Sat.Mar 24, 2018 - Fri.Mar 30, 2018

article thumbnail

Have I Been Pwned is Now Partnering With 1Password

Troy Hunt

The penny first dropped for me just over 7 years ago to the day: The only secure password is the one you can't remember. In an era well before the birth of Have I Been Pwned (HIBP), I was doing a bunch of password analysis on data breaches and wouldn't you know it - people are terrible at creating passwords! Of course, we all know that but it's interesting to look back on that post all these years later and realise that unfortunately, nothing has really changed.

article thumbnail

Adding Backdoors at the Chip Level

Schneier on Security

Interesting research into undetectably adding backdoors into computer chips during manufacture: " Stealthy dopant-level hardware Trojans: extended version ," also available here : Abstract: In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or critical-infrastructure applications, could be maliciously manipulated during the manufacturing process, which

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside Fort Gordon: Where Next-Gen Cyber Troops Are Trained

WIRED Threat Level

What's happening at the US Army's new cyber branch headquarters marks a change for Fort Gordon. Hell, it might be changing warfare itself—all through a computer screen.

98
article thumbnail

10 Women in Security You May Not Know But Should

Dark Reading

The first in a series of articles shining a spotlight on women who are quietly changing the game in cybersecurity.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

A Scammer Tried to Scare Me into Buying Their Security Services - Here's How It Went Down

Troy Hunt

Here's the tl;dr - someone named "Md. Shofiur R" found troyhunt.com on a "free online malware scanner" and tried to scare me into believing my site had security vulnerabilities then shake me down for a penetration test. It didn't work out so well for him, here's the blow-by-blow account of things then I'll add some more thoughts afterwards: Should I respond?

Scams 219
article thumbnail

Fooling Face Recognition with Infrared Light

Schneier on Security

Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers. BoingBoing post.

188
188

LifeWorks

More Trending

article thumbnail

Monero Privacy Protections Aren’t as Strong as They Seem

WIRED Threat Level

Researchers point out serious gaps in the privacy promises of stealth cryptocoin Monero.

87
article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

Recently, I've witnessed a couple of incidents which have caused me to question some pretty fundamental security basics with our local Aussie telcos, specifically Telstra and Optus. It began with a visit to the local Telstra store earlier this month to upgrade a couple of phone plans which resulted in me sitting alone by this screen whilst the Telstra staffer disappeared into the back room for a few minutes: Is it normal for @Telstra to display customer passwords on publicly facing terminals in

Passwords 170
article thumbnail

Tracing Stolen Bitcoin

Schneier on Security

Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post : Previous attempts to track tainted coins had used either the "poison" or the "haircut" method. Suppose I open a new address and pay into it three stolen bitcoin followed by seven freshly-mined ones. Then under poison, the output is ten stolen bitcoin, while under haircut it's ten bitcoin that are marked 30% stolen.

Banking 182
article thumbnail

Leveraging tokenization services from the major card brands

Thales Cloud Protection & Licensing

As the volume of both card-based payments and digital payments continue to grow significantly year-on-year, the importance of securing sensitive card data (and in particular the primary account number or PAN) has never been a more critical and challenging task. In the recent Thales eSecurity eBook, ‘ PCI Compliance and Data Protection for Dummies ’, we cover the main technologies that can be used, such as encryption and tokenization, to help with such efforts in protecting the payment prior to a

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Facebook Privacy Setting That Doesn’t Do Anything at All

WIRED Threat Level

For years, Facebook has left a privacy setting on its site that addresses a problem that no longer exists.

83
article thumbnail

Weekly Update 80

Troy Hunt

It's a MASSIVE weekly update! The big news for me this week is the 1Password partnership and I've really tried to share more about how I came to the decision to work with them in this video. I've been so cautious with the way I've managed the image of HIBP to ensure it's always positioned in the right light and I wanted to delve more into that thinking here.

article thumbnail

Unlocking iPhones with Dead People's Fingerprints

Schneier on Security

It's routine for US police to unlock iPhones with the fingerprints of dead people. It seems only to work with recently dead people.

