Kim Dotcom, like every smart founder of a startup in a crisis, is pivoting. Since his Mega empire of filesharing websites and financial assets were seized in an indictment over massive alleged copyright violations last year, he’s been working on a relaunch designed to transform the company’s reputation from a business focused on piracy to one focused on privacy–specifically, airtight encryption like no other storage site has ever offered.But the security community knows that the boldest claims about new encryption technology demand the most scrutiny. And some crypto researchers are already punching holes in the secure lining of Mega’s cloud.“
Best Buy says some customers' email accounts may have been hacked. The retail giant is notifying those customers via email, telling them their current passwords have been disabled andÂ asking them to reset their passwords.
We are currently investigating increased attempts by hackers around the world to access accounts onÂ BestBuy.comÂ and other online retailersâ e-commerce sites. These hackers did not take username/password combinations from any Best Buy system; they appear
Is there such a thing as a security tool that’s too effective? Sounds silly. You’d probably never hear of a firewall being called too effective or an encryption algorithm as being too un-crackable. However, some have, over the years accused the Metasploit penetration testing framework of being that: too fast at publishing exploits and too good at taking advantage of vulnerabilities in the networks it’s used against.One recent example of why Metasploit raises concern involved a Java zero-day vulnerability that surfaced in August and affected millions of users of common Web browsers—Internet Explorer, Mozilla, Firefox, Safari on Windows, Linux,
In the wake of high-profile compromises of companies such as Facebook, the New York Times, Apple and others, officials at Zendesk, an online customer support provider, said that the company also had been compromised and the attackers had made off with the email addresses of customers of Twitter, Tumblr and Pinterest, all of which use Zendesk's services.All three companies sent out emails to affected customers, notifying them of the incident and warning that their email addresses may have been compromised. In what has become an almost daily occurrence now, Zendesk officials posted a notice on the company's blog with the heading "We've been hacked"
MIT was hacked on Tuesday around noon, with MIT URLs redirecting to a webpage claiming credit for the attack in remembrance of Aaron Swartz.As a result of the hack, people who visited tried to reach MIT over the Internet were redirected to the hacked Web page pictured here: http://goo.gl/kxdm1. The hack affected all names under mit.edu, including web.mit.edu, tech.mit.edu, etc.The hack and subsequent outages were due to a compromise at EDUCAUSE, the registrar that provides information on all .EDU names. A registrar, which allows users to purchase domain names, also specifies the domain name system (DNS) servers for a domain, which convert domain
While the broad job market has been in a funk since the credit bubble burst in 2008, the market for information security professionals has been anything but.According to job market business intelligence firm WANTED Analytics, employers posted more than 4,500 IT security job ads last month. That’s up about 20% from the same period a year ago and roughly nine times as many jobs that were sought in September 2008.WANTED Analytics said the ten most commonly sought positions that require IT security experience include:“We’re at 100% employment in IT security,” said Eric Cowperthwaite, chief security officer at Providence Health & Services. “This is
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.
Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.
Having the right people in the right places with the right training is the best defense against any attack, and this is as
Intel completed its multibillion-dollar acquisition of McAfee almost a year and a half ago, and this week McAfee co-President Mike DeCesare spoke with Network World senior editor Ellen Messmer about what the merger of Intel's chip-making capabilities and McAfee's security expertise is expected to bring down the road.
Question: What can we expect going forward from the Intel buy of McAfee? What do we get from this that represents the strengths of both combined?
Answer: A lot of customers ask me that! Intel's
- Big Data: Architecting Systems at Speed - E2 Conference Boston
- Learn how to enage customers through mobility - Mobile Commerce World - Mobile Commerce World
- Explore best practices for marketers in the new mobile world - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- Evaluating Emerging Technologies for the Enterprise - E2 Conference Boston
- Building a Hybrid Cloud in Government: It's not that Complicated
- Why is Information Governance So Important for Modern Analytics?
- Maximize the benefits of virtualization for greater ROI
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- The ROI of Mobile Photo Bill Pay