Microsoft is extending the holiday period for Sys Admins this month: there are only four bulletins in January’s Patch Tuesday; and not a single one marked ‘critical’. Two, however, will require a restart, while the other two ‘may’ require a restart – s…
Two Thirds of Personal Banking Apps Found Full of Vulnerabilities
A researcher looked at the security of home banking apps, and found shocking results. Forty home banking apps from the top 60 most influential banks in the world were tested and found to have major security weaknesses.
Kali Linux 1.0.6 Release
Kernel 3.12, LUKS nuke, Amazon AMI / Google Compute images and more!
It’s been a while since our last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, a…
Narrative Authentication Builds Storytelling into Logins
Keywords, passphrases, 25-digit alphanumeric codes, picture recognition, biometrics –authentication is a notoriously difficult thing to effect while thwarting hackers the majority of the time, given the boundaries of human memory and the rampant presen…
Hacker Nabs Downton Abbey Season Finale Script
“Guccifer,” a hacker known for lifting high-profile information from A-listers, has managed to nab the script for Downton Abbey’s season finale, while also targeting emails of various other celebrities.
SAP Combines MDM with NAC to Solve its Own Mobile Security Challenges
Mobile device management (MDM) systems are gaining rapid adoption among enterprises that wish to better manage the increasing number of smartphones and tablets being used in corporate environments.
2014: ‘The Year of Encryption?’
Will 2014 see a big uptick in the use of biometric technologies, strong encryption, a rash of new key technologies and more? Some say that the era of having unencrypted data traffic flowing freely inside enterprises will likely soon come to a crashing …
US Backdoors in French Satellites Threatens Billion Dollar Deal With the UAE
A deal for two French Falcon Eye spy satellites, where cameras can detect very small objects on the ground, is in jeopardy after the UAE buyers claimed they contain US-made parts that are considered ‘security compromising components.’
Yahoo Has Been Serving Malware To Its Users
On Friday 3 January, Dutch security firm Fox-IT detected malicious activity on some of its clients’ networks – with a common factor: they had all previously visited yahoo.com. Further investigation revealed malvertising on the Yahoo site – and it is po…
Emergency Self Destruction of LUKS in Kali
Kali Linux Full Disk Encryption
As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensi…