Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release, which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packa…
Kali Linux Repository HTTPS Support
A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redi…
Why You Should Avoid DIY Home Alarm Systems
There are many reasons you may consider a DIY home alarm system. They are widely available at stores, and are an inexpensive option for those who want to ramp up their home security while saving money. While there are many effective DIY home alarm systems available, they are also difficult to install, and if installed … Continue reading Why You Should Avoid DIY Home Alarm Systems
The post Why You Should Avoid DIY Home Alarm Systems appeared first on Calgary Alarm Inc..
Penetration testing Sharepoint
Like any normal web application, Sharepoint may fall prey to OWASP Top 10 vulnerabilities with a special focus on XSS, mostly due to inadequate patching and misconfiguration. On this post, we focus on recon / what sharepoint is exposing. Google Dorks F…
Keep Your Home Safe While on Vacation
Do you have summer vacation on the brain? We don’t blame you! With warmer weather fast approaching, it’s hard not to start thinking about where and what you want to do for summer vacation. Even with all the excitement of planning your vacation, it’s important to think about your home while you are away. Nothing is worse than coming back … Read More
The post Keep Your Home Safe While on Vacation appeared first on Security Source.
How can we use the cloud and comply with global privacy laws?
The cloud clearly provides a number of benefits for businesses and associations, but as many are aware, remaining compliant with regional, federal and industry law and regulations is a major challenge.
Layered Database Security in the age of Data Breaches
We live in a time of daily breach notifications. One recently affected organization in Germany put out a statement which said: “The incident is not attributable to security deficiencies.” and “Human error can also be ruled out.” They went on say that …
Data Breaches: The Encryption Challenges
This article is the third in a series that discusses data breach threats and possible solutions. The first two articles, “What You Need to Know,” and “Threats and Consequences,” make it clear that businesses need to take action to reduce data …
PCI DSS disses multi-step authentication
The PCI Council has published an “Information Supplement” on multi-factor authentication (pdf). The document that multi-step and mutl-factor authentication are not the same and that the former is not acceptable.
PCI DSS requires that all factors in …
Vault 7: Marble Framework Reveals How the CIA Evaded Forensics & Attributed Malware to Other Countries
Wikileaks has published part 3 of Vault 7, a multi-part leak revealing a previously…
Source: Vault 7: Marble Framework Reveals How the CIA Evaded Forensics & Attributed Malware to Other Countries appeared first on Freedom Hacker the number one source for hacking news, security news & everything cyber.