Tag: Security
-
How to avoid being hacked like Bybit
Just over a week ago, Bybit was hacked for nearly $1.5bn: Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’. By now, we understand the hack well enough to summarize updated best practices and lessons learned to reduce the likelihood of similar attacks. But first, a big shout-out to Bybit CEO Ben Zhou…
By
·
-
You’ve been hacked, what now?
You work for a crypto company, project or DAO and someone alerts you that you’ve been hacked. What do you do next? Here’s a quick emergency cheat sheet.
By
·
-
Custom USB sticks bypassing Windows 7/8′s AutoRun protection measure going mainstream
Physical security is still key. Custom USB sticks bypassing Windows 7/8′s AutoRun protection measure going mainstream
By
·
-
Oracle’s July 2013 CPU Oracle Database Server Risk Matrix
Oracle’s July 2013 CPU Oracle Database Server Risk Matrix is one of the worst in recent history. Go patching!
By
·
-
Honing your presentation skills for security awareness
Address all senses: Hearing, Seeing, Feeling. Honing your presentation skills for security awareness
By
·
-
Why the FBI’s plan to require weak security in all American technology is a terrible, terrible idea
Bruce Schneier: Why the FBI’s plan to require weak security in all American technology is a terrible, terrible idea
By
·
-
Dataguise Presents 10 Best Practices for Securing Sensitive Data in Hadoop
Dataguise Presents 10 Best Practices for Securing Sensitive Data in Hadoop. Yeah, you gotta hop over to read it at myNoSQL…
By
·
-
New Amazon CloudHSM service vows enterprise-grade security
New Amazon CloudHSM service vows enterprise-grade security: Amazon Web Services runs on tons and tons of shared hardware. That’s a huge benefit in terms of cost but also spooks customers with strict regulatory requirements that prevent them from running their applications on shared infrastructure. […] CloudHSM could make regulation-constrained companies and agencies more comfortable entrusting…
By
·
-
Going Bright: Wiretapping without Weakening Communications Infrastructure
Going Bright: Wiretapping without Weakening Communications Infrastructure: Mobile IP-based communications and changes in technologies have been a subject of concern for law enforcement, which seeks to extend current wiretap design requirements for digital voice networks. Such an extension would create considerable security risks as well as seriously harm innovation. Exploitation of naturally occurring bugs in…
By
·