Sat.Feb 03, 2018 - Fri.Feb 09, 2018

article thumbnail

How Long is Long Enough? Minimum Password Lengths by the World's Top Sites

Troy Hunt

I've been giving a bunch of thought to passwords lately. Here we have this absolute cornerstone of security - a paradigm that every single person with an online account understands - yet we see fundamentally different approaches to how services handle them. Some have strict complexity rules. Some have low max lengths. Some won't let you paste a password.

Passwords 214
article thumbnail

Living in a Smart Home

Schneier on Security

In " The House that Spied on Me ," Kashmir Hill outfits her home to be as "smart" as possible and writes about the results.

Spyware 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

WIRED Threat Level

Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.

111
111
article thumbnail

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Cloud Protection & Licensing

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Whether it’s varying protection levels, differing operational techniques and policies, or juggling multiple keys, managing more than one encryption system can quickly turn into a complex web that demands time, expertise and money to manage effectively.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Weekly Update 73

Troy Hunt

I'm not entirely sure how I've gotten to the end of the week feeling completely wrung out whilst having only written the one thing, but here we are. In fairness though, I've put a heap of work into Pwned Passwords version 2 and finally completed the data set. There's some coding work and other logistics to complete before it goes live, but the plan for now is week after next so I'm looking forward to that.

Passwords 109
article thumbnail

Sensitive Super-Bowl Security Documents Left on an Airplane

Schneier on Security

A CNN reporter found.

156
156

More Trending

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. But they rightly have concerns. As the report notes: The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.

article thumbnail

AI's Future in Cybersecurity

eSecurity Planet

Industry experts from Coalfire, IEEE and more discuss how AI is shaping the future of IT security.

article thumbnail

Water Utility Infected by Cryptocurrency Mining Software

Schneier on Security

A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack : hackers compromise computers and force them to mine cryptocurrency for them. This is the first time I've seen it infect SCADA systems, though. It seems that this mining software is benign, and doesn't affect the performance of the hacked computer.

article thumbnail

Polisis AI Reads Privacy Policies So You Don't Have To

WIRED Threat Level

Polisis, a machine-learning-trained tool, automatically produces readable charts of where your data ends up for any online service.

111
111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce.

article thumbnail

8 Nation-State Hacking Groups to Watch in 2018

Dark Reading

The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.

Hacking 82
article thumbnail

Cabinet of Secret Documents from Australia

Schneier on Security

This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is sold off cheaply. The deals can be even cheaper when the items in question are two heavy filing cabinets to which no-one can find the keys. They were purchased for small change and sat unopened for some months until the locks were attacked with a drill.

article thumbnail

Autosploit, Strava Heat Maps, and More Top Security News This Week

WIRED Threat Level

The memo release, Olympics hacking, and more of the week's top security news.

Hacking 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

What is Cryptojacking and Why Is It a Cybersecurity Risk?

eSecurity Planet

Learn about this emerging attack method and how it's impacting organizations around the world in this eSecurityPlanet series.

Risk 70
article thumbnail

Mastering Security in the Zettabyte Era

Dark Reading

Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.

article thumbnail

Poor Security at the UK National Health Service

Schneier on Security

The Guardian is reporting that "every NHS trust assessed for cyber security vulnerabilities has failed to meet the standard required.". This is the same NHS that was debilitated by WannaCry.

131
131
article thumbnail

Feds Take Down Infraud, a $530M Cybercrime Forum That Lasted 7 Years

WIRED Threat Level

Infraud may not have been as famous as dark web markets like the Silk Road and Alphabay, but it far outlasted both.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Lenovo Warns Critical WiFi Vulnerability Impacts Dozens of ThinkPad Models

Threatpost

Lenovo issued a security bulletin Friday warning customers of two previously disclosed critical Broadcom vulnerabilities impacts 25 models of its popular ThinkPad laptops.

article thumbnail

Back to Basics: AI Isn't the Answer to What Ails Us in Cyber

Dark Reading

The irony behind just about every headline-grabbing data breach we've seen in recent years is that they all could have been prevented with simple cyber hygiene.

article thumbnail

Calling Squid "Calamari" Makes It More Appetizing

Schneier on Security

Research shows that what a food is called affects how we think about it. Research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

130
130
article thumbnail

Scammers Are Stealing Bitcoin on Twitter With a Classic Scheme

WIRED Threat Level

A new twist on the classic Nigerian Prince scheme has jumped from gaming communities to Twitter. And now it's spreading.

110
110
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cisco Confirms Critical Firewall Software Bug Is Under Attack

Threatpost

Cisco has issued patches for the vulnerability, which could be up to seven years old.

article thumbnail

New Zero-Day Ransomware Evades Microsoft, Google Cloud Malware Detection

Dark Reading

Shurl0ckr, a form of Gojdue ransomware, was not detected on SharePoint or Google Drive.

article thumbnail

IBM QRadar vs Splunk: Top SIEM Solutions Compared

eSecurity Planet

While both SIEM solutions are popular industry leaders, each has its strengths and weaknesses. We take a close look at both.

52
article thumbnail

Time's Just About Up to Secure the 2018 Midterm Elections

WIRED Threat Level

The first primary for the 2018 midterm elections takes place March 6—and many states are still woefully underprepared.

106
106
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

IANS 2018 New York Information Security Forum

NopSec

On Monday, March 19th, NopSec’s Co-founder & CTO, Michelangelo Sidagni will be speaking at this year’s IANS New York Information Security Forum. The Information Security Forum delivers an immersive curriculum with over 30+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the two-day Forum to gain actionable technical solutions and leadership insights focused on current and emerging challenges facing enterprise secur

article thumbnail

North Korean APT Group Employed Rare Zero-Day Attack

Dark Reading

Recent Adobe Flash exploit discovered against South Korean targets likely purchased, not developed by the hacking group.

Hacking 62
article thumbnail

Kali Linux 2018.1 Release

Kali Linux

Welcome to our first release of 2018, Kali Linux 2018.1. This fine release contains all updated packages and bug fixes since our 2017.3 release last November. This release wasn’t without its challenges–from the Meltdown and Spectre excitement (patches will be in the 4.15 kernel) to a couple of other nasty bugs , we had our work cut out for us but we prevailed in time to deliver this latest and greatest version for your installation pleasure.

article thumbnail

Insurance Customers’ Personal Data Exposed Due to Misconfigured NAS Server

Threatpost

The vulnerability also exposed login credentials for a massive national insurance claims database, Upguard says.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!