2019 Hackaday Prize Hack Chat

Join us Wednesday, April 17 at noon Pacific time for the 2019 Hackaday Prize Hack Chat!

The 2019 Hackaday Prize was just announced, and this year the theme is designing for manufacturing. The hacker community has come a long, long way in the last few years in terms of the …read more

Continue reading 2019 Hackaday Prize Hack Chat

Best of both worlds: automated cloud access management and incident response

Cloud adoption has done a lot of good for businesses in driving innovation, agility, and scale. But as organizations adopt cloud services into their IT infrastructure, their security teams are facing a new wave of security challenges. Cloud securi… Continue reading Best of both worlds: automated cloud access management and incident response

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive… Continue reading Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

Smart Outlet Cover Offers Lessons on Going from Project to Product

Going from idea to one-off widget is one thing; engineering the widget into a marketable product is quite another. So sometimes it’s instructive to take an in-depth look at a project that was designed from the get-go to be a consumer product, like this power indicating wall outlet cover plate. The fact that it’s a pretty cool project helps too.

Although [Vitaliy] has been working on this project for a while, he only recently tipped us off to it, and we’re glad he did because there’s a lot to learn here. His goal was to build a replacement cover for …read more

Continue reading Smart Outlet Cover Offers Lessons on Going from Project to Product

Booz Allen Hamilton seeks to boost commercial cybersecurity service with new acquisition of startup

Management consulting firm Booz Allen Hamilton is acquiring Morphick, a small, Cincinnati-based cybersecurity firm which has developed a digital platform for threat detection, breach investigation and response. Booz Allen Hamilton announced the agreement to purchase Morphick in a press release on Friday, saying the acquisition will bolster the cybersecurity profile available to clients. Company executives explained that the acquisition will complement existing cybersecurity services already provided by Booz Allen Hamilton. “The addition of the Morphick team and technology further solidifies the firm’s ability to solve increasingly advanced cyber challenges,” said Booz Allen Hamilton President and CEO Horacio Rozanski. The consulting giant already offers threat intelligence products through another service called Cyber4Sight. Morphick, a firm of about 40 people, sells a managed detection and response service, which can provide “organizations with the ability to effectively detect and remediate cyber attacks of all types; ranging from zero-day exploits and privilege escalation to ransomware,” according to […]

The post Booz Allen Hamilton seeks to boost commercial cybersecurity service with new acquisition of startup appeared first on Cyberscoop.

Continue reading Booz Allen Hamilton seeks to boost commercial cybersecurity service with new acquisition of startup

PR fight ensues after claims of leaked Carbon Black data

Two well-funded cybersecurity firms jumped into a public relations fight Wednesday after one alleged that the other had allowed third parties to profit off leaked sensitive customer data. Direct Defense President Jim Broome wrote in a blog post published Wednesday that his firm had found evidence of improper conduct on the part of Carbon Black, a seller of endpoint security software products. Direct Defense, a managed and full service provider of security offerings, said it found an apparent flaw in the architecture of a popular Carbon Black product named Cb Response. This flaw allegedly allowed for a leak of sensitive customer information onto multi-scanning services like VirusTotal, a popular malware repository. The inadvertently leaked data, according to Broome, could be resold by third parties. “Files uploaded by Cb Response customers first go to Carbon Black (or their local Carbon Black server instance), but then are immediately forwarded to a cloud-based […]

The post PR fight ensues after claims of leaked Carbon Black data appeared first on Cyberscoop.

Continue reading PR fight ensues after claims of leaked Carbon Black data

Shmoocon 2017: The Ins And Outs Of Manufacturing And Selling Hardware

Every day, we see people building things. Sometimes, useful things. Very rarely, this thing becomes a product, but even then we don’t hear much about the ins and outs of manufacturing a bunch of these things or the economics of actually selling them. This past weekend at Shmoocon, [Conor Patrick] gave the crowd the inside scoop on selling a few hundred two factor authentication tokens. What started as a hobby is now a legitimate business, thanks to good engineering and abusing Amazon’s distribution program.

The product in question is the U2F Zero, an open source U2F token for two-factor authentication. …read more

Continue reading Shmoocon 2017: The Ins And Outs Of Manufacturing And Selling Hardware

Akiba: Shenzhen in 30 Minutes

Multi-talented hacker extraordinaire and electrical engineer [Akiba] is based in Japan, and this makes it just a hop, skip, and a jump over to Shenzhen, China, the hardware capital of the world. He’s led a number of manufacturing tours aimed at acquainting hackers with the resources there, and now he’s giving you the benefit of his experience in a 30-minute video. It’s great.

Sourcing

When [Akiba] is in Shenzhen, he picks up all the same commodity parts that you would, because they’re just so cheap. And Hua Qiang Bei is its epicenter: it’s a gigantic market for components, and they’re …read more

Continue reading Akiba: Shenzhen in 30 Minutes