Month: July 2017
-
Citrix NetScaler Unified Gateway Provides One Time Password (OTP), Natively
NetScaler Unified Gateway is a Single Sign-On and an SSL VPN solution. It provides consolidation of all remote access solutions and allows an end-to-end SSO across all applications. Read full news article on DABCC
-
Airborne Drones can be hijacked using $15 BBC’ Micro:bit
Cauquil presented his findings at the DEF CON hacking conference held in Las Vegas on Friday. As per his research, it was quite easy to configure a mini microcomputer to record keystrokes from a wireless keyboard. Read full news article on HackRead
-
Hackers Compromise Accounts of FireEye Threat Intelligence Analyst
A hacker or group of hackers claimed today to have breached FireEye’s Mandiant. In a Pastebin post, they claimed, “It was fun to be inside a giant company named ‘Mandiant’… Read full news article on SecurityWeek
-
Hacker claims to have stolen unreleased Game of Thrones episodes: report
may have become the latest Hollywood victim of cybercrime, according to a new report. On Monday, HBO chairman and CEO Richard Plepler sent an email out to HBO employees alerting and assuring them that the Time Warner-owned company is “working round the clock to protect our collective interests” with law enforcement and outside cybersecurity-focused organizations. Read…
-
Businesses don’t know how to protect against DDoS attacks
A distributed denial of service or DDoS is a method used to deny access for legitimate users of an online service. This service could be an e-commerce website, a bank, a SaaS application, or any other type of network service. Read full news article on BetaNews
-
The Justice Department wants to help you run a vulnerability disclosure program
These vulnerability disclosure programs, typically known as bug bounties, are typically created to allow participating parties to receive confidential information from independent researchers about software and hardware bugs that are affecting a company’s own systems or products. But the practice can sometimes run up against legal complications tied to the Computer Fraud and Abuse Act,…
-
Majority of Companies Get Failing Grades on Cybersecurity Performance
How do you think your cybersecurity investments and performance would hold up if they were graded? Do you think your company is doing an above average job in this area? Read full news article on IT Business Edge
-
International Threat Intelligence and Info-Sharing Surges in 2017
With cybersecurity a global issue, organizations worldwide are sharing information and threat intelligence—which usually requires language translations. In the last year, those translations have surged by triple digits, indicating robust information-sharing practices amid several notable cybercrime incidents. Read full news article on Infosecurity
-
DEF CON attendees make short work of electronic voting machines
Attendees to the 25th annual DEF CON hacking conference discovered weak spots in electronic voting machines that attackers could abuse in future compromises. For their first-ever Voting Machine Hacking Village, DEF CON’s organizers purchased 30 electronic voting machines off eBay and left them to the mercy of attendees’ hacking skills. Read full news article on…
-
Machine learning system to create invisible malwares – gym-malware
In the recent DEF CON Meet, technical director of security shop Endgame Hyrum Anderson disclosed a research paper on adapting API frameworks in building a malware that AV engines cannot identify. The core function of the system is to build a legitimate looking app by making minor changes to the original app that can avoid…
-
The HTTP series (Part 5): Security
If you followed along the HTTP series, you are ready now to embark on a journey of HTTP security. And a journey it will be, I promise Many companies have been a victim to security breaches. Read full news article on THE CODE PROJECT
●●●