Sat.Dec 23, 2017 - Fri.Dec 29, 2017

article thumbnail

The "Extended Random" Feature in the BSAFE Crypto Library

Schneier on Security

Matthew Green wrote a fascinating blog post about the NSA's efforts to increase the amount of random data exposed in the TLS protocol, and how it interacts with the NSA's backdoor into the DUAL_EC_PRNG random number generator to weaken TLS.

190
190
article thumbnail

Weekly Update 67

Troy Hunt

It's Xmas! Well, it was Xmas but I (and hopefully you too) am still in that Xmas period haze where it's hard to tell one day from the next. Apparently, it's also hard to remember to hit record before talking about this week's updates so yeah, good one Troy! But I did eventually record a full update and in an otherwise slow news week, I thought I'd talk a little bit about Xmas down under in Australia.

136
136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

WIRED Threat Level

Researchers found that network configuration errors have left thousands of high-end speakers open to epic audio pranking.

Internet 111
article thumbnail

Leaky RootsWeb Server Exposes Some Ancestry.com User Data

Threatpost

Ancestry.com closes parts of its community-driven genealogy site RootsWeb as it investigates a leaky server that exposed thousands of passwords, email addresses and usernames to the public internet.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Acoustical Attacks against Hard Drives

Schneier on Security

Interesting destructive attack: " Acoustic Denial of Service Attacks on HDDs ": Abstract : Among storage components, hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their recent technological advances, including, enhanced energy efficacy and significantly-improved areal density. Such advances in HDDs have made them an inevitable part of numerous computing systems, including, personal computers, closed-circuit television (CCTV) systems, medical bedsi

article thumbnail

New Pluralsight Course: Care and Maintenance of Development VMs

Troy Hunt

Regular readers will know I create a lot of Pluralsight courses. It's now 5 years ago I started writing my first one which incidentally, is still my highest rated course every month (apparently the OWASP Top 10 as it relates to ASP.NET is still a big thing). Most of the time, the courses I create are on topics I know well, primarily on security but occasionally with a bit of cloud and development practices sprinkled in for variety.

119
119

More Trending

article thumbnail

The One Content Trend Essential to a Marketing Strategy in 2018

eSecurity Planet

As we inch closer to the end of the year, all brands have their eyes on the evolving marketing trends for 2018. To prepare, teams often start by brainstorming answers. The post The One Content Trend Essential to a Marketing Strategy in 2018 appeared first on Kapost Content Marketing Blog.

article thumbnail

Post-Quantum Algorithms

Schneier on Security

NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A timeline for the new algorithms is here.).

140
140
article thumbnail

Code Used in Zero Day Huawei Router Attack Made Public

Threatpost

Researchers warn of copycat type attacks as exploit code used in Mirai variant goes public.

IoT 85
article thumbnail

The Section 702 Surveillance Debate Has Taken Place in the Dark

WIRED Threat Level

As the debate over Section 702 continues, those deciding its fate don't know basic facts about how it works.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Almost a Third of All U.S. Businesses Were Breached in 2017

eSecurity Planet

And almost half of those breaches were caused by a third-party vendor or contractor.

89
article thumbnail

Profile of Reality Winner

Schneier on Security

New York Magazine published an excellent profile of the single-document leaker Reality Winner.

121
121
article thumbnail

21st Century Oncology Faces $2.3M HIPAA Settlement Cost after Breach

Dark Reading

Company to pay US Department of Health and Human Services over potential HIPAA violations after patient medical data was stolen by cyberthieves.

53
article thumbnail

France Goes After WhatsApp For Sharing Data With Facebook, and More Security News This Week

WIRED Threat Level

A fake *Cuphead*, a WhatsApp privacy blow-up, and more of the week's top security news.

93
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

84 Percent of U.S. Healthcare Providers Have No Cyber Security Leader

eSecurity Planet

And just 11 percent plan to add one in the coming year.

article thumbnail

"Santa Claus is Coming to Town" Parody

Schneier on Security

Funny.

article thumbnail

Handi Life Sport explores use of 3D printing for producing boccia balls for paralympic athletes

Dark Reading

When you think of bocce or pétanque, it is hard not to think of groups of retired men, sipping on cool drinks and tossing balls in the shade of a park. It’s as though the casual sport is stuck in the past—in a good way, to be sure.

42
article thumbnail

The Most-read WIRED Security Stories of 2017

WIRED Threat Level

Numerous tales of hacking and breaches proves just how permeable the digital membrane can be.

Hacking 83
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to Prevent Zero Day Attacks?

Spinone

Computer software is often prone to attacks. This could be due to internal or external reasons. One of such attacks is caused by a security hole which is then exploited by hackers. A zеrо dау vulnerability is a hоlе in computer ѕоftwаrе thаt iѕ not fixed by the vеndоr.

article thumbnail

DDoS Attacks Increasingly Blended Multiple Attack Vectors in Q3 2017

eSecurity Planet

The overall number of attacks rose by 15.6 percent over the previous quarter.

DDOS 60
article thumbnail

Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation

Dark Reading

Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks.

44
article thumbnail

How we ended up in an era of intentional ignorance

WIRED Threat Level

Here’s a six-month old essay about online media that resonated with me for a couple of reasons. Firstly, because I was an early-ish analyst blogger in the learning space (2006) and blogged the same way the writer did back then (quick commentary vs in-depth analysis) and secondly, it’s a sad and accurate story of how we got to where we are today – from WordPress-powered “Hello World” reflective blogs to memes and to trolls on Reddit – basically, a whole bunch o

Media 40
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Mozilla Patches Critical Bug in Thunderbird

Threatpost

Mozilla has patched one critical vulnerability in its Thunderbird email client along with two bugs rated high.

Hacking 51
article thumbnail

Two Contrarian Thinkers who went Unheeded

Troy Hunt

Lord Lansdowne. Henry Charles Keith Petty-Fitzmaurice (1845 – 1927), the 5th Marquess of Lansdowne, was a distinguished British statesman who held senior positions in both Liberal Party and Conservative Party governments. He had served as the fifth Governor General of Canada, Viceroy of India, Secretary of State for War, and Secretary of State for Foreign Affairs.

article thumbnail

China Shuts Down 13,000 Websites for Breaking Internet Laws

Dark Reading

The government says its rules are to protect security and stability, but some say they are repressive.

article thumbnail

Friday Squid Blogging: Squid Populations Are Exploding

Schneier on Security

New research : "Global proliferation of cephalopods" Summary : Human activities have substantially changed the world's oceans in recent decades, altering marine food webs, habitats and biogeochemical processes. Cephalopods (squid, cuttlefish and octopuses) have a unique set of biological traits, including rapid growth, short lifespans and strong life-history plasticity, allowing them to adapt quickly to changing environmental conditions.

123
123
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

2018 Employment Market Forecast is Looking Good

eSecurity Planet

Good news for the employment market and recruiting industry moving into 2018 with employers in all US regions and industry sectors expected to increase staff. The manufacturing and construction industries in particular are experiencing a rejuvenation leading to a marked increase in job openings within those sectors. The overall unemployment rate is expected to continue to drop over the next two years.

article thumbnail

The Most Dangerous People on the Internet in 2017: Donald Trump, Russian Hackers, and More

WIRED Threat Level

From Donald Trump to Russian hackers, these are the dangerous characters we’ve been watching online in 2017.

Internet 104