A new research paper, due to be presented at the 20th ACM Computer and Communications Security Conference (CCS 2013) at Berlin in November, has demonstrated that over time Tor users can be discovered with a high degree of accuracy.
Black Budget: NSA’s Team of Elite Hackers Tasked with ‘Sabotage’
The Edward Snowden leak is the leak that keeps on giving for news organizations, apparently: New documents have been released that detail the National Security Agency and the CIA’s intelligence budget. And, perhaps not surprisingly, it points to the ex…
Black Budget: NSA’s Team of Elite Hackers Tasked with ‘Sabotage’
The Edward Snowden leak is the leak that keeps on giving for news organizations, apparently: New documents have been released that detail the National Security Agency and the CIA’s intelligence budget. And, perhaps not surprisingly, it points to the ex…
Dropbox Hackable; Well, in a Way
Two researchers have demonstrated that they can reverse engineer the Dropbox client and gain access to the user’s cloud storage. But first they have to own the user’s computer – and if they do that, they’ve probably got the files locally.
Dropbox Hackable; Well, in a Way
Two researchers have demonstrated that they can reverse engineer the Dropbox client and gain access to the user’s cloud storage. But first they have to own the user’s computer – and if they do that, they’ve probably got the files locally.
ISACA Kicks Off COBIT 5 Assessor Certification
Assessors are key figures in IT environments, ensuring that processes and policies are in place to support effective governance and management of information. But as ISACA knows, doing it well is every bit as complex as the IT environment itself – so y…
Facebook Hijacked to Spread Chrome, Firefox Browser Malware
Facebook is being used to spread malware again, this time through messages claiming to be from friends wanting to share videos. The “video link” of course opens a door for hackers to hijack users’ Facebook accounts and web browsers.
Breach Notification is Now EU Law for Communications Providers
On 25 August, the EU’s new breach notification Regulation for electronic communication service (ECS) providers came into force. The Regulation supplements an earlier Directive that instructed ECS companies to notify their competent national authority i…
Tracking and Fixing an Installer Bug
A little while back, a bug with the LVM encrypted install in Kali Linux 1.0.4 was reported in our bug tracker. This bug was high priority in our TODO as encrypted installs are an important feature in our industry so we wanted to squash this bug ASAP. T…
The Ponemon Institute: Most Organizations are Woefully Behind in Application Security
When it comes to locking down enterprise infrastructure, the application layer is responsible for more than 90% of all security vulnerabilities, yet more than 80% of IT security spending continues to be at the network and endpoint layer, new research h…