Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in…
Stroz Friedberg Snaps Up Financial Investigations Firm
The recent acquisition of Tyrian Partners by Stroz Friedberg aims to strengthen international forensic accounting services offered by the multinational forensic investigations specialist.
How to Nuke your Encrypted Kali Installation
There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added to the cryptsetup package in Kali Linux. We wanted to take this opportunity to better explain this feature, as well as demonstrate some useful approa…
Patch Tuesday Preview: January 2014
Microsoft is extending the holiday period for Sys Admins this month: there are only four bulletins in January’s Patch Tuesday; and not a single one marked ‘critical’. Two, however, will require a restart, while the other two ‘may’ require a restart – s…
Two Thirds of Personal Banking Apps Found Full of Vulnerabilities
A researcher looked at the security of home banking apps, and found shocking results. Forty home banking apps from the top 60 most influential banks in the world were tested and found to have major security weaknesses.
Kali Linux 1.0.6 Release
Kernel 3.12, LUKS nuke, Amazon AMI / Google Compute images and more!
It’s been a while since our last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, a…
Narrative Authentication Builds Storytelling into Logins
Keywords, passphrases, 25-digit alphanumeric codes, picture recognition, biometrics –authentication is a notoriously difficult thing to effect while thwarting hackers the majority of the time, given the boundaries of human memory and the rampant presen…
Hacker Nabs Downton Abbey Season Finale Script
“Guccifer,” a hacker known for lifting high-profile information from A-listers, has managed to nab the script for Downton Abbey’s season finale, while also targeting emails of various other celebrities.
SAP Combines MDM with NAC to Solve its Own Mobile Security Challenges
Mobile device management (MDM) systems are gaining rapid adoption among enterprises that wish to better manage the increasing number of smartphones and tablets being used in corporate environments.
2014: ‘The Year of Encryption?’
Will 2014 see a big uptick in the use of biometric technologies, strong encryption, a rash of new key technologies and more? Some say that the era of having unencrypted data traffic flowing freely inside enterprises will likely soon come to a crashing …