cbrompton

117 Flips | 2 Magazines | 1 Like | 2 Following | 368 Followers | @cbrompton | Keep up with cbrompton on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “cbrompton”

The companies and organisations that have already spectacularly fallen foul of the new GDPR laws

As an EU-wide overhaul of data protection laws came into force, social media users have been busy highlighting how some companies and organisations have already spectacularly fallen foul of the changes on day one.<p>Numerous examples of companies struggling to get a handle on the new General Data …

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration …

How to Build a Cybersecurity Incident Response Plan

Being hit by a cyberattack is going to be painful. But it can be less painful if you're prepared, and these best practices can help.<p>When it comes to …

In A Real War Can Virtual Assets Be A Haven?

The grinding civil war in Syria, already a fierce proxy battle between the U.S., Russia, NATO allies, Turkey, Israel, Iran and Isis, has entered a new and perilous stage with this weekend’s reprisals to Bashir al-Assad’s use of chemical weapons. A U.S.-led coalition, backed by military assets from …

Cyber-attacks

Hackers once stole a casino's high-roller database through a thermometer in the lobby fish tank

LONDON — Hackers are increasingly targeting "internet of things" devices to access corporate systems, using things like CCTV cameras or air-conditioning units, according to the CEO of a cybersecurity firm.<p>The internet of things refers to devices hooked up to the internet, and it has expanded to …

Internet of Things

Facebook fuels broad privacy debate by tracking non-users

SAN FRANCISCO (Reuters) - Concern about Facebook Inc's (FB.O) respect for data privacy is widening to include the information it collects about non-users, after Chief Executive Mark Zuckerberg said the world's largest social network tracks people whether they have accounts or not.<p>Privacy concerns …

Privacy

How to save your privacy from the Internet’s clutches

Another week, another massive privacy scandal. When it’s not Facebook admitting it allowed data on as many as 87 million users to be sucked out by a developer on its platform who sold it to a political consultancy working for the Trump campaign, or dating app Grindr ‘fessing up to sharing its …

Britain braces for Russian cyber attacks targeting transport links, water supplies, hospitals and airports

Britain was tonight braced for a wave of crippling cyber attacks in Russian retaliation for the Syrian missile strikes.<p>Vital transport links, water …

Cyber-attacks

Intel needs to come clean about Meltdown and Spectre

A lot more transparency is needed from Apple and AMD, too<p>Intel hasn’t had the best of times recently. Meltdown and Spectre security flaws have helped reveal fundamental issues with processor designs over the past 20 years, and the software updates to protect PCs will have performance impacts. Even …

Why Cybersecurity Researchers Are Suddenly Discovering the Same Vulnerabilities After So Many Years

Vulnerabilities that have gone undiscovered for years or even decades seem to often be discovered simultaneously by multiple cybersecurity professionals.<p>For years I have wondered why after cyber-vulnerabilities go undiscovered for significant periods of time, multiple groups of information security …

Google's AI created its own form of encryption

Researchers from the Google Brain deep learning project have already taught AI systems to make trippy works of art, but now they're moving on to something potentially darker: AI-generated, human-independent encryption. According to a new research paper, Googlers Martín Abadi and David G. Andersen …

Machine Learning

Ageing GSM crypto cracked on commodity graphics rig

A*STAR Singapore shows how easy it isThe crypto scheme applied to second generation (2G) mobile phone data can be hacked within seconds, security …

IAEA chief: Nuclear power plant was disrupted by cyber attack

BERLIN (Reuters) - A nuclear power plant became the target of a disruptive cyber attack two to three years ago, and there is a serious threat of militant attacks on such plants, the head of the United Nations nuclear watchdog said on Monday.<p>International Atomic Energy Agency (IAEA) Director General …

DNS Spoofing with Nethunter, cSploit & Kali Linux

How cool would it be as a pentester to walk around a target company, with only your smartphone, and divert individual systems surfing the web to an …

Linux

How the NSA snooped on encrypted Internet traffic for a decade

Exploit against Cisco's PIX line of firewalls remotely extracted crypto keys.<p>In a revelation that shows how the National Security Agency was able to …

Information Security

Hints suggest an insider helped the NSA “Equation Group” hacking tools leak

Structure of leaked files, other factors suggest someone inside "air gap" snuck them out.<p>A group called the Shadow Brokers made headlines this month …

Snowden speculates leak of NSA spying tools is tied to Russian DNC hack

Former NSA security scientist concurs exposure by "Equation Group" connected to DNC leak.<p>Two former employees of the National Security …

Confirmed: hacking tool leak came from “omnipotent” NSA-tied group

Rare crypto implementation in ShadowBrokers dump connects it to Equation Group.<p>The leak over the weekend of advanced hacking tools contains digital …

Security

Group claims to hack NSA-tied hackers, posts exploits as proof

Extraordinary claim gets attention of security experts everywhere.<p>In what security experts say is either a one-of-a-kind breach or an elaborate hoax, …

Guide to DDoS protection

Last month, secure email came under DDoS attack, this is how we added DDoS protection to ProtonMail. <i>Dec 16, 2015 Update: After we publicly posted the</i> …

Cybersecurity

For cyber security, machine learning offers hope beyond the hype

As businesses wind down for the holiday period, they’ll need to keep their cyber defenses up. While executives are tucking into their dinners, …

Machine Learning

Securi-Pi: Using the Raspberry Pi as a Secure Landing Point

Like many <i>LJ</i> readers these days, I've been leading a bit of a techno-nomadic lifestyle as of the past few years—jumping from network to network, …

Attack floods Internet root servers with 5 million queries a second

Unusually large torrents renew calls to better protect vital Internet resource.<p>Early last week, one of the most vital organs of the Internet anatomy …

A Month Ago, Dianne Feinstein Said Cybersecurity Was Super Important... Now She Says We Should Undermine Encryption

Look, everyone has known for quite some time that Senator Dianne Feinstein's big push for so-called "cybersecurity" legislation in the form of CISA …

Op-ed: (How) did they break Diffie-Hellman?

Relax—it's not true that researchers have broken the Diffie-Hellman key exchange protocol.<p>Martijn Grooten is a mathematician-turned-security …

Information Security

Why Algebraic Eraser may be the riskiest cryptosystem you’ve never heard of

Researchers say there's a fatal flaw in proposed "Internet of Things" standard.<p>A potential standard for securing network-connected pacemakers, …

Information Security

Islamic State is plotting deadly cyber-attacks - George Osborne

<b>Islamic State militants are trying to develop the ability to launch deadly cyber-attacks on UK targets such as air traffic control or hospitals, Chancellor George Osborne has said.</b><p>He is set to double UK funding to fight cybercrime to £1.9bn over five years.<p>Meanwhile, the Ministry of Defence says …

Cyber-attacks

NSA Discloses 91 Percent Of Vulns It Finds, But How Quickly?

NSA says 'vast majority' of flaws it finds are reported to vendors, but keeps mum on how long it takes--offering enterprises another reason for …