt something between North Korea, South Korea, and the US. But I don't know.
from Russians Hacked the Olympics
1 in 50 publicly readable Amazon buckets are also writable – and that’s a data disaster waiting to happen
Now is not the time to dilly-dally. If you haven’t already properly secured the Amazon Web Services S3 servers (known as “buckets”) storing your sensitive data in the cloud then your business has no time to lose.
The post 1 in 50 publicly readable Amazon buckets are also writable – and that’s a data disaster waiting to happen appeared first on Security Boulevard.
from 1 in 50 publicly readable Amazon buckets are also writable – and that’s a data disaster waiting to happen
Tripwire Patch Priority Index for February 2018
Tripwire’s February 2018 Patch Priority Index (PPI) brings together the top vulnerabilities from Microsoft, Adobe, and Oracle. BULLETIN CVE Adobe Flash APSB18-03 CVE-2018-4878, CVE-2018-4877 Microsoft Browser CVE-2018-0763, CVE-2018-0839, CVE-2018-0771 Microsoft Scripting Engine CVE-2018-0840, CVE-2018-0860, CVE-2018-0861, CVE-2018-0866, CVE-2018-0838, CVE-2018-0859, CVE-2018-0857, CVE-2018-0856, CVE-2018-0835, CVE-2018-0834, CVE-2018-0837, CVE-2018-0836 Microsoft Office CVE-2018-0853, CVE-2018-0851 Microsoft Outlook CVE-2018-0850, CVE-2018-0852 Microsoft SharePoint CVE-2018-0864, […]… Read More
The post Tripwire Patch Priority Index for February 2018 appeared first on The State of Security.
The post Tripwire Patch Priority Index for February 2018 appeared first on Security Boulevard.
from Tripwire Patch Priority Index for February 2018
Facebook’s Ad Confirmation Process Won’t Stop the Russians
Without a doubt, if you are on the advertising services side of the Facebook house you’ve been sitting in a kitchen with the oven on broil and all four burners on high—the kitchen is hot. The social network is being viewed by many as culpable in allowing the Russian intelligence services to use their advertising..
The post Facebook’s Ad Confirmation Process Won’t Stop the Russians appeared first on Security Boulevard.
from Facebook’s Ad Confirmation Process Won’t Stop the Russians
AskRob: Does Tor let government peek at vuln info?
On Twitter, somebody asked this question:
@ErrataRob comments?— E. Harding🇸🇾, друг народа (anti-Russia=block) (@Enopoletus) March 1, 2018
Discussion
Conclusion
The post AskRob: Does Tor let government peek at vuln info? appeared first on Security Boulevard.
from AskRob: Does Tor let government peek at vuln info?
Data Integrity: The Next Big Challenge
Many of us in the cybersecurity world have followed this general mantra: protect the data, protect the data, protect the data. It’s a good mantra to follow, and ultimately that is what we are all trying to do. But there are different ways to protect data. The obvious method is to make sure it doesn’t […]… Read More
The post Data Integrity: The Next Big Challenge appeared first on The State of Security.
The post Data Integrity: The Next Big Challenge appeared first on Security Boulevard.
from Data Integrity: The Next Big Challenge
Why Cyber Security is the New Health and Safety
Many people view the Health and Safety at Work Act 1974 as unnecessary and burdensome, but its introduction has had a dramatic impact on reducing accidents in the workplace, particularly within industrial settings. Today, it controls the safety of equipment used on process plants, the time professional drivers may spend behind the wheel, and even […]… Read More
The post Why Cyber Security is the New Health and Safety appeared first on The State of Security.
The post Why Cyber Security is the New Health and Safety appeared first on Security Boulevard.
from Why Cyber Security is the New Health and Safety
Book highlights: “Hit refresh” by Satya Nadella
Very telegraphically, these are my impressions after reading "Hit Refresh":
- Impressive human being. He tells you how his personal experiences have shaped him, not only personally but also professionally.
Some of the ideas worth exploring that appear in the book are the following:
- Leadership is definitely an art.
- Empathy and compassion are skills leaders should have.
- We need to work comfortably with change and impermanence.
- "To be a leader here, oyur job is to find rose petals in a field of shit".
- The leader needs to link every employee's passion with the raison d'etre of the company.
- A sustainable ecosystem is required for a company to survive.
- Provide the environment for employees to find their personal balance.
- Other important topics: The link of technology, freedom and customers.
- The responsibility of a technology company with the world and the human beings.
- Most importantly, he also makes mistakes and learn from them.
- He is aware of the need to equally treat women and men in technology companies.
Learning every day |
The post Book highlights: “Hit refresh” by Satya Nadella appeared first on Security Boulevard.
from Book highlights: “Hit refresh” by Satya Nadella
Computer Forensics: Online Gaming and VR Forensics
Introduction With the expansion of technology, such as virtual reality simulators, it’s only natural that with progress comes setbacks, especially when it comes to security breaches. With the VR...
Go on to the site to read the full article
The post Computer Forensics: Online Gaming and VR Forensics appeared first on Security Boulevard.
from Computer Forensics: Online Gaming and VR Forensics
Computer Forensics: ICS/SCADA Forensics
Overview Control system security is the practice of using security methods to prevent intentional or unintentional interference with the operation of industrial automation and control systems. These...
Go on to the site to read the full article
The post Computer Forensics: ICS/SCADA Forensics appeared first on Security Boulevard.
from Computer Forensics: ICS/SCADA Forensics
Computer Forensics: Big Data Forensics
What is Big Data? In the computing world, there’s data—and then there’s big data. Described as a collection of information from traditional and digital sources of all kinds, big data is the pool of...
Go on to the site to read the full article
The post Computer Forensics: Big Data Forensics appeared first on Security Boulevard.
from Computer Forensics: Big Data Forensics