Larry Seltzer's 'Data encryption: How To Avoid Common Workarounds'

Larry Seltzer’s ‘Data encryption: How To Avoid Common Workarounds’

via the inimitable Larry Seltzer, comes this superlative post over at HPE; in which, Mr. Seltzer details data encryption workarounds, and a method to avoid same. Definately, today's Must Read ...
EnclaveDB, The Proposition

EnclaveDB, The Proposition

via Christian Priebe of Imperial College London, Manuel Costa and Kapil Vaswani both from Microsoft Research, comes a tour dé force of database security, ostensibly monikered EnclaveDB (published this past May 2018, ...
CoinImp Cryptominer and Fully Qualified Domain Names

CoinImp Cryptominer and Fully Qualified Domain Names

We are all familiar with the conventional domain name notation, where different levels are concatenated with the full stop character (period). E.g. “www.example.com”, where “www” is a subdomain, “example” is a second ...
Sucuri Enhances Security by Disabling TLS Version 1.0 and 1.1

Sucuri Enhances Security by Disabling TLS Version 1.0 and 1.1

Protecting our users’ information and privacy is extremely important to us. As a cloud-based security service, we are fully committed to complying with the PCI Data Security Standards (PCI DSS) requirements. That ...

Bypassing Passcodes in iOS

Last week, a story was going around explaining how to brute-force an iOS password. Basically, the trick was to plug the phone into an external keyboard and trying every PIN at once: ...
The Executive Guide to Demystify Cybersecurity

The Executive Guide to Demystify Cybersecurity

WHAT DO BANKS AND CYBERSECURITY HAVE IN COMMON? EVERYTHING The world we live in can be a dangerous place, both physically and digitally. Our growing reliance on the Internet, technology and digitalization ...
Chrome to mark HTTP as ‘not secure’

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as "not secure.” Google hopes this move will ...
Ransomware Attackers Demand £120,000 from Dorset Business

Ransomware Attackers Demand £120,000 from Dorset Business

Attackers demanded £120,000 from a Dorset business after infecting the company’s computer systems with crypto-ransomware. According to the Bournemouth Daily Echo, ransomware actors targeted an engineering firm located in Dorset, a county ...
Malware analysis: decoding Emotet, part 2

Malware analysis: decoding Emotet, part 2

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun! Categories: Malware Threat analysis Tags: code analysisdownloaderemotetencryptionpowershell (Read ...
Telegram Updated, Amidst Kremlin Capers, Apple Angst

Telegram Updated, Amidst Kremlin Capers, Apple Angst

News from over the weekend - via 9to5Mac writer Michael Potuck, focusing on Telegram; of which, the encruoted meesenging iOS app has been permitted to publish the latest update to their bits ...
Loading...