Stream

Join this community to post or comment
 
Mobile Data Security: Hot Tips to Reduce Risks
#riskmanagement #datasecurity #SecurityTips #Mobility  
Data security and mobile data protection is never easy and therefore security of smartphones and tablets cannot be ignored. Taking necessary and meaningful steps to improve mobile data protection and security must be quintessential. Following few and simple safeguard tips can help you in reducing massively the risks of getting your information in the wrong hands. You can even at times stop someone accessing personal and institutional data from yo...
1
1
Олександр Тхорик's profile photo
Add a comment...

Joe Pettit

General discussion  - 
 
When I was about 10 years old, I read a book about Kevin Mitnick, Pengo and Robert Morris. While their exploits seemed very interesting, each story ended in jail time or at the very least, derailment of career goals. My unsophisticated Internet searching circa the early 2000s led me to the same conclusion. Hacking was a neat skill to have but the price was too high.

By +Georgia Weidman of +Cybrary 
Freely available hacking tutorials are a great resource that makes the exciting world of information security available to anyone who has the drive to learn
3
Jonathon Aguilar's profile photo
 
Great article.  I liked the content of it, I just wish someone would proof read these things before they went public.  The grammatical errors distracted from the content.
Add a comment...

Jagwire Technologies Inc.

General discussion  - 
 
Are you living in one of these countries?
A high-speed broadband connection is still a distant dream for most Indians if one compares the average internet speeds globally. With average internet connection speed of 2.0Mbps, the country ranks at a lowly 116 in network tracker Akamai's latest quarterly report 'The State of the Internet'. Curious which are the countries that offer highest internet speeds and where India stands? Here's a look...
1
Add a comment...
 
Researchers have discovered a widespread vulnerability – estimated to impact 50 percent of all current Android users – capable of replacing legitimate applications with information-stealing malware.

+Tripwire, Inc. 
A widespread vulnerability – estimated to impact 50% of all current Android users – could allow attackers to replace legitimate applications with malware.
1
Add a comment...

Bharath Reddy

General discussion  - 
 
An experts view on why apply security to Internet of Things #IOT
Drop in your security concerns with IOT
The Internet of Things (IoT) is producing some of the most fascinating products that have been seen in years – health monitors, air conditioning controls, and some oddities like the smart toilet – and they will only continue to keep on coming. ...
2
Add a comment...

Joe Pettit

General discussion  - 
 
A vulnerability in Cisco IP phones could allow unauthenticated attackers to remotely listen in on the phones’ audio streams.

By +David Bisson of +Tripwire, Inc. 
A vulnerability in Cisco IP phones could allow unauthenticated attackers to remotely listen in on the phones’ audio streams.
2
1
David Bisson's profile photo
Add a comment...

Mayur Agnihotri

General discussion  - 
 
OWASP PROACTIVE CONTROLS
 
The Open Web Application Security Project (OWASP) is a 501c3 not-for-profit also registered in Europe as a worldwide charitable organization focused on improving the security of software.The OWASP Top Ten Proactive Controls describes the most important control and control categories that every architect and developer should absolutely, 100% include in every project.Software developers are the foundation of any application. In order to achieve sec...
2
Add a comment...

Joe Pettit

General discussion  - 
 
Target Corp has agreed to pay $10 million in order to settle a class-action lawsuit related to a 2013 breach that compromised users’ financial and personal information, according to court documents.

By +David Bisson of +Tripwire, Inc. 
1
1
David Bisson's profile photo
Add a comment...

ePapyrus PDF-Pro

Application security  - 
 
December 22, 2014. Alice had to present a new #Acme product in the form of a typical PowerPoint presentation...
1
Add a comment...
 
#Microsoft announces #Windows 10 and #Azure for humanity's implacable #IoT foes http://snip.ly/b1KM
1
Add a comment...

