A new variant of ransomware dubbed BitCrypt has been smashed open by a pair of French researchers.
Kali Linux Metapackages
One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expa…
RSA Conference 2014: Intelligence Heavyweights Engage in Friendly Europe Bashing
The US is not unique among nations when it comes to its intelligence gathering abilities. “We are just better” at it than most countries, according to Richard Clarke, the former presidential counter-terrorism adviser.
RSA Conference 2014: Microsoft Does Not Put Backdoors in its Products says Charney
In his keynote at the RSA Conference in San Francisco, February 25 2014, Scott Charney, VP of Microsoft’s Trustworthy Computing Group, insisted that Microsoft has not compromised its principles in order to work with the NSA
RSA 2014: Art Coviello Addresses RSA/NSA Controversy in Keynote
In the opening keynote at the RSA Conference 2014 in San Francisco, Art Coviello, Executive Chairman of RSA, gave his first public comments about RSA’s relationship with the NSA.
Criminals Can Keylog an iPhone to Steal Passwords
Last month, Trustwave’s Neal Hindocha wondered whether cybercriminals could adapt to changes in user habits. In the PC world, a major tool for cyberthieves is the keylogger, used to capture passwords as they are entered at the keyboard. But users are s…
Deep Data Governance
One of the first things to catch my eye this week at RSA was a press release by STEALTHbits on their latest Data Governance release. They’re a long time player in DG and as a former employee, I know them fairly well. And where they’re taking DG is pret…
RSA Conference 2014
I’m at the RSA Conference this week. I considered the point of view that perhaps there’s something to be said for abstaining this year but ultimately my decision to maintain course was based on two premises: (1) RSA didn’t know the NSA had a backdoor w…
80% of SOHO Routers Contain Vulnerabilities
It has become increasingly obvious in recent months that routers are being targeted by attackers – even the NSA uses this attack vector as part of its Quantum Injection program. Now a new survey suggests that as much as 80% of the best-selling SOHO rou…
ISACA Issues First COBIT 5 Audit Programs
Global IT association ISACA has issued the first of more than 30 audit programs that will align with the COBIT 5 business framework, which helps enterprises govern and manage their information and technology.