August, 2015

article thumbnail

Kali Linux 2.0 Release - Sana

Kali Linux

Our Next Generation Penetration Testing Platform We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new [Kali Linux Dojo](](/docs/development/dojo-mastering-live-build/), which was a blast. With the help of a few good people , the Dojo rooms were set up ready for the masses - where many generated their very own Kali 2.0 ISOs for the first time.

article thumbnail

EU close to doing a deal on Safe Harbor

Privacy and Cybersecurity Law

It has been reported today by the Reuters news agency that the European Commission is working with the US on […].

52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How phishing works

Elie

Phishing is a social-engineering attack where the attacker entice his victims to give-up their credentials for a given website by impersonating it. Believe it or not phishing campaigns are well organized and follow a very strict playbook. This post aim at shedding some light on how phishing campaign works under the hood, showcase which infrastructure phishers use to steal users credentials and provide advice on how to defend against it.

article thumbnail

Protect your Google Drive and DropBox accounts!

Spinone

Beware! The latest news of cyber security industry is more than disturbing. According to Imperva Hacker Intelligence Initiative report – a well known cyber security company – cybercriminals may now easily get access to all users’ files in cloud services such as Google Drive , Microsoft OneDrive, Dropbox, and Box, if they are able to get into the computer, on which the clients of these services are installed.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Subject Access Request risk: limits in sight?

Privacy and Cybersecurity Law

A recent High Court case took a very robust stance on the issue of DSARs (Data Subject Access Requests) being […].

Risk 40
article thumbnail

The slow death of EU forum shopping

Privacy and Cybersecurity Law

Forum shopping (i.e. where businesses pick and choose the most privacy-friendly EU state to set up shop) has always been […].

40