Security security breach

Why is the news about 1.2 bil credentials stolen no news?

Source : http://www.securityweek.com/feedback-friday-russian-hackers-obtain-12-billion-credentials-industry-reactions Sorin Mustaca, IT security expert and author of the Mustaca on Security  blog: Every time I read such PR, it makes me think: “what are the press guys thinking when accepting such information without any kind of proof?”   In my opinion, the most worrying part into this matter is the company that […]

Security

Why the Security of USB Is NOT Fundamentally Broken

I am very, very unhappy about the Fear, Uncertainty and Doubt (FUD) created by Karsten Nohl and Jakob Lell  who will present their findings, as well as proof-of-concept software, at the Black Hatconference in Las Vegas this August. What makes me unhappy is how easy they generalize the fact that in some extraordinary circumstances some bad things can […]

Antivirus Security

Why do we continue to fail on cyber security

Short answer: Because anyone is hackable due to being ignorant on what security is (of course, until he is hacked). Long answer: Human ignorance,  about everything that might happen and it is not certain to happen. According to Webster.com, the definition of IGNORANCE is: : a lack of knowledge, understanding, or education : the state of being ignorant […]

Security

Why should you sign your binaries

One of the larger questions facing the software industry is: How can I trust code that is published on the Internet? Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of […]

Security

Security through obscurity: Smart Light bulb Exposes Wi-Fi Password

A team of British security consultants (Context) hacked their way into a private Wi-Fi network — using Lifx bulbs as the backdoor. In a typical Lifx setup, one bulb will automatically serve as the “master,” communicating directly with your smartphone and then relaying all info to other “slave” bulbs. Context’s team was able to hack their […]

Security

Cyberattacks can damage your business. Permanently. Here is how to prepare yourself.

Dieser Artikel ist auf Deutsch verfügbar: http://tcadistribution.wordpress.com/2014/07/01/wie-cyberangriffe-auch-ihrem-unternehmen-schaden-konnen/    We’ve learned after the Code Spaces incident that started as a DDOS, continued with hacking and then blackmailing that cyberattacks are not something one should ignore. The long story of CodeSpaces put short was: a hacker started a DDOS on the company’s website and services. Nothing unusual, just […]

News question Security

Truecrypt shutdown – 5 questions that must be asked

If you visit www.truecrypt.org you see this text below. If you install the software, you see it quite a couple of times. The domain www.truecrypt.org  is only redirecting now to www.truecrypt.sourceforge.net. There are many articles written on this topic, especially on “WHY?”. WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues This page exists […]

Security

How to change your password on eBay after the security breach

eBay informed customers to change their passwords after a security breach. Cyberattackers compromised a small number of employee log-in credentials, allowing unauthorized access to eBay’s corporate network, the company said. Working with law enforcement and leading security experts, the company is aggressively investigating the matter and applying the best forensics tools and practices to protect customers. […]

Antivirus quoted Security

Is Antivirus really dead? It depends on what you call Antivirus

Every once in a while, someone or some company in the information security industry comes up and says, “antivirus is dead.” This happened again last week, when Symantec’s Brian Dye told the Wall Street Journal that antivirus was dead and that it was no longer a “moneymaker.” http://news.softpedia.com/news/Is-Antivirus-Dead-It-Depends-on-How-You-Look-at-It-440993.shtml Avira Security Expert and Product Manager Sorin Mustaca tells […]