December, 2013

article thumbnail

Ultimate Pentesting PwnBox (2013) - Utilite Pro

Kali Linux

We’re always on the lookout for and interesting ARM hardware for Kali Linux. Whether it’s a Galaxy Note or a USB stick sized SS808 , we want to see Kali run on it. You can therefore imagine our excitement, when we first laid our eyes on the Utilite pro. Utilite Pro is a quad core ARM cortex-A9 machine with up to 4 GB of RAM, up to 512 GB mSATA SSD , HDMI and DVI-D output, dual (2x) 1GB nics , a built in wireless card and 4 USB ports.

article thumbnail

vtable protections: fast and thorough?

Scary Beasts Security

Recently, there's been a reasonable amount of activity in the vtable protection space. Most of it is compiler-based. For example, there's the GCC-based virtual table verification, aka. VTV. There are also multiple experiments based on clang / LLVM and of course MSVC's vtguard. In the non-compiler space, there's Blink's heap partitioning, enabled by PartitionAlloc.

50
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TCPA Lawsuits Explosion

Privacy and Cybersecurity Law

The number of class-action lawsuits brought under the Telephone Consumer Protection Act (TCPA) against businesses that regularly call consumers for […].

article thumbnail

EU Data Protection Regulation hits a political issue

Privacy and Cybersecurity Law

Under the draft EU Data Protection Regulation, the proposal is to create a “one-stop-shop” for regulation. This means that data […].

40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New South African data privacy law

Privacy and Cybersecurity Law

On the day after Nelson Mandela’s passing, we wanted to highlight the long awaited South African law on data protection which […].

article thumbnail

EU/US Safe Harbor … spotted alive!

Privacy and Cybersecurity Law

The European Commission has announced that it will not kill off Safe Harbor. Instead it has published 13 recommendations to […].

40

More Trending

article thumbnail

Wave of recent Massachusetts ZIP code cases following change in law and California’s lead

Privacy and Cybersecurity Law

As anticipated, in the wake of the Supreme Judicial Court ruling on March 11, 2013, in Tyler v. Michaels Stores, […].

40
article thumbnail

6 Month Countdown to Canada’s Anti-Spam Legislation (CASL)

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) has been a long time coming. The Government of Canada announced today that most of CASL’s provisions […].