If you happen to own the Samsung RF28HMELBSR, you have a reason to be concerned and probably shouldn’t take the device to your local Starbucks. Researchers from Pen Test Partners found the device didn’t validate SSL certificates, thus making it vulnerable to man-in-the-middle attacks.
Tripwire senior security analyst Ken Westin recently gave a popular presentation at DEF CON 23 called “Confessions of a Professional Cyber Stalker.” In his presentation, Ken discussed the various technologies and methods he has developed to track criminals, which has led to at least two dozen convictions.
Cyber attacks are becoming more frequent and more sophisticated each day. Cyber criminals are always changing their approach and tactics, and zero-day malware can slip by your network perimeter defenses and/or enter your environment via a laptop, USB, or even a mobile device.
Ashley Madison has made headline after headline in recent weeks after a hacking group penetrated its servers and published the information of all 37 million users online. This timeline recounts all of the major developments of this ongoing breach.
IBM’s 2014 Cyber Security Intelligence Index found that 95 percent of all security incidents involve human error, and Gartner predicts by 2017, “75 percent of mobile security breaches will be the result of mobile application misconfiguration”.
Attackers are looking for systems that have default settings that are immediately vulnerable. Once an attacker exploits a system, they start making changes. These two reasons are why Security Configuration Management (SCM) is so important.
North Dakota was named the first U.S. state authorizing local police departments to fly drones with “less-than-lethal” weapons, including tasers, sound cannons, teargas and non-penetrating firearms, after the passage of House Bill 1328 last week.
configuration management, file integrity monitoring, log and event management, and vulnerability management
Social Media, 2010 - present
Tripwire is a leading provider of advanced threat security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.