181
181
article thumbnail

Does Your Browser Block Cryptojacking Attacks?

eSecurity Planet

Learn what you can do to limit the risk of in-browser cryptojacking attacks.

Risk 76
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Guccifer 2.0's Slip-Up Shows That Even Elite Hackers Make Mistakes

WIRED Threat Level

No matter how much mystique a hacker persona has, the individual or group behind it inevitably makes operations security errors sometimes.

79
article thumbnail

Taking down Gooligan part 3 — monetization and clean-up

Elie

This post provides an in-depth analysis of Gooligan monetization schemas and recounts how Google took it down with the help of external partners. This post is the final post of the series dedicated to the hunt and take down of Gooligan that we did at Google in collaboration with Check Point in November 2016. The. first post. recounts the Gooligan origin story and offers an overview of how it works.

article thumbnail

Breaking the Anonymity in the Cryptocurrency Monero

Schneier on Security

Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post.

article thumbnail

Secdo AI-Powered Incident Response Redefines Battle Against Malware

eSecurity Planet

Secdo offers an incident response platform that combines endpoint protection with cloud-based AI that handles threats in real time.

Malware 75
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The SamSam Ransomware That Hit Atlanta Will Strike Again

WIRED Threat Level

Atlanta isn't the SamSam ransomware strain's first victim—and it won't be the last.

article thumbnail

Taking down Gooligan part 3 — monetization and clean-up

Elie

This post provides an in-depth analysis of Gooligan monetization schemas and recounts how Google took it down with the help of external partners. This post is the final post of the series dedicated to the hunt and take down of Gooligan that we did at Google in collaboration with Check Point in November 2016. The. first post. recounts the Gooligan origin story and offers an overview of how it works.

article thumbnail

Another Branch Prediction Attack

Schneier on Security

When Spectre and Meltdown were first announced earlier this year, pretty much everyone predicted that there would be many more attacks targeting branch prediction in microprocessors. Here's another one : In the new attack, an attacker primes the PHT and running branch instructions so that the PHT will always assume a particular branch is taken or not taken.

article thumbnail

10 Vendors Set to Innovate at the 2018 RSA Conference

eSecurity Planet

Hundreds of vendors exhibit at the annual cyber security gathering, but only 10 are finalists in the Innovation sandbox contest. Find out who they are.

75
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

MuslimCrypt Steganography App Helps Jihadists Send Secret Messages

WIRED Threat Level

The unfortunately named MuslimCrypt uses steganography to pass discreet messages through images online.

71
article thumbnail

8 Security Spring Cleaning Tips for the Home Office

Dark Reading

Use these ideas to sharpen up your home office machine against potential intruders.

68
article thumbnail

GoScanSSH Malware Targets SSH Servers, But Avoids Military and.GOV Systems

Threatpost

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses. .

Malware 56
article thumbnail

Five Last-Minute GDPR Readiness Tips

eSecurity Planet

Time for complying with GDPR is quickly running out. Experts shine a spotlight on five critical aspects of ensuring GDPR compliance.

58
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cloudflare's New Encryption Service Adds Privacy Protection

WIRED Threat Level

Internet infrastructure company Cloudflare appears to be preparing to launch a service to encrypt traffic to the computers that look up web addresses.

article thumbnail

Automating Ethics for Cybersecurity

Dark Reading

Having a code of ethics and enforcing it are two different things.

article thumbnail

Under Armour Reports Massive Breach of 150 Million MyFitnessPal Accounts

Threatpost

Under Armour is getting kudos for disclosing breach within weeks, but concerns remain over an unknown portion of credentials reportedly stored using the weak SHA-1 hashing function.

article thumbnail

pagodo v2.5 releases: Automate Google Hacking Database scraping

Penetration Testing

pagodo (Passive Google Dork) – Automate Google Hacking Database scraping The goal of this project was to develop a passive Google dork script to collect potentially vulnerable web pages and applications on the Internet.... The post pagodo v2.5 releases: Automate Google Hacking Database scraping appeared first on Penetration Testing.

Hacking 52
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.