December, 2013

article thumbnail

Ultimate Pentesting PwnBox (2013) - Utilite Pro

Kali Linux

We’re always on the lookout for and interesting ARM hardware for Kali Linux. Whether it’s a Galaxy Note or a USB stick sized SS808 , we want to see Kali run on it. You can therefore imagine our excitement, when we first laid our eyes on the Utilite pro. Utilite Pro is a quad core ARM cortex-A9 machine with up to 4 GB of RAM, up to 512 GB mSATA SSD , HDMI and DVI-D output, dual (2x) 1GB nics , a built in wireless card and 4 USB ports.

article thumbnail

vtable protections: fast and thorough?

Scary Beasts Security

Recently, there's been a reasonable amount of activity in the vtable protection space. Most of it is compiler-based. For example, there's the GCC-based virtual table verification, aka. VTV. There are also multiple experiments based on clang / LLVM and of course MSVC's vtguard. In the non-compiler space, there's Blink's heap partitioning, enabled by PartitionAlloc.

50
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Data Protection Regulation hits a political issue

Privacy and Cybersecurity Law

Under the draft EU Data Protection Regulation, the proposal is to create a “one-stop-shop” for regulation. This means that data […].

40
article thumbnail

Wave of recent Massachusetts ZIP code cases following change in law and California’s lead

Privacy and Cybersecurity Law

As anticipated, in the wake of the Supreme Judicial Court ruling on March 11, 2013, in Tyler v. Michaels Stores, […].

40
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New South African data privacy law

Privacy and Cybersecurity Law

On the day after Nelson Mandela’s passing, we wanted to highlight the long awaited South African law on data protection which […].

article thumbnail

Cy Pres Settlements – Justice Roberts’ opinion in the Facebook Beacon privacy class-action litigation

Privacy and Cybersecurity Law

The appeal to the US Supreme Court took an interesting turn in the Facebook Beacon litigation (Marek v. Lane). The […].

40

LifeWorks

More Trending

article thumbnail

EU/US Safe Harbor … spotted alive!

Privacy and Cybersecurity Law

The European Commission has announced that it will not kill off Safe Harbor. Instead it has published 13 recommendations to […].

40
article thumbnail

6 Month Countdown to Canada’s Anti-Spam Legislation (CASL)

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) has been a long time coming. The Government of Canada announced today that most of CASL’s provisions […].