Independent

ComputerWorldIndependent

Dealing with NIST's about-face on password complexity

Credit to Author: Sandra Henry-Stocker| Date: Mon, 05 Jun 2017 11:13:00 -0700

In the last few years, we’ve been seeing some significant changes in the suggestions that security experts are making for password security. While previous guidance increasingly pushed complexity in terms of password length, the mix of characters used, controls over password reuse, and forced periodic changes, specialists have been questioning whether making passwords complex wasn’t actually working against security concerns rather than promoting them.

Security specialists have also argued that forcing complexity down users’ throats has led to them writing passwords down or forgetting them and having to get them reset. They argued that replacing a password character with a digit or an uppercase character might make a password look complicated, but does not actually make it any less vulnerable to compromise. In fact, when users are forced to include a variety of characters in their passwords, they generally do so in very predictable ways. Instead of “password”, they might use “Passw0rd” or even “P4ssw0rd!”, but the variations don’t make the passwords significantly less guessable. People are just not very good at generating anything that’s truly random.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Eight steps to the GDPR countdown

Credit to Author: Sandra Henry-Stocker| Date: Thu, 25 May 2017 12:52:00 -0700

One year from today, the recently passed regulation known as “GDPR” (General Data Protection Regulation) goes into effect. While EU-specific, it can still dramatically affect how businesses that work with personal data of citizens and residents of the EU. GDPR was approved a year ago and will be going into effect in another year. It applies directly to organizations within the EU, but also applies to organizations outside the EU if they 1) offer goods and services to the EU, 2) monitor the behavior EU subjects, or 3) process or retain personal data of EU citizens and residents. And the regulation can place very serious fines and sanctions for non-compliance.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

The complexity of password complexity

Credit to Author: Sandra Henry-Stocker| Date: Thu, 25 May 2017 05:47:00 -0700

Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users assign reasonable passwords on their accounts, but the settings themselves can be a bit misleading. For example, setting a minimum password length of 12 characters does not mean that your users’ passwords will all have twelve or more characters. Let’s stroll down Complexity Boulevard and see how the settings work and examine some settings worth considering.

First, if you haven’t done this already, install the password quality checking library with this command:

apt-get -y install libpam-pwquality 

The files that contain most of the settings we’re going to look at will be:

To read this article in full or to leave a comment, please click here

Read More
IndependentSecuriteam

Hack2Win 2017 – The Online Version

Credit to Author: SSD / Maor Schwartz| Date: Sun, 11 Jun 2017 10:14:42 +0000

We proud to announce the first online hacking competition! The rules are very simple – you need to hack the D-link router (AC1200 / DIR-850L) and you can win up to 5,000$ USD. To try and help you win – we bought a D-link DIR-850L device and plugged it to the internet (we will disclose … Continue reading Hack2Win 2017 – The Online Version

Read More
ComputerWorldIndependent

24% off Resqme Keychain Car Escape Tool 2-Pack – Deal Alert

Credit to Author: DealPost Team| Date: Fri, 09 Jun 2017 06:42:00 -0700

Made in the USA and originally developed for first responders, this 2-in-1 safety and survival tool is amazingly powerful despite its mini size. A fierce but safe spring loaded stainless steel spike allows the vehicle occupant to easily break side windows, and a carefully concealed stainless steel razor blade slices through a jammed seat belt to prevent vehicular entrapment. resqme is small enough to keep on your keychain, or clip it to your visor where it will always be at arm’s reach. The resqme vehicle escape tool averages 4.5 out of 5 stars on Amazon from over 2,600 reviewers (read reviews). The typical list price on a 2-pack is $19.95, but with this 24% discount you can pick them up for $15.25. See this deal on Amazon.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Blockchain integration turns ERP into a collaboration platform

Credit to Author: Lucas Mearian| Date: Fri, 09 Jun 2017 03:06:00 -0700

As the blockchain continues to mature and find adoption in areas other than cryptocurrency, ERP vendors are working to integrate the distributed ledger technology as a trackable, immutable record for everything from shipping manifests and supply chains to equipment maintenance and dispute-resolution systems.

“This is very real and something we’re aggressively excited about,” said Brigid McDermott, vice president of Blockchain Business Development at IBM. “What blockchain does is provide a trust system of record between disparate companies.”

To read this article in full or to leave a comment, please click here

Read More
IndependentSecuriteam

SSD Advisory – IDERA Uptime Monitor Multiple Vulnerabilities

Credit to Author: SSD / Maor Schwartz| Date: Thu, 08 Jun 2017 07:23:23 +0000

Vulnerabilities Summary The following advisory describe three (3) vulnerabilities found in IDERA Uptime Monitor version 7.8. “IDERA Uptime Monitor is a Proactively monitor physical servers, virtual machines, network devices, applications, and services across multiple platforms running on-premise, remotely, or in the Cloud. Uptime Infrastructure Monitor provides a unified view of IT environment health and a … Continue reading SSD Advisory – IDERA Uptime Monitor Multiple Vulnerabilities

Read More
ComputerWorldIndependent

How to fix Android's Smart Lock Trusted Places feature

Credit to Author: JR Raphael| Date: Thu, 08 Jun 2017 09:33:00 -0700

Android’s Smart Lock feature is spectacular — that is, when it actually works.

Smart Lock has been around since 2014’s Android 5.0 era. The basic idea behind it is to make securing your smartphone less inconvenient, thus making it more likely that you’ll actually use a pattern, PIN, or passcode to keep your data safe. The sensational headlines about big, bad malware monsters lurking in the dark and waiting to pounce on unsuspecting victims may be scary, after all — but here in the real world, you’re far more likely to suffer from your own self-made security shortcomings than from any sort of theoretical threat.

To read this article in full or to leave a comment, please click here

Read More