February, 2013

article thumbnail

Exploiting 64-bit Linux like a boss

Scary Beasts Security

Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit.

article thumbnail

NopSec announces Executive Dashboard and new capabilities for Unified VRM software-as-a-service

NopSec

NopSec is pleased to announce the immediate availability of a new Executive Dashboard for Unified VRM. NopSec continues the rapid pace of innovation with new capabilities that provide customers with a graphical view of prioritized vulnerabilities and at-a glance progress toward fixes. Michelangelo Sidagni, Chief Technology Officer at NopSec, had this to say about the Executive Dashboard, “Our customers requested the ability to confidently gauge the vulnerabilities and risk at the present moment

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The EU Data Protection Regulation: timing

Privacy and Cybersecurity Law

As we’re all aware the new Data Protection Regulation (the Regulation) was announced to much bombast a little over a […].

40
article thumbnail

How pre-answered caller authentication helps prevent telephone bank fraud

Dark Reading

Prevention vs. clean up. It’s a security question all financial institutions should ask themselves. When it comes to providing a trusted customer environment, banks are typically better at resolving problems stemming from non-predictive authentication and fraud than preventing them. That’s because they continue to allow criminals to get their foot in the door.

Banking 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Credit Union Times: APT Will Get You

NopSec

In a recent article posted by Robert McGarvey in the Credit Union Times, Threat of the Week: APT Will Get You , he talks about advanced persistent threats, referencing the high-profile hacks at large news and media companies. NopSec’s Chief Technology Officer, Michelangelo Sidagni, contributed as an expert source for the article. “These are very sophisticated attackers,” said Michelangelo Sidagni, chief technology officer at NopSec, a New York security firm.

article thumbnail

Mistakes Companies Make When it Comes to Vulnerability Management

NopSec

We observe a common misconception that companies believe they are doing “vulnerability management” when, more often than not, they are simply performing “vulnerability identification”. I came across an insightful article written by Mark Hatton in SecurityWeek titled, “ Three Mistakes Companies Make When it Come to Vulnerability Management ”. Below are my own observations and comments on the topic.

More Trending

article thumbnail

Executive Order on Cybersecurity

NopSec

It looks like the Federal Government is getting serious about IT security. “Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems,” Mr. Obama said in his State of the Union address. See “ Obama Order Gives Firms Cyberthreat Information ” by the New York Times. My understanding is that the order targets improvements in information sharing and developing a risk framework and best practices, called the Cybersecurity

article thumbnail

As big banks and media wise up to cyber threat, New York’s security firms get noticed

NopSec

Crain’s New York Business, there is an article written by Matthew Flamm that discusses the pervasiveness of cyber attacks and the implications for New York companies. He makes an assertion that, “New York may become more hospitable to entrepreneurs as the number of engineers and investors attracted to the local tech scene grows.” The article then goes on to spotlight NopSec, “getting attention from large, well-reputed VCs” according to Steve Berg of RTP Ventures.

article thumbnail

New EU rules on security

Privacy and Cybersecurity Law

If you Google “EU law on security”, you’ll find the EU Data Protection Directive near the top of the search […].

40
article thumbnail

Reduce your odds of needing incident response

NopSec

It has been hard to keep up with my news alert due to all the IT security headlines. “ Hackers in China Attacked The Times for Last 4 Months ” in the New York Times, and “ Chinese Hackers Hit U.S. Media ” in The Wall Street Journal. Cyber-attacks on the rise Although unfortunate and painful for the companies involved, high-profile security attacks and breaches are positive for the industry overall from the perspective of increasing the awareness and education of the need to employ an ongoi

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cookies: the UK ICO perspective

Privacy and Cybersecurity Law

We’re now well past the UK grace period for cookie compliance. But what are companies actually doing about this? Are […].