1. You can always be sued 2. How Lawyers Think About Pen Tests...
Selengkapnya"That?s the lesson of a demonstration hackers Brandon Edwards and Ben Nell have planned for the Summercon security conference in New York today...
Selengkapnya"This month Microsoft will be releasing seven security updates for your patching pleasure. The good news is that only two of them are rated as critical and one of them won?t be relevant to you unless you?re running a Lync Server. The rest, though, affect Windows, Office and Internet Explorer, so there?s no getting around the need to update...
Selengkapnya"The 20 Critical Security Controls (20 CSC) provide a baseline for implementing the necessary technical controls that are required to ensure a robust network security posture...
Selengkapnya"On the anniversary of the first news reports on NSA surveillance, Microsoft general counsel Brad Smith seized the opportunity to draw a line in the sand with the U.S. government...
Selengkapnya"A Singaporean man has been fined $6,400 for launching a cross-site scripting (XSS) attack on the official website of Istana, the residence and office of the President of Singapore, back in November 2013...
Selengkapnya"The carrier group has published a very lengthy and reasonably detailed breakdown of its interactions with law enforcement and spy agencies, covering 29 countries where its operators have faced metadata and wiretap requests...
Selengkapnya"Russia has reportedly hired a man to develop its national payments system, days after the alleged mastermind of one of the country's biggest pharmacy spam networks was granted early parole. The criminal allegations following Pavel Vrublevsky were prodigious but were largely denied or unconfirmed by the 35 year-old Moscow native...
Selengkapnya"Ellen Richey, chief legal officer and enterprise risk officer at Visa, says card issuers, retailers, payments processors and others handling card data must go beyond PCI compliance if they expect to effectively fight fraud. "There are already best practices out there that go beyond the technical side of PCI," Richey says in an interview with Information Security Media Group (transcript below). Those best practices include guidelines and recommendations related to the need for wider adoption of chip cards, such as those that conform to the Europay, MasterCard, Visa standard, tokenization and end-to-end encryption...
Selengkapnya"The Navy recently announced the winners of its cryptology puzzle game challenge: ?Project Architeuthis.? The puzzle, consisting of daily clues posted on Facebook, targets the cryptology technician community and was an attempt to raise awareness of the Information Dominance Corps. The challenge calls on Navy cryptology technicians to collect and analyze encrypted electronic communications, jam enemy radar signals, decipher information in foreign languages, maintain the state-of-the-art equipment, and defend and analyze networks...
Selengkapnya