Quantcast
Channel: SecureState » Uncategorized
Browsing latest articles
Browse All 64 View Live

Image may be NSFW.
Clik here to view.

Hacking the Gibson

With our recent pleasant surprise at the realistic nature of hacking in the movie Blackhat, we decided to find a few other realistic depictions of hacking in fictional media. While everyone has seen...

View Article



Image may be NSFW.
Clik here to view.

Linux “Ghost” Vulnerability (CVE-2015-0235)

Researchers at Qualys recently warned organizations about a remote code execution vulnerability in the Linux GNU C Library (glibc). Named GHOST, this is a buffer overflow vulnerability that affects the...

View Article

Image may be NSFW.
Clik here to view.

Phishing for Awareness

Phishing is a social engineering tactic used by unauthorized users to gain access to sensitive data. Within the last few years, social engineering attacks have been growing in popularity and while end...

View Article

Image may be NSFW.
Clik here to view.

Information Security Economics

In a free market, supply and demand should ideally self-regulate, maximizing value. The market (often in the form of consumers) responds to negative corporate events such as faulty products or warranty...

View Article

Image may be NSFW.
Clik here to view.

Should You FREAK Out?

Recently, a team of cryptographers at INRIA, Microsoft, and IMDEA discovered an SSL vulnerability in OpenSSL and Apple’s SecureTransfer that allow attackers to downgrade the encryption being used from...

View Article


Image may be NSFW.
Clik here to view.

What Did We Learn from the 2015 DBIR

Verizon Enterprise’s 2015 Data Breach Investigations Report (DBIR) was recently released, and SecureState is here to give you some of the big takeaways from this massive report. Verizon works with...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threat Intelligence: Is Sharing the New Defense?

What’s the saying, “If you can’t beat ‘em, join ‘em.”? Sure. Something like that. Doesn’t really work in the world of cybersecurity, though. Staying ahead of the curve does. I guess you can say Target...

View Article

Image may be NSFW.
Clik here to view.

Fired Up

A recent article on Slate ended with the statement, “There’s still no answer to the question of how to get Americans fired up about cybersecurity.” SecureState’s cybersecurity experts decided to get...

View Article


Image may be NSFW.
Clik here to view.

What Did We Learn from the 2015 DBIR, Part 2

The second half of the 2015 Verizon Data Breach Incident Report is dedicated to the nine basic incident patterns that were originally identified in the 2013 DBIR. Over 96% of the data breaches examined...

View Article


Image may be NSFW.
Clik here to view.

Running Your Own Phishing Campaign

At SecureState, we often stress to our clients that Social Engineering is one of the most common methods for attackers to gain access. Social Engineering attacks can take many forms, from people...

View Article
Browsing latest articles
Browse All 64 View Live




Latest Images