The cybersecurity landscape is an ever-evolving battleground where the stakes are continually being raised. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) joined forces with the Federal Bureau of Investigation (FBI) to unveil a crucial piece of guidance that software...
Original release date: October 11, 2018
Summary
This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed
In it we highlight the use of five...
For the last 20 years, the Microsoft Security Response Center has been an integral part of Microsoft’s commitment to customer security. We are often called on to talk about the work we do and how customers can apply the lessons we have learned over that period to better their security posture...
best practices
blue teams
bug bounty
cloud security
coordinated disclosure
customer tips
cybersecurity
government programs
industry programs
microsoft
msrc
operational security
red teams
secure code
securitysecurity conferences
securitypracticessecurity strategy
videos
vulnerability
Original release date: June 13, 2017
Systems Affected
Networked Systems
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides technical details on the...
Original release date: November 10, 2015
Systems Affected
Web servers that allow web shells
Overview
This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert...
Original release date: January 02, 2014 | Last revised: February 05, 2014
Systems Affected
Point of Sale Systems
Overview
Point of Sale Systems
When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...
antivirus
best practices
consumer protection
credit card
cybersecurity
data protection
data theft
debit card
digital fraud
firewall
fraud prevention
identity theft
malware
network security
phishing
point of sale
pos systems
securitypractices
skimming
track data
It is often said that attackers have an advantage, because the defenders have to protect every part of their systems all the time, while the attacker only has to find one way in.
This argument oversimplifies the security landscape and the real strength that defenders can achieve if they work...
Exclusive Ron Paul interview with Lavabit Ladar Levison discusses the implications of National Security Letters and NSA surveillance
Lavabit is an email service founded in 2004 that suspended operations in August 2013. It is owned and operated by Ladar Levison.
Lavabit was founded by...
activism
civil liberties
constitution
court
digital privacy
e-mail
edward snowden
email service
encryption
gag order
internet freedom
lavabit
national security
nsa
privacy
ron paul
securitypractices
surveillance
technology
whistleblower
http://arstechnica.com/paedia/w/wireless-security-howto/home-802.11b-1.html
802.11b networks are proliferating like mad. Even though faster wireless networks are now available, 802.11b offers users what they want at a reasonably low price. While the high throughput of other technologies is...