Security

Why should you sign your binaries

One of the larger questions facing the software industry is: How can I trust code that is published on the Internet? Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of […]

Security

Security through obscurity: Smart Light bulb Exposes Wi-Fi Password

A team of British security consultants (Context) hacked their way into a private Wi-Fi network — using Lifx bulbs as the backdoor. In a typical Lifx setup, one bulb will automatically serve as the “master,” communicating directly with your smartphone and then relaying all info to other “slave” bulbs. Context’s team was able to hack their […]

Security

Cyberattacks can damage your business. Permanently. Here is how to prepare yourself.

Dieser Artikel ist auf Deutsch verfügbar: http://tcadistribution.wordpress.com/2014/07/01/wie-cyberangriffe-auch-ihrem-unternehmen-schaden-konnen/    We’ve learned after the Code Spaces incident that started as a DDOS, continued with hacking and then blackmailing that cyberattacks are not something one should ignore. The long story of CodeSpaces put short was: a hacker started a DDOS on the company’s website and services. Nothing unusual, just […]

News question Security

Truecrypt shutdown – 5 questions that must be asked

If you visit www.truecrypt.org you see this text below. If you install the software, you see it quite a couple of times. The domain www.truecrypt.org  is only redirecting now to www.truecrypt.sourceforge.net. There are many articles written on this topic, especially on “WHY?”. WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues This page exists […]

Security

How to change your password on eBay after the security breach

eBay informed customers to change their passwords after a security breach. Cyberattackers compromised a small number of employee log-in credentials, allowing unauthorized access to eBay’s corporate network, the company said. Working with law enforcement and leading security experts, the company is aggressively investigating the matter and applying the best forensics tools and practices to protect customers. […]

Antivirus quoted Security

Is Antivirus really dead? It depends on what you call Antivirus

Every once in a while, someone or some company in the information security industry comes up and says, “antivirus is dead.” This happened again last week, when Symantec’s Brian Dye told the Wall Street Journal that antivirus was dead and that it was no longer a “moneymaker.” http://news.softpedia.com/news/Is-Antivirus-Dead-It-Depends-on-How-You-Look-at-It-440993.shtml Avira Security Expert and Product Manager Sorin Mustaca tells […]

Security

Bring Your Own Identity (BYOI) is the next evolution of BYOD

Many technology and security experts predict that “Bring Your Own Identity is the next evolution of BYOD. However, the experts are mixed on the security of BYOI. Some say it will make security stronger because of the way identity is used to connect to websites and networks; others say that by using third-party identities, employees […]