Security Projects - Page 23
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A Dutch MP who brought to light a security gap on a medical site is himself being accused of hacking crimes, pulling him into an ongoing debate in the Netherlands over 'ethical hacking.'
Years ago, I had the brilliant idea that all my users in the finance department should have complex passwords. This made perfect sense to everyone, since dealing with millions of dollars of revenue is something that should be secured. So, the passwords were changed with complexity requirements enforced.
You want the best on your security team. And once you have them, you want to keep them happy and keep them in your organization. Three security career and management experts weigh in on what security managers need to do to retain top-notch security talent.
Automation, cost savings, and data redundancy -- no wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.
Fifteen years ago, you weren't a participant in the digital age unless you had your own homepage. Even in the late 1990s, services abounded to make personal pages easy to build and deploy
Gunnar Hellekson has many awesome-sounding job titles. He's the chief technology strategist for Red Hat's US Public Sector group, where he works with government departments to show them how open source can meet their needs, and with systems integrators to show them what they can do to provide the government with what it needs.
It's been said that security is hard to measure. Producing measurable results around a lack of problems or incidents is challenging. But the field of security metrics has evolved considerably in recent years, giving security managers more resources to make the case for investing in security programs and technologies.
Demand for Linux talent is on the rise, but finding those professionals is difficult. Eight in 10 (81%) survey respondents say that hiring Linux talent is a priority in 2012. This pressing matter is particularly evident when Linux demand is compared to hiring in other skill sets: 63 percent of hiring managers are increasing Linux hires relative to jobs created in other skill areas.
The lessons I learned letting my son break the rules hold true for security, too. Here's why sometimes breaking a rule leads to better compliance: 1. It creates an opportunity for an individual to practice autonomy, on the condition that they live with the consequences. This allows an individual to be recognized, and feel respected.
A new version of the BlackHole exploit kit is now out on the web and ready to start infecting. The developer of the toolkit, who goes by the handle "Paunch," recently announced the availability of Blackhole 2.0, which removes much of its trove of known and patched exploits, and replaces them with a whole new crop
This does it, really. If the nine reasons we gave you on Monday weren
Security breaches happen so often nowadays, you're probably sick of hearing about them and all the ways you should beef up your accounts. Even if you feel you've heard it all already, though, unfortunately, today's password-cracking tools are more advanced and cut through the clever password tricks many of us use.
Solving the weak password challenge requires more than having consumers create strong passwords. Many businesses also need to get a clue about what counts as safe, weak, encrypted, or secure.
Armed with a set of 10-sided dice (we
Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and confidently show how to compromise, or "pwn," a system that no one has hacked into before (see "Mobile Payment Chips Could Let Hackers into Your Phone").
Windows 8 PCs and tablets will lock out all other operating systems by default, and trying to find a way around it isn
The U.S. Computer Emergency Readiness Team (US-CERT) has disclosed a flaw in Intel chips that could allow hackers to gain control of Windows and other operating systems, security experts say.
Before we go into deep details on the Flashing and custom ROMs, let's look at the Android architecture (stack) along with common terminology.
After the FBI arrested Cosmo, the alleged leader of the UGNazi hacking group, the hackers attacked CloudFlare via a flaw in Google's two-factor authentication system. The CloudFlare hack allowed UGNazi to change the DNS for 4chan, so visitors to the site were redirected to a UGNazis Twitter account. The attack on the Wounded Warrior Project site was allegedly done for no reason but to spite The Jester.