News and Editorials (3200)

A security researcher's lot is not a happy one, but it should be
Published in Editorials
The life of a security researcher is not all beer and pizza. In most cases the days are long and…
Ionic Security says they can make your data useless to the bad guys
Published in Shows and Events
Last year at Black Hat USA 2014 we met up with a company that was looking to make some changes in the way we protect our data, Ionic Security. The concept was very simple, but the implementation was sure to…
Trustwave shows off an impressive copromise of RIG's admin servers at Black Hat 2015
Published in Shows and Events
In addition to seeing more than a few products and ideas during Black Hat and DEF CON we also had the chance to see something really cool from the team at Trustwave. This was not a product, but a chance…
If the barbarians are past the gates how do you protect your data from being looted? enSilo says they have a way
Published in Shows and Events
The one common thing that I keep hearing everyone talk about at Black Hat and even DEF CON is how to protect your data. It is pretty much a given that if someone wants to get into your network they…
With the trend of hacking Encryption,Certs and Keys; how do you really know who to trust?
Published in Shows and Events
Have you ever lost your keys and had that moment of panic where you are not sure who might have them? This is not a good feeling. You do not know if someone has them and might use them to…
Alien Vault is bringing threat intel to the masses with their latest version of Open Threat Exchange
Published in Shows and Events
One of the truths in security is that while an attacker can stay hidden they can continue to operate. In short, if you do not know about something, there is nothing you can do. Now you would think that this…
Has the glut of IoT devices given the game to the Bad Guys?
Published in Editorials
For a while now (many years actually) I have argued that the rush to turn everything into a techno-gadget has…
AMD looking to HBM2 for their Artic Islands GPUs
Published in News
Although much of the press surrounding AMD at the moment is focused on their lackluster earnings for Q2, there is some potentially good news from them. AMD’s dive into the use of High Bandwidth Memory is going to continue with…
The Hacking Team used UEFI Rootkits for Persistent Malware
Published in News
Last year during DEF CON 22 we saw a demonstration of a UEFI root kit that was extremely worrying. This root kit was installed using a multipart systems to infect the UEFI BIOS in such a way as to grant…
After multiple 0-days, many call for Flash to go away
Published in News
After three spate 0-day vulnerabilities are found in your product you can pretty much expect the market to call for you go away. This is the situation that Adobe is in right now. After fighting to their little slice of…
New Flaw found in Flash Player, yes another one.
Published in News
Although it will not come as a surprise, there seems to be yet another bug in Adobe’s flash player that allows for an attacker to potentially take control of a system by forcing a crash of the application. According to…
Hacking Team's Spyware source code released to the wild after Hack
Published in News
The Italian Security firm Hacking Team is now admitting that their spying software is potentially in the hands of bad guys. After a hack that saw roughly 400GB of company information liberated from their systems they have been monitoring what…
Cross-Site Scripting Flaw found in US ID Protection Company LifeLock's site
Published in News
Irony is one of those things that is not appreciated by security guys. They do not find humor in it nor do they enjoy it when someone points an ironic situation involving them out. This has to be the case…
Search results begin on page 2, Google is accused of skewing search results again
Published in News
When you use a search engine like Yahoo or Google you expect to get relevant results for your efforts. In many cases this does really happen, but often times we enter what we are looking for and find very little…
Cisco SSH key bug in virtual security appliances leads to some questions
Published in News
Cisco has acknowledged (and released patches for) a fairly serious security bug in three of their virtual appliances that, oddly enough, are related to security. The three products in question are the Cisco Web Security Virtual Appliance, the Email Security…
Microsoft is determined to make Windows fail, Forces Updates on Windows 10 *** Updated***
Published in News
Over the course of its development there has been a lot to like about Windows 10. There seems to be a good blend of the traditional Windows desktop with some of the touch-centric features that Microsoft tried to force in…