How to Verify md5, sha1 and sha256 Checksum on Mac

 Apple, Security  Comments Off on How to Verify md5, sha1 and sha256 Checksum on Mac
Jul 202015
 

How to Verify Checksum on MacWhen we download or exchange a file, we need to be sure of the integrity of the file we have downloaded or exchanged.

By integrity, we mean checking if the file was corrupted or tampered with during download.

To ensure that the iso or any other file we downloaded is the same file as the one at the source, we do a Checksum verification.

Think of Checksum as a digital signature (comprising of a long string of numbers) used to verify the integrity of a downloaded file.

Checksum Verification

Here’s how to do a Checksum verification when you download a file to your MacBook, Mac Mini or iMac.

Major sites in the open source universe provide the md5 or shasum as a string of numbers when you download an OS like Ubuntu or an application. Copy the md5 or shasum number to a notepad so that you can compare it with the Checksum you generate.

Load up the terminal and run the md5 or shasum commands to verify the Checksums of your download. Continue reading »

Avira to Put Out Secure Web Browser

 Security  Comments Off on Avira to Put Out Secure Web Browser
Jul 062015
 

Avira Secure Browser Coming
German anti-virus software provider Avira is coming out with a security enhanced browser based on Google’s Chromium open source browser and some unspecified extensions.

With the Internet turning into the most dangerous attack point today with all kinds of malicious code trapping the unwary, a secure web browser can’t come soon enough. Continue reading »

REMnux Linux Security Toolkit Beefed Up

 Linux, Security  Comments Off on REMnux Linux Security Toolkit Beefed Up
Jun 072015
 

REMnux Linux Security ToolkitMalware scanning and analysis distro REMnux has been updated to Version 6 with 19 new tools and updates to tools in earlier versions.

The brainchild of information security specialist Lenny Zeltser, REMnux Linux has been around for a while. The first version saw the light of day in 2010.

The upgrade also comes with changes to let the toolkit’s users easily apply future updates without requiring them to download the full REMnux environment from scratch.

Based on Ubuntu 14.04 64-bit, REMnux v6 features a suite of tools to scan and examine malicious software.

REMnux 6 includes tools to examine browser malware, investigate Linux malware and mobile malware, examine document files, file properties and contents, network protocol analysis and more.

REMnux 6 – New Tools

The following new tools have been added in With REMnux Linux 6.

* pedump, readpe.py: Statically examine properties of a Windows PE file
* virustotal-tools: Interact with the VirusTotal database from the command-line
* Nginx: Web server, which replaces Tiny HTTPD that was present on REMnux earlier
* VolDiff: Compare memory forensics images to spot changes using Volatility Continue reading »

Little Snitch Folks Launch Micro Snitch

 Security  Comments Off on Little Snitch Folks Launch Micro Snitch
Jun 072015
 

Little Snitch Mircor SnitchAustrian software house Objective Development, the folks behind the Little Snitch network monitor application for the Mac, has put out a Micro Snitch app.

True to its name, Micro Snitch acts like a snitch and informs users of any microphone and camera activity on the Mac.

Little Snitch should be a welcome app to Mac owners who worry whether they’re being stealthily spied upon (by hackers, government intelligencies agencies or rogue apps).

If an application starts recording audio or video on the Mac, Micro Snitch will supposedly inform the Mac user about it.

The application comes with a convenient logging feature that lets users see if a microphone or camera was active while they were away from their Mac by logging to the Console or to a separate file.

Micro Snitch requires a Mac with OS X 10.10 0 or higher.

Micro Snitch is available at the Mac app Store and costs $1.99.

US Most Lucrative for Online Attackers

 Security  Comments Off on US Most Lucrative for Online Attackers
May 272015
 

Average consolidated total cost of a data breach is now $3.8 million, according to IBM’s annual Cost of Data Breach Study conducted by the privacy and data protection consultancy Ponemon Institute.

This represents a 23% increase since 2013.

The study also found that the cost for each lost or stolen record containing sensitive and confidential information rose 6% to $154.

Ponemon’s researchers established a correlation between the time taken to identify a breach and total cost of the breach.

The IBM-Ponemon study focused on interviews with IT, compliance and information security workers representing 350 organizations in US, UK, Germany, Australia, France, Brazil, Japan, Italy, India, United Arab Emirates, Saudi Arabia and Canada.

But the heaviest price of online attacks is being paid by US businesses, government agencies and ultimately by its citizens.

US – Worst Hit?

While businesses and organizations in all geographies are subject to criminal online attacks, the US remains the epicenter for large attacks (where millions of records are stolen) since it yields the maximum profits for hackers.

Every day brings news of devastating online attacks on US businesses and government agencies suggesting the overall cyberdefense infrastructure remains weak and easily open to attack.

The IBM-Ponemon study found that the US had the highest per-record cost of cyber-breaches, at $217, followed by Germany at $211. Continue reading »

Lynis – Awesome Free Linux Security Audit Tool

 Linux, Security  Comments Off on Lynis – Awesome Free Linux Security Audit Tool
May 222015
 

All good things of life must end sooner rather than later given human imperfection.

Ditto with Linux.

Long considered one of the most secure operating systems thanks to its open source nature, Linux’s growing popularity is drawing the attention of hackers around the world.

In what must be extremely distressing news for system administrators, new malware does not spare even Linux systems.

Besides malware, configuration errors too can leave Linux system vulnerable.

Linux systems have grown so complex that even seasoned administrators can be befuddled by the various processes and options. Configuration errors can easily creep in during installation, updates and/or maintenance.

Here’s where the free security auditing software Lynis comes in. Continue reading »