To address the risk PCI DSS 3.1 updates requirements 2.2.3, 2.3 and 4.1 to remove SSL and early TLS as examples of strong cryptography. “The National Institute of Standards and Technology (NIST) has identified the Secure Socket Layers (SSL) v3.0 protocol as no longer being acceptable for protection of data due to inherent weaknesses within the […]
The Mozilla Foundation is starting the operations to phase the HTTP connections in the Firefox browser according to “encrypt the Web” movement. According to roadmap defined by the Mozilla Foundation, the organization has started the process to move toward full HTTPS enforcement in Firefox browser In November 2014 the Electronic Frontier Foundation (EFF) and other firms, […]
The popular security expert Samy Kamkar illustrated a method to easily crack many Master padlock combinations in eight tries or less. Have you ever gone in the Gym and after a long and tiring workout forget your padlock numbers? I sure did, but next time I will not call the janitor, I will try to […]
Security experts have conducted an experimental to analyze cyber security threats against teleoperated surgical robots in telesurgery. Technology will help humans to overwhelm any obstacle, one of them is the concept of space that for some activities could represent a serious problem. Let’s think for example to a life-saving surgery that could be performed by surgeons that […]
The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta 1 running on iPhone 6. Apple has just released the iOS 8.4 beta version for its mobile devices and the popular hacker Stefan Esser, also known as i0n1c, has already released a jailbreak to the community of […]
Oracle warned that a dozen of new Java security vulnerabilities could be exploitable remotely to gain access to a target application without login. Once again Java vulnerabilities are worrying the security community, a series of vulnerabilities could be exploitable remotely to gain access to a target application without authentication. Every application running on any of […]
Google Launches Chrome 42 that deprecates the NPAPI (Netscape Plugin API) due to the numerous problems it caused in the past. Google has released Chrome 42, a version that implements the important choice to exclude any plugin using the API called NPAPI (Netscape Plugin API) to extend browser functionalities. The Netscape Plugin API is dated back 1990 […]
Which are different components that must be taken into consideration to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must face in today’s world is the task of securing their organization’s assets. While physical security is a huge component in ensuring that the residual risk level existing […]
According to Top CSO news website, security experts predict that “Health records are worth more and easier to get than credit card data” The rise in health data breach headlines, may not necessarily suggest an increase in actual data breaches. It’s possible that organizations are just getting better at discovering that they’ve been breached, so […]
Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the future of overall online security. Unfortunately, 2014 was one of the worst years and the reason of that was that a lot if viruses and attempts of violation of online privacy. IBM X-Force Threat Intelligence […]