Numerous companies have shamed themselves by posting their sensitive data and encryption keys to public cloud without any protection, where cyber criminals and security researches find them. What is the better way to get a bad dent to the “professional” cover of the data security consultanting company than doing exactly this? And yet those companies

Hard Disk As An Accidental Microphone

Your Hard Disk As An Accidental Microphone article tells that modern hard disks can sense sounds around them unintentionally.  [Alfredo Ortega] has uncovered in his talk at the EKO Party conference in Buenos Aires where he he demonstrates how a traditional spinning-rust computer hard disk interacts with vibration in its surroundings, and can either become

Securing smart grid and advanced metering infrastructure  During the recent years, there have been two cyber-attacks on power plants in Ukraine, which for the first time in the history succeeded to disrupted and cut power in a country.  An analysis of the events in Ukraine indicates that in order for a cyber-attack to materialize, three conditions must exist: opportunity, ability, and motivation.

7 considerations to make when securing your Raspberry Pi The Raspberry Pi and many other inexpensive computer boards like it have become part of the “Internet of Things” or IoT revolution.  Because your Raspberry Pi is a Linux system, most advice for security on larger systems applies to your project, too.  Find out what sensible steps you can take to protect your Raspberry Pi

Security Tools to Check for Viruses and Malware on Linux | Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here. First and foremost, no operating system is 100 percent immune to attack.  Whether you need an antivirus or anti-malware scanner or a tool to hunt for rootkits, Linux has you covered.

Store Your Sensitive Data Safely When Sharing a Sketch – Arduino Project Hub Often in your sketch, there is some sensitive data that you’d like to keep private, which could accidentally become public when published on GitHub or when you share your sketch with someone else via URL.This sensitive information may include Wi-Fi network names and passwords, API key, and so on. But now, you can add a

Kali Linux 2017.2 Security OS Released With New Hacking Tools If you are a hacker, pentester, or a security researcher, this news should interest you. The best Linux OS, Kali Linux 2017.2  was released yesterday. Kali Linux is available for both 32-bit and 64-bit versions. The new Kali Linux distro version comes with more 20 new hacking tools.  Get the latest Kali 2017.2 from Kali download page.

Future cyber security threats and challenges: Are you ready for what’s coming? | CSO Online The world is changing, and with it so is the internet. Or perhaps it’s the other way around. The internet continues to create new business and social opportunities that massively scale and widely interconnect. The increasing depth and volume of personal and corporate data make it a more rewarding target for cyber crooks and

World Wide Web Consortium abandons consensus, standardizes DRM with 58.4% support, EFF resigns / Boing Boing In July, the Director of the World Wide Web Consortium overruled dozens of members’ objections to publishing a DRM standard without a compromise to protect accessibility, security research, archiving, and competition. EFF appealed the decision, the first-ever appeal in W3C history. 58.4% of the group voted to go on with publication, and the W3C did so today. It