jmurphy

38 Added | 2 Magazines | 66 Likes | @jmurphy | Keep up with jmurphy on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “jmurphy”

IT Innovators: Taking Data Security to the Next Level

By WindowsITPro<p>When Joseph Latouf was in high school, a challenge sparked his curiosity. His algebra class was informed that if anyone could come up …

New Jersey

Hackers attacked Linux distribution network in a way the FBI can only dream of

Hackers took control of the official website for the Linux Mint distro over the weekend, resulting in some users downloading a build of the OS that had been modified to include a backdoor that would give attackers full access to a user’s system.<p>Announced in a blog post, the organization said it …

Even If Terrorists Do Use Strong Encryption, We Still Need It

Crypto back doors will not just weaken our own security; they also won’t stop new attacks.<p>A <b>few days ago I posted</b> <b>this</b> on Twitter:<p>It was a popular …

Here's how almost anyone can wiretap the internet

A lesson in why encryption today is more important than ever.<p>Wiretapping isn't as difficult as you might think.<p>Kevin Mitnick, a former black hat …

Privacy

TarDisk Pear creates a Fusion Drive for your MacBook via the SD Card slot

Wishing your MacBook had a Fusion Drive? Now it can! A company named TarDisk is using a small drive that fits into an SD Card slot to bring Fusion to your mobile device.<p>The Pear works by immediately executing commands at the root level to “logically allocate files” between your existing drive and …

Cybersecurity

U.S. a sitting duck, cyberexperts advise

In the month since a widespread computer systems breach at the Office of Personnel Management was revealed, specialized teams have been racing to …

Google Play

Some hackers make more than $80,000 a month — here's how

Much like the fine-tuned systems of mafias and gangs that act almost identically to businesses, hackers have also created their own extremely intricate systems — and the scale of their operations is astounding.<p>Security researchers have been embedding themselves into these online underbellies to see …

Cybersecurity

Why the OPM hack is an ongoing cyber headache

The shadowy hackers that stole more than 21 million Social Security numbers in a huge breach of federal personnel files have created an ongoing cyber headache, experts warn, citing the data’s value to both criminals and cyber spies.<p>“It’s tremendously valuable from a criminal perspective. It could …

Social Security

This cheap device lets hackers steal your encryption keys over the air

As encryption becomes increasingly popular, decryption keys are growing into highly valuable targets for hackers who want to break into even the most …

White House may find more data breaches following security 'sprint'

When investigators discovered that the US Office of Personnel Management had suffered a massive data breach, the White House kicked off a 30-day cybersecurity "sprint" in hopes of boosting its defenses and checking for vulnerabilities. Well, that mad dash is over -- and the government might not …

Things to Know When Making a Web Application in 2015

Over the past year I've been working on building my first serious web application from scratch. The experience has taught me a lot that I didn't know …

Web Development

FBI: We don't want a government backdoor, just access to encrypted data

FBI Director James Comey isn't sold on the merits of encrypted data, despite the slew of security experts advocating...<p>its use and warning against …

Privacy

The best universities in the UK for cyber security research

This Irish uni has great ties to big name companies in cyberQueen's University Belfast<p>For the last half decade, the UK government and security industry has been warning we are in the middle of a massive cyber skills gap.<p>The lack of skilled defenders means many companies are woefully vulnerable to …

Online Education

CSS: Cascading Style Scripting

The ability to execute scripts in CSS is particularly useful not only when injection points lay inside style tag/attribute, but it also helps exploit …

Digital Archive

Hacker Search Engine Becomes the New Internet of Things Search Engine

At DEFCON 17 in 2009, John Matherly debuted a search engine named Shodan (after the villainous computer in the cult-classic video game, System …

The rise of the new Crypto War

James B. Comey, Jr., the seventh director of the Federal Bureau of Investigation, is afraid of the dark.<p>“The law hasn’t kept pace with technology, …

Privacy

OPM, Anthem data breaches show the insecurity of the Social Security number.

In both the Anthem insurance hack and the two Office of Personnel Management hacks this year, attackers gained access to Social Security numbers, …

Identity Theft

No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and It’s Nearly Unstoppable

Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption …

Information Security

Over 50 percent of Android malware aims to steal money

Android remains the most targeted mobile operating system, but infection numbers are questionable.AP Pictures<p>Last year, Apple CEO Tim Cook mocked Google at the company's WWDC developers conference, claiming Android is the target of 99% of mobile malware.<p>Although this figure might be inflated, new …

Google Play

The Mob's IT Department | Bloomberg Business

As Davy Van De Moere steered his Subaru along a back road at the Port of Antwerp, he was sure he was being followed. It was a warm day in August …

Crime

How To Break Into the CIA’s Cloud on Amazon

Last year, Amazon Web Services surprised a lot of people in Washington by beating out IBM for a $600 million contract to provide cloud services and …

Cloud Computing

No shit! Experts say backdoors and encryption limits are security risks

Adding backdoors so governments can access data is a "major security risk". This is the (perhaps slightly obvious) conclusion of security experts and …

What Do You Mean My Security Tools Don't Work on APIs?!!

SAST and DAST scanners haven't advanced much in 15 years. But the bigger problem is that they were designed for web apps, not to test the security of …

17 penetration testing tools the pros use

Penetration testing (pen testing) is a practice undertaken by professional hackers to find the vulnerabilities in your systems — before the attackers …

Fresh 'high severity' security flaw found in OpenSSL

Researchers think they've found another potentially big hole in the secure web. Reuters Photos<p>A team of developers responsible for supporting a commonly used encryption protocol known as OpenSSL has uncovered a mysterious new “high severity” vulnerability.<p>OpenSSL is a security protocol used by open …

Information Security

The hack that took down a global spyware vendor

At the end of last month, Hacking Team seemed untouchable. The company occupied a controversial niche in the security space, contracting out surveillance software to law enforcement agencies around the world. If your phone got stuck with a wiretapping implant, there's a good chance it came from …

Security

SideStep: Yet another Anti-virus Evasion Tool

SideStep is yet another tool to bypass anti-virus software. The tool generates Metasploit payloads encrypted using the CryptoPP library (license …

Cybersecurity