article thumbnail

Why Your VPN May Not Be As Secure As It Claims

Krebs on Security

But researchers at Leviathan Security say they’ve discovered it’s possible to abuse an obscure feature built into the DHCP protocol so that other users on the local network are forced to connect to a rogue DHCP server. VPNs work by creating a virtual network interface that serves as an encrypted tunnel for communications.

IT 266
article thumbnail

Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). On March 7, 2018, the U.S. to incentivize more cybersecurity training activities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’

The Last Watchdog

Screenshot In a huge development, Microsoft announced today that it is revising its security practices, organizational structure, and, most importantly, its executive compensation in an attempt to shore up major security issues with its flagship product, not to mention quell rising pressure from regulators and customers.

Security 100
article thumbnail

RSAC Fireside Chat: AT&T, WillJam Ventures partner to launch new MSSP — LevelBlue

The Last Watchdog

Related: The transformative power of GenAI/LLM This week at RSA Conference 2024 , AT&T announced the launch of LevelBlue – a top-tier managed security services business formed by an alliance with AT&T and WillJam Ventures. SAN FRANCISCO – The already simmering MSSP global market just got hotter. I’ll keep watch and keep reporting.

article thumbnail

New Attack on VPNs

Schneier on Security

They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then. […] The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network.

article thumbnail

Women in Security: Assessing the Progress

Data Breach Today

Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges.

Security 113
article thumbnail

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

In this heady environment, the idea of attempting to infuse a dollop of security into new software products — from inception — seems almost quaint. History of product security. As a nod to security, nominal static analysis and maybe a bit of penetration testing gets done just prior to meeting a tight deployment deadline.

Security 183