Menu

Blogs

Showing Blog Posts: 1–10 of 150 tagged Hackers and Threats

  • Avoid Ransomware Attacks by Removing Attack Vectors

    by Rook Security on April 29, 2016

    To date, there are around about 54 different versions of ransomware, and each one has multiple variants. Every day there is a new ransomware victim, and unlike other malware that has come before, ransomware isn’t looking to steal your information or gain unauthorized access. It just wants your money. Should I pay? Can my files be decrypted? How did this happen? These questions get asked a lot…

  • Hacking for Dummies: Fifth Edition

    by Ben Rothke on April 26, 2016

    I’ve enjoyed Kevin Beaver’s Hacking for Dummies series for over a decade. The first edition came out in 2004 and I reviewed the four th edition here. Now in its fif th edition, the books 22 chapters progress from the basics of security to the hardening of an operating system, to the hacking of Web applications and more. The new edition covers Windows 10 and Linux, and includes a number of more…

  • Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments

    by Ben Rothke on April 19, 2016

    Mystery surrounds Satoshi Nakamoto, the creator of Bitcoin. It’s unclear where he lives, if he’s even a real person, or perhaps a composite of many Bitcoin developers. For many people, an equally mysterious topic is the mathematics surrounding cryptography. Cryptography was so intimidating a topic for many people studying for the CISSP certification exam, that the ISC 2 removed it as one of the…

  • Executive Hotel Rooms Are a Hacker’s Treasure Chest

    by Dale "Woody" Wooden on April 15, 2016

    The flight was long, and all you want to do now is get to your room, have a drink, and go to sleep. You sit down at the desk in your room, log onto the hotel’s Wi-Fi and log into your email. This is about the time your phone beeps. It’s almost dead. Luckily, your room has a charging station right on the desk… How convenient! The iPod needs to be charged too, so it is slipped into the hotel’s…

  • Dark Territory: The Secret History of Cyber War

    by Ben Rothke on April 13, 2016

    With a catchy title of Dark Territory: The Secret History of Cyber War, (Simon & Schuster ISBN 9781476763255), this new book by Pulitzer Prize winning author Fred Kaplan looked to be a winner. Not that it’s not a good book; but for anyone who’s been involved with information security and cyberwarfare, most of the stories are already known and have long been covered. The book gets it title based on…

  • Peers Discuss ‘Hacking Inward,’ Cyber War Games at RSA Conference 2016

    by RSAC Contributor on April 13, 2016

    By Itzhak Kotler, Co-Founder and CTO, SafeBreach During the recent RSA conference in San Francisco, I moderated a Peer2Peer session called “Hacking Inward—Implementing Effective Cyber War Games.” Peer2Peer group discussions center around specific security topics, where participants get the chance to really dig deeply into a topic. One of the reasons this particular topic is important is because…

  • How to Use Anonymized Global Digital Identities to Fight Cybercrime

    by Alisdair Faulkner on April 8, 2016

    At the 2016 RSA Conference, there was a lot of buzz surrounding the importance of global threat intelligence sharing. In fact, of the more than 500 exhibitors at the annual conference, 79 companies include threat intelligence sharing as part of their business model. However, such information sharing only works when done right—in an anonymized way that takes into account each user’s full digital…

  • The Car Hacker's Handbook: A Guide for the Penetration Tester

    by Ben Rothke on March 26, 2016

    The history of technology is replete with instances of security researchers finding a flaw in a product. The vendors then discount the issue and mock the findings; saying it’s only a theoretical vulnerability. They may even resort to suing the researchers. When the vulnerability becomes widespread, these vendors then run to patch their insecure product. We are in that situation now with…

  • Ransomware Goes Corporate in 2016

    by RSAC Contributor on March 15, 2016

    This post comes from Liviu Arsene, security analyst at Bitdefender. The ransomware threat is growing. More than 13.1 million U.S. users—4.1 percent of the total population—have encountered ransomware, and half of them paid the ransom to recover their personal data. Another 40 percent would actually consider paying, according to a recent study we commissioned. In our security predictions for 2016, …

  • How a Security CEO Fell Prey to Scammers (Almost)

    by David Needle on March 3, 2016

    Having a security breach is one of every company’s worst nightmares. But the bad guys don’t just try to compromise your computer systems, they also use social manipulation and phony email addresses and domains to try and steal information and funds from right out from under your nose. That’s exactly what happened two years ago to Tom Kemp, CEO of cloud security firm Centrify. And the problem has…

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 30 Apr 2016 09:08:45 -0400.
© 2016 EMC Corporation. All rights reserved.