June, 2014

article thumbnail

Lessons Learned from Data Breaches at Universities

NopSec

No industry is immune to IT security breaches. Recent breaches at Indiana University, Iowa State, the University of Maryland, and the University of North Dakota cumulatively impacted over 750,000 students, alumni, faculty and staff. In the case of higher educational institutions there is data exposure risk from personally identifiable information, such as social security numbers.

article thumbnail

Execute without read

Scary Beasts Security

A couple of years ago, during an idle moment, I wondered what we could do if we had the hardware CPU primitive of pages with permissions execute-only (i.e. no read and write): [link] It turns out that aarch64 has exactly such support. Here's support heading in to the Linux kernel: [link] The original idea was to defeat ROP by having all of the instructions randomized a bit on a per-install basis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Choose the right sharing icon to boost user engagement

Elie

What’s the best icon to entice people to share something through their social networks? It turns out to be the one used on Android. While this may contradict guidelines proposed by some designers, this conclusion is based on the results of a survey of 7,500 users.

48
article thumbnail

UK Government launches “Cyber Essentials” badge

Privacy and Cybersecurity Law

The UK Government has launched a new cyber security certification framework called “Cyber Essentials“ This is part of a continuing effort […].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Europe under Review: Part 8 of 8 – Individual Rights

Privacy and Cybersecurity Law

This week we look at the last topic in our series of “back to data privacy basics”: individual rights. Rights […].

article thumbnail

Canada’s Anti-Spam Law – not just for Canadians

Privacy and Cybersecurity Law

Canada’s Anti-Spam Law (CASL) enters into force on Canada Day, July 1. It was passed in 2010 as a “made-in-Canada” […].