Created by

About this community

The BrightTALK IT security community will cover breaking news in the industry and relevant topics like risk management, BYOD, malware and developing threats as well as mobile and application security. BrightTALK also tweets about IT security news and events from @InfoSecWebinars. Please post only relevant articles or resources!
San Francisco, NYC, London
 
Last week, we posted the top countries with the fastest internet. Now, here's another one from Bloomberg!
The U.S. is steadily climbing up the list of countries and regions with the fastest broadband connections, but the high-tech nation still doesn't crack the top 10.Bloomberg.com got an early look at the quarterly Internet report that Akamai Technologies will publish later today. The rankings, which...
1
1
Ethoplex's profile photo
Add a comment...
 
#BYOD and #CYOD – Security Challenges For Enterprises (Solved)
Mobile devices have invaded the business world as much as our personal lives. Employees Are Us. When we go to office and we have to work on a different device, it can at times seem a little annoying especially when you have to access personal work on one device, official work on another device. The whole scenario becomes way lot more annoying when you worked from home for official purpose from a different device and when you came to office you ar...
1
1
Emily Winters's profile photo
Add a comment...
 
Join the fight against web app vulnerabilities and become a Web Application Security expert. Click here for more details - http://ow.ly/KtUuS
Web Applications are under constant attack from criminals - mostly with very little defense! The demand for skilled warriors to fight against these vulnerabilities is rapidly increasing. It's time to
1
Add a comment...
 
..and because Google Search knows everything!
3
3
De Wet Venter's profile photoGiggle Play's profile photo
Add a comment...
 
7 reasons why Israeli cyber-security will remain hot
GUEST:Is Israeli cyber-security worthy of its global reputation? Are the impressive price tags of recent M&As in the field justified? And will th...
2
Add a comment...

RK NINE

General discussion  - 
 
BOOT PROBLEM

I used CC cleaner on the "wipe" tab to experiment on something I should not have. I originally have a "C:\" drive, which is my main hard drive where everything is stored in. I also, by default, have a system partition "E:\" drive where a few files are stored. This drive is locked from the system preventing the user to format it. I experimented by using the "wipe" feature to wipe my "E:\" drive. I felt nervous and my 'instincts' told me something bad happened. I restarted my computer only to discover my instincts are correct. My computer's internal components are functioning fine, however I do NOT have any signal to my monitor at all. Instead of my monitor's light being blue (normal signal flow), it is orange (NO signal at all). My hard drive light on my case blinks a few times (no more than 3 times) and finally stops. The computer is just is on, but cannot boot into Windows 8.1 operating system and without any monitor signal.

I looked up what perhaps may be a solution to my problem and found a few command prompt commands, which are NO use since I do NOT have any signal to my monitor and most likely the computer is NOT in command prompt. I even experiment by trying to type the commands "blindly" (without a monitor), but NO luck.

I tried all type of safety mode start ups, such as ESC, F2, F5, F8, Shift + F8, F9, F10, F12 but still no luck. Computer functions the same even without this command.

I got on my friend's laptop and burn on a CD "Windows 8.1 Recovery Disk" from Microsoft's website. Put it in the CD-ROM Drive, restart computer, I did see a CD-ROM green light indicating proper signal flow, however computer starts off normally with the boot problem.

All keys have no effect only Ctrl + Alt + Delete to restart, caps lock, number lock and scroll lock for the 3 green lights the top right hand corner of the keyboard.

I should of stayed SAFE- I should NOT have experimented on my good computer - I played with fire - but I was curious.

What is the solution?
1
Add a comment...

Jagwire Technologies Inc.

General discussion  - 
 
What can you say about Tim Cook's thoughts on modern tech industry?
2
Add a comment...
 
So this is why cloud computing is called cloud computing..
2
Add a comment...

Joe Pettit

General discussion  - 
 
The health insurer Premera Blue Cross announced on Tuesday it was the victim of a “sophisticated” cyberattack that could potentially impact at least 11 million people.

+Tripwire, Inc. 
1
Add a comment...