Assessors are key figures in IT environments, ensuring that processes and policies are in place to support effective governance and management of information. But as ISACA knows, doing it well is every bit as complex as the IT environment itself – so y…
Facebook Hijacked to Spread Chrome, Firefox Browser Malware
Facebook is being used to spread malware again, this time through messages claiming to be from friends wanting to share videos. The “video link” of course opens a door for hackers to hijack users’ Facebook accounts and web browsers.
Breach Notification is Now EU Law for Communications Providers
On 25 August, the EU’s new breach notification Regulation for electronic communication service (ECS) providers came into force. The Regulation supplements an earlier Directive that instructed ECS companies to notify their competent national authority i…
Tracking and Fixing an Installer Bug
A little while back, a bug with the LVM encrypted install in Kali Linux 1.0.4 was reported in our bug tracker. This bug was high priority in our TODO as encrypted installs are an important feature in our industry so we wanted to squash this bug ASAP. T…
The Ponemon Institute: Most Organizations are Woefully Behind in Application Security
When it comes to locking down enterprise infrastructure, the application layer is responsible for more than 90% of all security vulnerabilities, yet more than 80% of IT security spending continues to be at the network and endpoint layer, new research h…
Syrian Electronic Army Steps Up a Gear – Re-Directs Major Websites to its Domain
Rather than hack individual websites or Twitter accounts, SEA’s latest attack was on the MelbourneIT domain registrar. It was then able to redirect visitors to MelbourneIT’s customers – including the New York Times, Twitter and Huffington Post – to an …
Password Cracker Cracks 55 Character Passwords
One of the world’s leading password crackers just got better and is now able to crack passwords of up to 55 characters in length and algorithms such as TrueCrypt 5.0+, LastPass and Samsung Android Password/PIN.
Facebook Report Discloses Number of Government Requests for User Data
Facebook has now joined other major cloud service companies with its own version of a transparency report: its first Global Government Requests Report purports to show how many government requests for user data it received in the first six months of 2013.
Molerats Hacking Campaign adds Poison Ivy to its Repertoire
Molerats is the term used for a hacking campaign orchestrated by the Gaza Hackers Team. Until now it had seemed that this group concentrated on using the XtremeRAT trojan. New research now suggests that that the group has also started using the Poison …
NSA Revealed Spying on the UN and EU Embassies
The latest revelations from Edward Snowden published by Der Spiegel and Laura Poitras, the American film maker based in Berlin and visited by David Miranda before his detention at Heathrow, shows extensive and sophisticated NSA surveillance of both the…