Social Engineering News, Features, and Interviews

News

Drupal offers bounty for breaking its new two-factor authentication

By Liam Tung | 28 August, 2014 23:43 | 3 Comments

Developers behind the popular open source content management system, Drupal, want hackers to break its two-factor authentication system for drupal.org before it goes live.

Callas Responds to Green's Criticisms

By David Heath | 27 August, 2014 15:23

A few days ago, Matthew Green, the widely respected cryptographer and research professor at Johns Hopkins University launched a broadside against PGP. In summary, Green said, “The problem with this is that, for all the good PGP has done in the past, its a model of email encryption thats fundamentally brokenrdquo; Further Green said PGP keys suck, PGP key management sucks and that that there is no forward secrecy. His blog post adds more criticisms and also attempts to find some solutions.

From IT Security to Information Security — How Technology Is Not The Greatest Challenge in Protecting Your Information Online

By Anthony Caruana | 27 August, 2014 14:54

Michael Rothery, First Assistance Secretary for National Security Resilience Policy at Department of the Attorney General says that in order to deliver effective security and risk management the key question is "Who owns the risk?".

Symantec courting Australian security talent as Sydney facility opened

By David Braue | 27 August, 2014 13:20

Australia has a strong base of skilled security professionals to tap into, but a “dearth of security talent” will drive helped strengthen the case to invest heavily in the expansion of a Sydney facility that will form an increasingly important part of Symantec's global managed-security and security research capability.

Amazon tricks up CloudFront encryption with anti-spy feature

By Liam Tung | 22 August, 2014 12:56

Spies and hackers will find it harder to unseal encrypted communications if they’ve already captured packets sent across Amazon’s content distribution network, CloudFront.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Security

Safeguard your corporate and roaming employee endpoints and mobile devices.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.